Vanson Bourne surveyed 1,300 IT decision makers from organizations using public cloud Infrastructure as a Service (IaaS) from the Americas, Europe, Middle East and Africa (EMEA), and from Asia Pacific (APAC). Background public cloud use Respondents’ use of public cloud is on the rise, as is their sophistication in working within the cloud. On average, organizations have nearly 40 percent of their infrastructure in the public cloud today, with the expectation to increase this to … More →

Dr. Thirumurugan S V Mahadhevan, is a medical consultant and healthcare solutions manager at ALTEM TECHNOLOGIES. With a background in dentistry, and masters degrees in pharmaceutical ...

API Behavioral Security: Detecting and blocking attacks targeting API infrastructures Elastic Beam unveiled its flagship solution, API Behavioral Security (ABS), the first AI-powered software platform able to detect and block cyberattacks that target APIs to compromise corporate data and systems – in public clouds, hybrid clouds, or on premise. ABS requires no predefined policies, security rules, or attack signatures, and can stop attacks that are new and constantly changing. Its API activity reporting simplifies forensic … More →

Scientists in China have taken the next step in creating an internet that can’t be hacked or compromised. The future of data transfer is called quantum networking and it relies on a complex concept that takes the ‘signal’ out of sending data. Hackers can’t intercept or steal data that never travels, so there’s no signal — the source and destination, in quantum networking, are one in the same. With the new quantum internet, instead of sending information, you’ll create pairs of photons that mirror one another. This is called quantum entanglement. You’ll keep one of the photons, send someone else……

A conservative data firm is responsible for revealing sensitive information pertaining to nearly 200 million registered voters.

Google Inc. is upping its fight against the spread of extremist content on its YouTube service by rolling out new artificial intelligence services in conjunction with additional human oversight to take down extremist content when it appears. The advanced AI platform will use ongoing machine learning research that in theory is able to automatically flag and […]
The post Google to use AI and machine learning to tackle extremist content on YouTube appeared first on SiliconANGLE.

In a new study, researchers from the Max Planck Institute in Erlangen, demonstrate ground-based measurements of quantum states sent by a laser aboard a satellite 38,000 kilometers above Earth. This is the first time that quantum states have been measured so carefully from so far away. Space to ground link setup A satellite-based quantum-based encryption network would provide an extremely secure way to encrypt data sent over long distances. Developing such a system in just … More →

As data plays an increasingly important role different organizations across the board, more companies are developing strategic initiatives around data products and offerings. Among these early majority companies is Intel Corp., which is a unique position to provide value all the way up and down the data stack, according to Melvin Greer, director of data […]
The post Intel pivots to become data company, works to solve federal data security challenges appeared first on SiliconANGLE.

Originally written by Nick Ismail on Information Age
The sheer scale and impact of the WannaCry ransomware worm attack that infected more than 300,000 computers worldwide and disrupted operations at hospitals, banks and schools across the globe is still fresh in people’s minds. Organisations targeted included the NHS, Nissan and Telefonica. It was reported that 47 NHS trusts experienced major problems at hospitals and
The post Expelling the security myth around refurbished IT hardware appeared first on Information Age - Insight and Analysis for IT Leaders.

If security is too big a question for us to answer, maybe it’s time to hand the responsibility over to the machines.

When hiring cyber security professionals, curiosity, reliability, and being a lifelong learner are as important as technical skill.

Security in the cloud is still a major concern for federal CIOs, but it’s not the leading concern it once was, says Teresa Carlson, head of public sector for Amazon Web Services. Carlson, on a recent trip to Washington, D.C., met with several federal civilian agency CIOs and CISOs, and in their talks, she learned something that […]
The post Security no longer CIOs’ top concern in the cloud, AWS’s Carlson says appeared first on Fedscoop.

Cloud-based video management specialist Eagle Eye Networks expands its global reach by acquiring Panasonic's video surveillance solution.

Late last year, Bruce Schneier testified before the U.S. House Energy and Commerce committee asking them to consider imposing security regulations on the Internet of Things (IoT). Schneier argued that neither IoT buyers nor sellers care about a device’s security. Sellers are interested in quickly releasing inexpensive products to market, while buyers only care about getting cool gadgets for cheap. This unhealthy and unsecure IoT market results in incidents like the Mirai botnet, in which … More →

Absolute expands its self-healing endpoint security and compliance solutions for Android devices Absolute expands its support for Android to provide uncompromised visibility and control over Android tablets and smartphones — both on and off the corporate network — to help enterprises assess vulnerabilities, prioritize risks and proactively remediate. IT security professionals have a single cloud-based solution for visibility into any type of endpoint across the enterprise, including Windows, Mac, Android and Chromebooks. Radware launches new … More →

Originally written by Nick Ismail on Information Age
Everything that can be connected will be connected. That’s the somewhat dog-eared maxim for the future of tech. Currently, around 23 billion ‘things’ are connected to the world’s various communication networks and more are joining at breakneck speed. For consumers, these include everything from connected cars to toothbrushes. The general appetite for both novelty and
The post Managing the mobile and IoT tsunami appeared first on Information Age - Insight and Analysis for IT Leaders.

Yet more activity in the world of cybersecurity. Today Microsoft confirmed that it has acquired Hexadite, an Israeli startup that uses AI to identify and protect against attacks. We and others reported that this deal was in the works last month, for a price sources tell us is $100 million. The idea is to expand Microsoft’s existing security portfolio with an infusion of new technology… Read More

Originally written by Nick Ismail on Information Age
AI is 2017’s technology buzzword. It can turn doodles into palatable clip art and it’s definitely better than humans at chess, but it’s not all positivity. Many are worried that AI may be taking over jobs, replacing the human element in hundreds of industries. Even worse, stories of malicious AI running rampant seem to be gaining in
The post Why AI is set to fix human error appeared first on Information Age - Insight and Analysis for IT Leaders.

Originally written by Nick Ismail on Information Age
With UK voters set to hit the polls this week, public sector cybersecurity is being thrust firmly into the limelight. Amid speculation that it’s only a matter of time before a political party falls victim to a hack, the UK’s new NCSC (National Cyber Security Centre) has announced that attempts to compromise data and systems belonging
The post Cyber security priorities for political parties appeared first on Information Age - Insight and Analysis for IT Leaders.

Another day, another major round of funding for a security startup, underscoring just how active this area is right now, both in terms of business need and as an investment opportunity. Today, Illumio — a startup that provides data center and cloud security services by monitoring and protecting individual applications and processes within an enterprise network by segmenting them —… Read More