Biometric security solutions and AI-powered fraud prevention technologies have, for several years now, been transforming the ways in which organizations protect their business, their customers, and...
A new machine learning technique could make it easier for penetration testers to find SQL injection exploits in web applications. Introduced in a recently published paper by researchers...
Government agencies need to pivot to better filter and monitor incoming threats and data with velocity, efficiency and optimization. The U.S. government is tasked with protecting...
Here’s what you need to know to protect federal employees and secure classified data. As the U.S. prepares for President-elect Biden’s administration, there will be a...
Gen. Lloyd Austin committed to conducting a review of defense cyber operations, if confirmed. President-elect Joseph Biden’s nominee for defense secretary told senators in a Tuesday...
The “second age” of quantum computing is poised to bring a wealth of new opportunities to the cybersecurity industry – but in order to take full...
5G will transform IT from the bottom-up—and that means changes for security. Driving down the road in a Tesla, you’re essentially sitting inside an edge compute...
Dr. Chase Cunningham, a recipient of Security magazine’s Most Influential People in Security, has joined Ericom as its Chief Strategy Officer. In this role, he will shape the company’s strategic...
It’s undeniable that Machine Learning (ML) is changing the game for securing cloud infrastructure. Security vendors have rapidly adopted ML as part of their solutions, and...
Recent Comments