In the new world of ubiquitous connected devices and myriad cybersecurity alerts, artificial intelligence and machine learning can enable autonomous response - a boon to overworked security teams, says Darktrace's Mariana Pereira.
The enterprise has embraced the public cloud. But tension and misalignment between CloudOps and business stakeholders impedes your organization from achieving all that it can.
Moreover, customers expect speed, scale and business agility from the cloud. CloudOps require continuous governance of security,
Organizations are accepting that the network perimeter no longer serves as the "ultimate defense" and thus adapting zero-trust principles, including least privilege, based on the understanding that they may already have been compromised, says Darran Rolls of SailPoint.
Robotic process automation aims to use machine learning to create bots that automate high-volume, repeatable tasks. But as organizations tap RPA, they must ensure they take steps to maintain data security, says Deloitte's Ashish Sharma.
Cybersecurity has become a popular agenda item with the board. But, conveying the complexities of cyber risk management to senior executives and the corporate board isn't easy.
To communicate cyber risk effectively, you must find a common business language grounded in risks, opportunities and business impact. Save...
U.S. senators Mark Warner and Marco Rubio are urging social media firms to create policies and standards to combat the spread of "deepfake" videos, which they say pose a potential threat to American democracy.
Airports across the globe are increasingly leveraging facial recognition technology to verify and authenticate passengers. But some privacy advocates have raised concerns, especially in India, where several airports are ramping up facial recognition programs.
Join us as we first examine the current state of bot automation and the different attack modalities currently conducted through machine automation. We will dive into attacker tools, their infrastructure, and compromised credentials to demonstrate how they were used against a major retailer in a real-world attack. This...
Artificial intelligence technologies that provide surveillance capabilities can have upsides as well as downsides. Unfortunately, as developers and governments rush to experiment, security, privacy, data protection and liability questions remain unanswered.
Governments are rapidly adopting AI surveillance technology to advance political goals, according to a new report from the Carnegie Endowment for International Peace. While Chinese suppliers dominate, liberal democracies and authoritarian regimes alike are developing and procuring such technology.
Artificial intelligence is playing an important role in the fight against payment card fraud, says Gord Jamieson, senior director of Canada risk services at Visa. He'll offer a keynote presentation on the latest fraud trends at Information Security Media Group's Cybersecurity Summit in Toronto Sept 24-25.
No SOC has the resources or time to review and manage all its alerts manually. Overwhelmed security teams often ignore "low value" notifications for the sake of efficiency. This forced adjustment in workflow allows potential security threats to slip through the cracks.
In today's world of automation and AI, it's...
As cybercriminals adopt new methods to steal and manipulate victims' identities, the U.S. financial services industry needs to rethink how to protect customers' information using emerging technologies, such as artificial intelligence, security experts testified at a recent U.S. House committee hearing.