For the past year, the buzz about artificial intelligence and machine learning has been overwhelming. But Ricardo Villadiego of Cyxtera sees promise in how these technologies can help organizations fight back against fraudsters.
What's the difference between artificial intelligence, machine learning, deep learning and neural networks? Don't trust vendors' marketing materials to help you find a workable, accurate definition, says Kris Lovejoy, CEO of the security firm BluVector.
Art Coviello, ex-CEO of RSA, is concerned about fraud trends and social media vulnerabilities. But he also is bullish on the opportunity for artificial intelligence and DevOps security to stop attacks before they cause harm.
When insider threat researcher Randy Trzeciak looks at artificial intelligence and machine learning, he sees the potential for technology to help organizations predict potentially dangerous insider behavior - not just respond to it.
Armed with stolen personal data, cybercriminals can easily bypass conventional identity authentication methods. So how can organizations strengthen authentication without harming customer experience? Shaked Vax of IBM Security shares insights.
If you browsed the latest security headlines, you'd probably think the majority of data breaches were related to hackers, political activists, malware or phishing. While the latter two hint at it, the truth is that nearly half of all data breaches can be traced back to insiders in some capacity.
The Yahoo breach - and the theft of unencrypted security questions and answers - is a reminder to use unique passwords and security questions, store them using a password safe and take advantage of two-factor authentication whenever it's available.
Dear customer: "The security and privacy of your systems are our priority." Cue a new breach notification, this time from Lightspeed POS, which sells a cloud-based point-of-sale product used by 38,000 organizations.
SentinelOne is taking a marketing gamble by offering to reimburse customers who suffer a ransomware infection if the security firm can't remediate affected systems. But let's take a close look at what's actually on offer.
First the hackers came for our credit cards. Now they're taking control of our TVs. Witness the latest version of FLocker - for "frantic locker" - which is designed to lock Android devices, including smart TVs.
"We never negotiate" might be the expectation whenever law enforcement or government agencies get targeted by criminals or even "cyberterrorists." But outside Hollywood, the reality too often turns out to be far less rigid.
Sometimes language barriers can be a good thing: Many malware-wielding cybercriminals have historically targeted users in North America and Europe over Japan, owing to linguistic challenges. But that's changing.
Here's why the acquisition of rival threat-intelligence firm iSight Partners by breach investigation heavyweight FireEye makes sense, and why market watchers predict that other stand-alone intelligence firms will soon get snapped up.
Reliable data specifying the number of people employed in the United States in cybersecurity field is hard to find. But one government survey shows a 5 percent increase among information security analysts in 2015.