- RSS Channel Showcase 9068952
- RSS Channel Showcase 2631000
- RSS Channel Showcase 7976878
- RSS Channel Showcase 8015176
Articles on this Page
- 09/18/16--22:42: _Utilising Machine L...
- 09/25/16--20:57: _Do Passwords Have A...
- 10/31/16--21:16: _How To Digitally De...
- 12/18/16--20:54: _Unstructured Data
- 03/14/17--19:19: _The Future Of Organ...
- 06/09/17--20:58: _AI – The Future Of ...
- 06/19/17--23:59: _Mixed Reality Of Sm...
- 07/02/17--19:27: _Connectivity At The...
- 07/25/17--18:00: _The Current State o...
- 08/09/17--18:00: _Threat Protection F...
- 08/31/17--18:00: _Machine Learning Po...
- 09/11/17--18:00: _Cloud Data Protection
- 09/13/17--18:00: _Tech To Counter Ris...
- 12/14/17--00:16: _Secret Sauce To Eff...
- 02/19/18--19:34: _New IoT Botnet Ente...
- 03/10/18--03:34: _Answering Important...
- 09/18/16--22:42: Utilising Machine Learning To Combat IoT Security Nightmare
- 09/25/16--20:57: Do Passwords Have A Future?
- 10/31/16--21:16: How To Digitally Detox On Vacation
- 12/18/16--20:54: Unstructured Data
- 03/14/17--19:19: The Future Of Organizational Security
- 06/09/17--20:58: AI – The Future Of Cybersecurity?
- 06/19/17--23:59: Mixed Reality Of Smart Home Technology
- 07/02/17--19:27: Connectivity At The Expense Of Safety
- 07/25/17--18:00: The Current State of Advanced Malware Protection
- 08/09/17--18:00: Threat Protection For Cloud
- 08/31/17--18:00: Machine Learning Powering IoT Security
- 09/11/17--18:00: Cloud Data Protection
- 09/13/17--18:00: Tech To Counter Rising Severity Of Cyberattacks
- 12/14/17--00:16: Secret Sauce To Effective Machine Learning
- 02/19/18--19:34: New IoT Botnet Enters The Grand Theft Auto
- 03/10/18--03:34: Answering Important IoT Questions
There can be no doubt: inanimate objects are getting ‘smarter’. First there were smartphones, mobile telephones designed to cram in features such as web browsing, email and camera technology. These features have since become so standardised that any phone that does not encompass this level of connectivity is referred to as a ‘dumbphone’. Then there were smart televisions, allowing full access to internet services and with enough processing power to compete with traditional set-top boxes.
Organizations are constantly looking into newer methods and technologies to make their network more secure mainly because they are concerned about all of the hacks occurring. Using passwords only for applications with secure data is just not safe enough anymore.
Many years ago when you were on vacation, before Facebook, Instagram and Twitter were invented (assuming you were an adult then), you had a great time, right? You weren’t “connected,” because there was no social media to be connected with.
While data protection has been given top priority since the starting, it’s the structured data that has gained fatherly love from its owners. The unstructured data has been out there floating in the various mediums, waiting to be picked up by someone who values it enough. It’s high time that proper strategies and software were employed to avoid potential theft of data from the company.
One decade ago, identity management as a concept and solution set was the strongest available for “limited” security at most organizations. Since then, that technology has become less desirable because of its single approach to handling tasks. The emergence of access governance, on the other hand, is like the younger, much bigger brother of identity management. The technology is more robust and much more adept at helping you monitor who is touching, changing and even manipulating your data.
More breaches, increasingly advanced threat actors, and higher stakes are going to require more advanced defenses and practices. AI and ML are a natural response to these ever increasing challenges.
The smarthome is fragmented with competing protocols and no link between them. The future will see consolidation, with central hubs playing the pivotal role of unifying and controlling the house.
To take the smart home security industry to the next level, it is imperative that clear standards are established across the industry, allowing for unification across all smart home technologies so disparate products can communicate seamlessly and—most importantly—securely with each other.
The current state of Advanced Malware Protection is poor. Many companies have been led to believe marketing hype, and are still being infected. The main reason is attacks are able to bypass security solutions fairly easily.
Even the most secure cloud providers only offers security OF the cloud. The user is responsible for security IN the cloud. As groups, roles, devices change, oversights open vulnerabilities that lead to outright hacks or DDOS.
Data security is critical for IoT to flourish as lack of consumer confidence can impede adoption. Machine Learning enables expedited threat detection, investigation, and remediation for safer and more robust IoT deployments.
Cloud Data Protection is just starting to ramp up as organisations move important data to the cloud and discover that it's not as well protected as their on-site data is.
Cybersecurity is a battle of machines. From hacked elections to destroyed businesses; we’ve only seen a glimpse of the future. Time is wasted securing people – machines are the real danger.
It is important to know where you are likely to be attacked from and, the corresponding attack vectors and attack surface. Blind to this information, and you are more likely to be a victim of cyberattack.
Security researchers from Radware have discovered a new botnet that uses the same vulnerabilities as Satori bots to infect IoT devices through the community of Grand Theft Auto players.
The main problem of the faster introduction of the Internet of Things is the lack of a common integrated approach ensuring the safety of devices.