cyberattacks

The Result of Cyber Crime

By |August 23rd, 2017|News|Comments Off on The Result of Cyber Crime

Some might call it a silver lining. The cyber crime epidemic has created a new job growth spurt as the number of open positions over […]

The Need for Data Classification

By |August 14th, 2017|Access Insights, Featured, Taxonomy|Comments Off on The Need for Data Classification

Most data retained by organizations is not identified or classified. This can be costly for storage, as well as being potentially non-compliant.
Data classification is […]

Inside Data Breaches

By |August 7th, 2017|Access Insights, Featured|Comments Off on Inside Data Breaches

Data breaches spiked by 86 percent in 2016 with over 1.4 billion records being compromised. Hackers, cyber criminals and other malicious outsiders were responsible for just […]

AI to the Rescue

By |August 3rd, 2017|News, semantic, Technology|Comments Off on AI to the Rescue

Cyber security skills are in high demand. Enterprises are under constant attack from increasingly advanced adversaries. Maybe it is time to automate? This interesting […]

Cyber Theft on the Rise

By |July 18th, 2017|News, Technology|Comments Off on Cyber Theft on the Rise

A new form of cyberattack is enabling its perpetrators to conduct espionage and steal data by using readily available software tools. This eliminates the […]

Latest Attempt in Cyber Warfare

By |June 30th, 2017|News|Comments Off on Latest Attempt in Cyber Warfare

Many major firms, airports and government departments in Ukraine have been struck by a massive cyber attack which spread across Europe this week. This interesting […]

Thieves Are Knocking at the Door

By |May 17th, 2017|News|Comments Off on Thieves Are Knocking at the Door

Theft is on the rise. A few months ago Yahoo revealed they had been hacked in 2014 and over 500 million accounts were the victims […]

Machine Learning and Security

By |May 16th, 2017|News|Comments Off on Machine Learning and Security

Machine learning contributes to many other technologies, e.g. fraud detection, search engines, etc. By automatically discovering patterns that lead to insights and creating predictive models that […]