A new research initiative from the US and Pakistan has developed a machine learning-based method for identifying websites that are resistant to adblocking and other privacy-preserving...
What are VPN gateways for? Does this class of solutions have a future? What parameters should be considered when protecting communication channels? Many organizations are experiencing...
Mark Gazit is the CEO of ThetaRay, a cybersecurity and big data analytics company that provides a platform for detection of unknown threat and risks to...
Researchers at the University of Technology Sydney (UTS) and TMOS, which is an Australian Council Centre of Excellence, have developed a new technology that could be...
Researchers from the National University of Singapore have concluded that the more explainable AI becomes, the easier it will become to circumvent vital privacy features in...
A new research paper from Germany discloses that NVIDIA has confirmed a hardware vulnerability that allows an attacker to gain privileged control of code execution for...
Researchers in the US have developed an adversarial attack against the ability of machine learning systems to correctly interpret what they see – including mission-critical items...
Lewie Dunsworth, is the CEO of Nuspire a leading managed security services provider (MSSP) founded over 20 years ago to revolutionize the cybersecurity experience by taking an...
Researchers from China have used the ‘black box' nature of neural networks to devise a novel method for malicious botnets to communicate with their Command and...
Researchers from Israel have developed a neural network capable of generating ‘master' faces – facial images that are each capable of impersonating multiple IDs. The work...
Cyber Threat Intelligence: What is it? Many of us are familiar with Cyber Threats and Intelligence concepts, but how these concepts are related is a topic...
Researchers from India have proposed a biometric system for using teeth as an authentication token for secure systems on mobile devices. Called DeepTeeth, the system overcomes...
Vulnerability management is a combination of processes and products aimed at maintaining an inventory of an organization’s digital infrastructure, probing it for vulnerabilities, and remediating the...
Researchers in Switzerland and the US have devised a new machine learning approach to the detection of website advertising material that's based on the way such...
Is the use of a web application firewall (WAF) a mandatory standard for securing web resources, or is it an important but optional layer of protection?...