People are becoming more cyber savvy

The number of people who are concerned about their security and are ready to protect themselves against cyberthreats has increased in the second half of 2016, Kaspersky Lab’s index has revealed. The Kaspersky Cybersecurity Index — a set of indicators that allow the evaluation of the level of risk for internet users worldwide. Kaspersky Cybersecurity Index users can now view the …
<Read more here>

How do you protect yourself and your data against an insider threat?

When most people think of spies, their minds will likely wander to the 007 franchise. The world of the spy seems glamorous, exciting and in reality, very far removed from our everyday lives. However, individuals can easily syphon off sensitive corporate information and pass it to unauthorized third-parties. Systems can also be infiltrated by those who wish to do your business harm …
<Read more here>

How AI is transforming the future of fintech

At 13:07 on April 23rd, 2013, the Associated Press tweeted: “Breaking: Two Explosions in the White House and Barack Obama is injured.” At the time of the tweet, AP’s account had around two million followers. The post was favourited, retweeted, and spread. At 13:13, AP confirmed the tweet was fake. The target was never the president or the White House; it was the financial markets …
<Read more here>

Brands see visual intelligence as key part of AI strategy

Deep learning enables incredible feats of machine vision, such as classifying image subjects at human parity and dynamically generating completely new imagery. Brands have quickly recognized this technology as a commercial asset. Ever since neural networks began their renewed renaissance in 2012, computer vision has been a ripe field of study and innovation for …
<Read more here>

Homeland Security’s cyber tool finds huge amount of ‘shadow IT’ in agencies

New cybersecurity tools being deployed across the U.S. government found huge numbers of uncatalogued and unmanaged computer devices connected to federal networks — a phenomenon known as “shadow IT” — necessitating urgent modifications to many hundreds of millions of dollars’ worth of contracts …
<Read more here>

Quote of the Week

“Companies spend millions of dollars on firewalls, encryption and secure access devices, and it’s money wasted; none of these measures address the weakest link in the security chain.”
~ Kevin Mitnick (Former Hacker)