100-Year-Old Unbreakable Cipher Could Transform Digital Security
What if there were a cure for cancer, but the medical profession didn’t provide it? Or a plant that solves world food shortages, but farmers wouldn’t grow it? Or ...Full Article
AI ‘Dual Use’ Poses New Security Threats
While the genie may already be out of the bottle, the rapid growth and broad availability of AI and machine learning technology along with a growing list of development ...Full Article
Crypto-Miners’ Latest Target: Containers
The crypto-currency mining craze has now extended from hijacking supercomputers and public computing resources to include application containers, according to a security vendor. Researchers at Aqua Security said this ...Full Article
Intel Debuts Xeon SoC for Edge Applications, Addresses ‘Spectre’ and ‘Meltdown’ Fears
Intel has addressed the drive for increasingly powerful processing at the edge of systems and networks with the launch this week of the Xeon D-2100 SoC, designed to support ...Full Article
Google-Backed Study Seeks Middle Ground in AI Debate
The debate over the benefits and pitfalls of AI is evolving as alarmists and cheerleaders are joined by realists operating on the assumption that machine learning is here stay, ...Full Article
Quantum Computers Threaten Data Encryption
The promise of quantum computing comes with a major downside: "Cryptographically useful" quantum machines will threaten public key encryption used to secure data in the cloud, a new report ...Full Article
How to Deceive Cyber Deceivers
Since 2014, internal and external cyber-attacks have accelerated and there is evidence that these assailants are penetrating traditional defenses at an increasing rate. Today’s security technologies seek primarily to ...Full Article
Vermont Launches Blockchain Project
Early efforts to use blockchain technology for financial transactions are gathering momentum with the launch of a pilot project between a blockchain startup and a Vermont city to use ...Full Article
U.S. Seeks to Automate Video Analysis
U.S. military and intelligence agencies continue to look for new ways to use artificial intelligence to sift through huge amounts of video imagery in hopes of freeing analysts to ...Full Article
Juggling Security With Greater Data Access
Securing critical data while simultaneously making it more accessible is the challenge for enterprise IT departments, a new vendor survey finds. In a report released Wednesday (Jan. 10), big ...Full Article