With a growing need to improve the security, efficiency and accuracy of passenger and baggage screening, the Department of Homeland Security (DHS) Small Business Innovation Research (SBIR) Program is working with a small business to advance explosive detection equipment. Synthetik Applied Technologies was awarded funding to develop machine learning training data that simulates human travelers and baggage object models to support machine learning algorithms.
The shortage of skilled information security practitioners continues to grow around the globe. Based on 200 IT executives and contributors who primarily serve in information or IT security roles, this new research found that in the United States, for organizations with at least 500 employees, the average number of open positions enterprises are trying to fill is 1,324. For the largest percentage of respondents in this survey, that number increased between 1 percent and 25 percent over the last year, although that increase is higher for large enterprises.
The U.S. Department of Energy (DOE) announced $37 million in funding for research and development in artificial intelligence and machine learning methods to handle data and operations at DOE scientific user facilities.
To address this current losing war with cyberattackers, the future of cybersecurity requires augmenting the current focus of “indicators of compromise” with “indicators of exposure & warning” in real-time. Where the measure would be to gauge the shift of incident management that would tilt on managing more incidents at warning stages than on compromise stages. It is imperative to build an AI engine to perform this very task as that would be the only way to perform in real-time, scale with the growing nature of cloud as well as to cover the evolving nature to attack scenarios.
Deloitte’s third edition of the “State of AI in the Enterprise” survey finds businesses are entering a new chapter in AI implementation where early adopters may have to work harder to preserve an edge over their industry peers.
Microsoft's Azure Security Center (ASC), which regularly searches for and researches for new attack vectors against Kubernetes workloads, revealed a new campaign that was observed recently targeting Kubeflow, a machine learning toolkit for Kubernetes.
Researchers at NIST have developed a mathematical formula that, computer simulations suggest, could help 5G and other wireless networks select and share communications frequencies about 5,000 times more efficiently than trial-and-error methods.
While it might be tempting to reduce face recognition to an inevitable Orwellian nightmare, its benefits cannot be realized unless we educate ourselves about how the technology really works, separate fact from fiction, and pass common sense regulation that set guidelines for use. Here are five popular misconceptions about face recognition and privacy to help set the record straight on this powerful, emerging technology.
This month in Security magazine, we explore how Corning's global security group ensured business continuity and employee safety during the global COVID-19 pandemic. Also, we highlight the global security team at Uber and their recent security programs and initiatives. Industry experts discuss travel safety programs, career hackers, working for terrible bosses, group attribution error and more.