Researchers Use Machine Learning, Cybersecurity Practices to Secure US Power Grid

In 2015, Russian hackers shut down Ukraine’s electrical grid after infecting the infrastructure with malware. It was only a matter of time until they would target the US power system. As of 2016, US critical operational infrastructures have been under siege by "Russian government cyber actors," as described by the Department of Homeland Security and the FBI.
Read more

The Danger in Outsourcing Cybersecurity to Foreign-Based Firms

Sending cybersecurity work offshore isn’t just a bad idea for individual organizations; it can be a security issue. Facing a severe shortage of qualified cybersecurity workers—the InfoSec unemployment rate is expected to be zero until at least 2021—many organizations have no choice but to outsource at least some of their cybersecurity functions. Security services are..
Read more

Securing financial data of the future: behavioral biometrics explained

Sophisticated social engineering. Fileless malware. Specialized Trojans. These are the threats that keep the financial sector on its toes—making way for a new mode of authentication called behavioral biometrics. And its primary concern is not what your credentials are but how you enter them. Categories: 101 Business Tags: artificial intelligencebehaviometricsbehavior-based authenticationbehavioral biometricsfinancialmachine learning (Read more...) The...
Read more

Joscha Bach, Ph.D., ‘The Lebowski Theorem of Machine Superintelligence’

via Jason Kottke, comes a Lebowski Cogitation with sterling credentials, in which, the Dude wades in with his take on machine learning (in reality {if you like that sort of thing} via a twitter message by Joscha Back, Ph.D.'s), utilizing the non-virtual Jeffrey Lebowski (whom, of course, abides, if only on celluloid, and bits on the wire,) as the vector: 'No superintelligent AI is going to bother with a task that is harder than hacking its reward function.' - The Lebowski Theorem - Joscha Back, Ph.D.'s Permalink
Read more

Security Patches: Move Faster to Keep Up With the Bad Guys

You’re tired of hearing it. Most security pundits are tired of saying it. Applying and testing security patches with alacrity is one of the keys to avoiding data breaches. And it looks like that could become even more imperative. A new Ponemon Institute study, commissioned by ServiceNow, concludes that cybercriminals and hackers have responded more..
Read more

The DOD AI Mineshaft Gap

Interestingly written reportage - crafted by Matt Stroud (Matt is a reporter employed by The Center for Public Integrity) for The Verge, divulges little of the loathing of AI at the United States Department of Defence, but, little is all that's required to grok the problematic view of artificial intelleigence and warfighting. Ladies and Gentlemen, We are in a AI Gap! The Money Quote: "He called for more serious work by the Pentagon, saying, “There might be an artificial intelligence arms race, but we are not yet in it.” America’s adversaries, he said, “understand...
Read more

Predictably Evil

A common criticism of computer security products is that they can only protect against known threats. When new attacks are detected and analysed security companies produce updates based on this new knowledge. It's a reactive approach that can provide attackers with a significant window of opportunity. It's why anti-virus has been declared dead on more than one occasion. Latest report now
Read more
Page 1 of 4812345...102030...Last »