Security of the data and algorithms and results of artificial intelligence takes new methods. At OODAloop.com Matt Devost provides a framework for improving the security and reducing the risk of problems from your AI deployment in a post titled: Securing AI – Four Areas to Focus on Right Now His approach: Build a strategy informed by four key components: Secure your AI … [Read more...] about There Are Ways To Improve The Security of Your Artificial Intelligence Solutions
Cybersecurity Is Not Just About The Tech
|Cybersecurity may well be the most important function in the modern world. Without it, nothing else can be trusted, in any sector of the economy.|
|Cyber Security is far more than just protecting data. Security is about protecting the functionality of IT. It involves confidentiality, availability and integrity of resources. This higher order approach to cyber security requires vision, leadership, and actions in dimensions of people, process and technology.|
|We also need to draw your attention to the higher order concept of Cyber War. This is, unfortunately, something all technologists should be familiar with now. The most critical piece to read on that topic now is Now That You Are A Soldier In The Cyber War You Must Know Your Cognitive Biases followed by: Main Street Cybersecurity: Can Email Be Safe? and Time for Transformational Cybersecurity!|
Stay In The Loop: Sign Up To Receive Daily, Weekly or Monthly Newsletters including the Cybersecurity and Cyerwar Weeklys
When it it time to research the great providers of Cybersecurity Solutions, kick off your search in the CTOvision Disruptive Technology Finder. Pay particular attention to the sections on Cybersecurity, CASB, Cyber Threat Intelligence, and VPN.
|For help putting all this information into context for your business, consider tapping into Crucial Point's CTO-as-a-Service or Technology Due Diligence offerings, both are ways to quickly leverage the technical talents of experienced enterprise technology professionals.|
Read Nicole Martin take a look at different aspects of a data breach on Forbes : We hear about them all the time, another company getting its data breached, another credit card scanner hacked, but do you really know what a data breach is exactly and what it means if it happens to you? Here’s a quick rundown of data breaches and what you should know. A data breach occurs when … [Read more...] about What Is A Data Breach?
Devices offering support to Thunderbolt peripheral and charging connectors are vulnerable to hacking, according to newly published research. Thunderbolt is a peripheral standard developed by Apple Inc. and Intel Corp. that was first seen on Apple computers with Thunderbolt 1 and 2 and then later in other devices through Thunderbolt 3, which is compatible with USB-C ports. … [Read more...] about Vulnerabilities leave devices supporting Thunderbolt open to hacking
Researchers from Google investigating the scope and impact of the Spectre attack have published a paper asserting that Spectre-like vulnerabilities are likely to be a continued feature of processors and, further, that software-based techniques for protecting against them will impose a high-performance cost. And whatever the cost, the researchers continue, the software will be … [Read more...] about Google: Software is never going to be able to fix Spectre-type bugs
Sucuri researchers discovered that the campaign sent out malicious emails masquerading as a confirmation for a recent transaction. Digital attackers deployed this disguise in the hopes that employees at the targeted bank would click on a link to a malicious PHP file out of alarm. That file was responsible for loading a fake 404 error page for visitors that had specifically … [Read more...] about Phishing Campaign Uses Fake Google reCAPTCHA to Distribute Malware