Tag: Security

The Cyber Agility Framework: UTSA Cybersecurity Solution

Researchers at the University of Texas at San Antonio (UTSA) developed the first framework to score the agility of cyber attackers and defenders. The cyber agility framework was created to detect and respond to escalating cyber attacks and cybersecurity issues....

Read Article

Artificial Intelligence Is Learning How To Outsmart Hackers

Adversarial attacks are subtly altered images, objects or sounds that fool AI and trick humans. For example, an image of a perfectly described 3D printed turtle looked like a rifle to the AI. Additionally, the artificial intelligence saw a 3D...

Read Article

Top 3 Small Business Challenges in IT

The Morning Drive Podcast Episode 8 transcribed by our app TranscribeMeow. Check it out in the iOS App Store. Welcome to the Morning Drive podcast. I’m your host Rey Ortega, the CEO, and founder of Welcome to the Morning Drive...

Read Article

Dubai Introduces Smart Camera That Uses AI To Measure Happiness

Dubai, has introduced a highly accurate smart camera with the purpose of measuring customer satisfaction using AI technology. Four Customer Happiness Centers in Dubai have implemented the technology. They implemented this technology to learn how to restore customer happiness levels...

Read Article

Germany to Restrict Facebook’s Data Gathering Activities

In the wake of Facebook's Cambridge Analytica scandal, Germany ruled that Facebook needs to end their data collection practices. They say that Facebook abused its market dominance to gather information about users without their consent. Facebook will need better data...

Read Article

Quarantine Cyber Attackers With Artificial Intelligence

MU researchers have developed an artificial intelligence that can quarantine cyber attackers. The cyber attacks have false hope that they are making progress. This is because the technology acts as if all is good when it is sending distress messages....

Read Article

Six Best Practices To Improve AWS Security

I found an interesting article on Cloud Computing that lists and describes six best practices for increasing AWS security. Writer Louis Columbus focuses on securing IaaS using the Zero Trust Privilege strategy. The strategy utilizes a "never trust, always verify, enforce least...

Read Article

UK Police Considers AI To Help With Crime Detection and Prevention

In January 2018, Lancashire police started to implement Amazon Alexa as a tool to help with crime prevention and detection. The technology also improved police efficiency and speed. The application allows any user to verbally report crimes though Alexa. Users may...

Read Article

Google Plus Data Breach Impacts 52.3 Million Users

Two months ago, Google stated that they discovered a software glitch in their system that posed a possible risk. Consequently, exposing 500,000 user's information in a data breach from 2015 to 2018. After Google fixed the "bug", there were no...

Read Article

In The News: How Cloud Implementation Is Bringing Benefits To Developers

Previously, while exploring Cloud Computing News, one of my favorite websites for news and insights in cloud technology, I discovered an article written by Jeff Keyes. It talks about the value of cloud adoption and the aspects that make it...

Read Article