Tag: Security

The Cyber Agility Framework: UTSA’s Cybersecurity Solution

Researchers at the University of Texas at San Antonio (UTSA) developed the first framework to score the agility of cyber attackers and defenders. The cyber agility framework was created to detect and respond to escalating cyber attacks. For over a...

Read Article

Artificial Intelligence Is Learning How To Outsmart Hackers

Adversarial attacks are subtly altered images, objects or sounds that fool AI and trick humans. For example, an image of a perfectly described 3D printed turtle looked like a rifle to the AI. Additionally, a 3D printed baseball was seen...

Read Article

Top 3 Small Business Challenges in IT

The Morning Drive Podcast Episode 8 transcribed by our app TranscribeMeow. Check it out in the iOS App Store. Welcome to the Morning Drive podcast. I’m your host Rey Ortega, the CEO, and founder of Grata Software where we partner...

Read Article

Dubai Introduces Smart Cameras That Use AI To Measure Happiness

In Dubai, highly accurate smart cameras have been introduced for the purpose of measuring customer satisfaction using AI technology. Four Customer Happiness Centers in Dubai have implemented the technology in order to learn how to restore customer happiness levels if...

Read Article

Germany to Restrict Facebook’s Data Gathering Activities

In the wake of Facebook's Cambridge Analytica scandal, Germany ruled on Thursday that Facebook needs to end their data collection practices. They say that Facebook abused its market dominance to gather information about users without their consent. Germany is known...

Read Article

Quarantine Cyber Attackers With Artificial Intelligence

MU researchers have developed an artificial intelligence that can quarantine cyber attackers. The technology can continuously give the cyber attacker false hope that they are making progress, when in reality, none is being made. The system called 'defense by pretense'...

Read Article

Six Best Practices To Improve AWS Security

I found an interesting article on Cloud Computing that lists and describes six best practices for increasing AWS security. Writer Louis Columbus focuses on securing IaaS using the Zero Trust Privilege strategy. The strategy utilizes a "never trust, always verify, enforce least...

Read Article

UK Police Considers AI To Help With Crime Detection and Prevention

In January 2018, Lancashire police started to implement Amazon Alexa as a tool to help with crime detection and prevention. The technology also improved police efficiency and speed. The application allows any user to verbally report crimes though Alexa. Users may...

Read Article

Google Plus Data Breach Impacts 52.3 Million Users

Two months ago, Google stated that they discovered a software glitch that exposed Google Plus user information of up to 500,000 customers between 2015 and 2018. After the "bug" was fixed, investigations did not show any signs of misuse by...

Read Article

In The News: How Cloud Implementation Is Bringing Benefits To Developers

While exploring Cloud Computing News, one of my favorite websites for news and insights in cloud technology, I discovered an article written by Jeff Keyes. It talks about the value of cloud adoption and the aspects that make it easier...

Read Article