The SecOps framework bridges the gap between an organization’s security and operation teams to improve infrastructure and information security. The new wave of cyberattacks in this...
Conversations around AI often include its role in cybersecurity prevention. AI is a powerful, indispensable tool in fighting cyber threats, but it can also comb through...
Data sets are the foundation for AI. Data allows AI to make decisions and analyze trends because they have numerous data points to reference for deductive...
Virtually every industry in the business environment is investing in or at least considering making investments in artificial intelligence (AI), including machine learning (ML), one of...
A lot of people say threat intelligence (TI) tastes good, but few understand how to cook it. There are even fewer of those who know which...
AI has proven itself to be a value-adding technology across the global economy. As businesses found themselves scrambling to adapt to current events over the last...
New research from Canada offers a possible method by which attackers could steal the fruits of expensive machine learning frameworks, even when the only access to...
Researchers from France have devised a method for identifying newly-registered domains that are likely to be used in a ‘hit and run’ fashion by high-volume email...
Two recent research papers from the US and China have proposed a novel solution for teeth-based authentication: just grind or bite your teeth a bit, and...
A new paper from Israel has proposed an authentication scheme based on a user’s aesthetic preferences, wherein the user calibrates the system one time by rating...
by David Ryan, Vice President of Sales, Cynamics Massive amounts of data are being generated daily; by some accounts, a staggering 2.5 quintillion bytes of data...
A joint academic research project from the United States has developed a method to foil CAPTCHA* tests, reportedly outperforming similar state-of-the-art machine learning solutions by using...
By Dr. Aviv Yehezkel, co-founder and CTO, Cynamics From hospitals to schools to meat packing plants, no industry is insignificant to ransomware attackers. Ransomware will cost...
Attacking image recognition systems with carefully-crafted adversarial images has been considered an amusing but trivial proof-of-concept over the last five years. However, new research from Australia...
Researchers have developed a method to copy the characteristics of a victim’s web browser using browser fingerprinting techniques, and thereafter ‘impersonate’ the victim. The technique has...