News & Insights for the AI Journey|Monday, August 19, 2019
  • Subscribe to EnterpriseAI Weekly Updates:  Subscribe by email

cybersecurity

Hacker Traffic Havoc: Stalled Autonomous Cars and City-wide Gridlock

Another potential source of skepticism about self-driving cars has cropped up, one that the auto industry may need to quell in the public mind: a new report depicts hackers ...Full Article

AI for Cloud Security Attracts Venture Funding

Vectra, the cloud security platform vendor, has raised an additional $100 million in its latest funding round led by TCV, an early investor in technology companies ranging Facebook to ...Full Article

ML and Hybrid Cloud Security: ‘4 P’s’ Predictions

Enterprises are data-rich and insight-poor as it relates to security for multi-cloud, hybrid infrastructure. Machine learning approaches are relatively well-established for email security, data loss prevention and malware detection. ...Full Article

DARPA Tackles Enterprise Cyber Security

The sheer breath of distributed enterprise networks increasingly running in the cloud are outpacing the ability of the latest commercial security tools needed to identify and counter cyber threats. ...Full Article

NSF Funds Cybersecurity, Trusted AI Research

The National Science Foundation will fund a broad range of cybersecurity, data privacy and network security research projects that includes a new Center for Trustworthy Machine Learning. NSF’s Secure ...Full Article

IBM Opens Up with Multi-Cloud Manager, AI Tools

With upwards of 85 percent of companies using more than one cloud provider, the shift to multi-cloud deployments driven by emerging open-source platforms has prompted infrastructure vendors to begin ...Full Article

GDPR and the Data Dilemma

There’s a data dilemma in the world today. To provide the best and most personalized services to clients and to get the best analytic insights, companies need more data ...Full Article

How to Deceive Cyber Deceivers

Since 2014, internal and external cyber-attacks have accelerated and there is evidence that these assailants are penetrating traditional defenses at an increasing rate. Today’s security technologies seek primarily to ...Full Article

How to Prevent GDPR Mistakes

Nearly everyone with a credit report is familiar with the recent Equifax data breach. And anyone in the business of moving sensitive data is familiar with how a robust ...Full Article

Chip Flaws ‘Meltdown’ and ‘Spectre’ Loom Large

The HPC and wider tech community are abuzz over the discovery of critical design flaws that impact virtually all contemporary microprocessors. The bugs leave processors vulnerable to side channel ...Full Article
Page 1 of 612345...Last »
Do NOT follow this link or you will be banned from the site!