From Alan Turing to Future Artificial Intelligences – Reading Security Signals

The notion that the time we are living in now is “unprecedented” is a common one, but historians and philosophers alike will happily note that things are rarely so different that we ...
identity verification

Identity Verification: Is Your Potential Employee Who They Say They Are?

Identity verification has taken on a new urgency for cybersecurity and IT teams in the new era of remote work. Confirming a person’s identity has been important since the advent of data ...
Security Boulevard
survey security

Survey Sees AI, Automation Cast Shadow Over Security Careers

| | AI, Automation, Careers, survey
A survey of 350 security professionals in the U.S., Singapore, Germany, Australia and the United Kingdom suggests younger cybersecurity professionals tend to be more conflicted about advances in artificial intelligence (AI) than ...
Security Boulevard
Day3_Blog6_PolymorphicRA.png

Akamai’s Polymorphic AI Framework Preemptively Manages Bots

Too many security efforts react to threats as they come. While security teams often succeed through Herculean efforts, being constantly under siege takes its toll on your resources. The relentless barrage of ...

Deepfake Voice Technology Iterates on Old Phishing Strategies

As the world of AI and deepfake technology grows more complex, the risk that deepfakes pose to firms and individuals grows increasingly potent. This growing sophistication of the latest software and algorithms ...
What is the Future of Cybersecurity Jobs Post-COVID19?

What is the Future of Cybersecurity Jobs Post-COVID19?

The current situation presents interesting opportunities for job seekers and employers looking to reinvent their organizations. The post What is the Future of Cybersecurity Jobs Post-COVID19? appeared first on Radware Blog ...
data center

Stop Treating Your Data Center Like a Block Tower

Today, data centers are taking on new shapes and sizes and are existing in all-new locations, from traditional on-site operations to subsea locations with special cooling mechanisms. But one simple fact remains: ...
Security Boulevard
phishing

There But Not There: Phishing Emails Using Invisible Text

We’re used to hackers slipping malicious links and attachments into phishing emails. That doesn’t mean there aren’t the occasional slip-ups that result in malware infections, but for the most part, cyber-savvy users ...
Security Boulevard

Intro to Blockchain as a Service (BaaS)

| | AI, BaaS, blockchain, community, FEATURED
Blockchain? I'm not sure what it is, but I know that bitcoin used to be worthless and now is worth a lot. HODL! (hold on for dear life) Bitcoin can be forked, ...
How to Get an IT Security Job: 3 Hot Skill Sets

How to Get an IT Security Job: 3 Hot Skill Sets

What skill sets do you need to be successful in cybersecurity today? Here are three big ones. The post How to Get an IT Security Job: 3 Hot Skill Sets appeared first ...