AI
From Alan Turing to Future Artificial Intelligences – Reading Security Signals
The notion that the time we are living in now is “unprecedented” is a common one, but historians and philosophers alike will happily note that things are rarely so different that we ...
Identity Verification: Is Your Potential Employee Who They Say They Are?
Identity verification has taken on a new urgency for cybersecurity and IT teams in the new era of remote work. Confirming a person’s identity has been important since the advent of data ...
Survey Sees AI, Automation Cast Shadow Over Security Careers
A survey of 350 security professionals in the U.S., Singapore, Germany, Australia and the United Kingdom suggests younger cybersecurity professionals tend to be more conflicted about advances in artificial intelligence (AI) than ...
Akamai’s Polymorphic AI Framework Preemptively Manages Bots
Too many security efforts react to threats as they come. While security teams often succeed through Herculean efforts, being constantly under siege takes its toll on your resources. The relentless barrage of ...
Deepfake Voice Technology Iterates on Old Phishing Strategies
As the world of AI and deepfake technology grows more complex, the risk that deepfakes pose to firms and individuals grows increasingly potent. This growing sophistication of the latest software and algorithms ...
What is the Future of Cybersecurity Jobs Post-COVID19?
The current situation presents interesting opportunities for job seekers and employers looking to reinvent their organizations. The post What is the Future of Cybersecurity Jobs Post-COVID19? appeared first on Radware Blog ...
Stop Treating Your Data Center Like a Block Tower
Today, data centers are taking on new shapes and sizes and are existing in all-new locations, from traditional on-site operations to subsea locations with special cooling mechanisms. But one simple fact remains: ...
There But Not There: Phishing Emails Using Invisible Text
We’re used to hackers slipping malicious links and attachments into phishing emails. That doesn’t mean there aren’t the occasional slip-ups that result in malware infections, but for the most part, cyber-savvy users ...
Intro to Blockchain as a Service (BaaS)
Blockchain? I'm not sure what it is, but I know that bitcoin used to be worthless and now is worth a lot. HODL! (hold on for dear life) Bitcoin can be forked, ...
How to Get an IT Security Job: 3 Hot Skill Sets
What skill sets do you need to be successful in cybersecurity today? Here are three big ones. The post How to Get an IT Security Job: 3 Hot Skill Sets appeared first ...

