Advanced Computing in the Age of AI | Thursday, April 18, 2024

cybersecurity

U.S.: Cybersecurity Must Go Beyond Passwords

If indeed we are operating in a "digital economy," standard security measures such as passwords are no longer sufficient to shield the underlying IT infrastructure from sophisticated hackers, asserts ...Full Article

Covering Your Assets: Blockchain and Security

The combined market value of blockchain-based technologies, such as cryptocurrencies, is measured in the billions of US dollars. With cryptocurrency gaining legitimacy, it’s worth knowing what security measures are ...Full Article

Machine Learning and Online Security in 2017

As companies increase their digital footprints, ‘identify and diagnose’ capabilities will not defend against the growing array of security threats, according to analysts at Gartner Group. Because the types ...Full Article

How Retailers Can Fend Off FlokiBot Malware

The holiday shopping season is upon us, and with increased retail activity there is a corresponding increase in security threats. While many are concerned with online shopping, in-store retail ...Full Article

The New Cyber Security Minefield: A Proactive, Not Reactive, Approach

In 2016, the cyber landscape shifted dramatically – at least on the adversary side. In the last few months alone, we’ve seen hackers penetrate organizations from the DNC to ...Full Article

Cybersecurity Merger Combines Spycraft, Data

Aiming to augment its virtualized platform for cyber defense with what it calls an "intelligence-led approach" to cyber security, FireEye Inc. has completed its acquisition of privately-held iSight Partners, ...Full Article

IronNet, Founded by Ex-NSA Boss, Gains Funding

A cybersecurity startup with a wealth of insider knowledge and a plan to leverage high-performance computing along with advanced visualization techniques has attracted the attention of well-known investors. IronNet ...Full Article

What Will We Do About the Cybersecurity Pearl Harbor?

When I first started to equate the massive and consequential breaches suffered during the recent past with multiple Pearl Harbors, a few people thought I was over dramatic and ...Full Article

Data Theft: It’s Not the Only Danger Hackers Wreak

By manipulating or changing data, hackers can alter medical or financial records and put enterprises -- or even lives -- in danger. Tools like threat modeling allay these concerns, ...Full Article

Data Surveillance: Because “Data is Where the Money Is”

Infamous felon Willie Sutton robbed his first bank in 1927 and went on to make illegitimate withdrawals of millions of dollars from some dozens of banks over two decades. Sutton ...Full Article
Page 4 of 7« First...23456...Last »
EnterpriseAI