6 Steps for Applying Data Science to Security

Security practitioners are being told that they have to get smarter about how they use data. The problem is that many data scientists are lost in their world of math and algorithms and don’t always explain the value they bring from a business perspective. Dr. Kenneth Sanford, analytics architect and sales engineering lead at Dataiku,…

Compliance is Not Synonymous With Security

While the upcoming GDPR compliance deadline will mark an unprecedented milestone in security, it should also serve as a crucial reminder that compliance does not equal security.  Along with the clear benefits to be gained from upholding the standards enforced by GDPR, PCI DSS, HIPAA, and other regulatory bodies often comes a shift toward a…

Can AI help bridge the IT security skills gap?

Host Steve Ragan reports from the show floor at RSA 2018, taking with Oliver Tavakoli, CTO at Vectra Networks, and author of the Thinking Security blog on CSOonline.com, about the types of IT security work that can be off-loaded to artificial intelligence systems.

EU Data Protection May Trigger Global Ripple Effect

The EU’s new data protection rules that enter into force later this month are having an impact around the world as firms, including in the United States and China, move to comply. While all firms globally are required to comply with the provisions of the General Data Protection Regulation (GDPR) when it comes to the data of…

Millennials, Women May Bridge Cyber Talent Gap

Younger generations, particularly women, could be the answer to a cybersecurity skill shortage expected to reach 1.8 million unfilled roles by 2020. A survey of millennials and post-millennials in the US gives some optimism about the cybersecurity talent gap, which seems doomed to worsen due to perception challenges about industry careers, poor access to early…

Rogue One — the best cybersecurity videotraining

Last year we analyzed an incident depicted in Star Wars: Episode IV. However, we got the feeling even back then that the security failures that led to the destruction of the Death Star were only the tip of the iceberg. The Empire’s problems with information systems security are clearly of a more galactic nature. Fortunately, researchers from Lucasfilm…

PROTECTING YOUR PRIVACY – Part 2: How to Maximize Your Privacy on Social Media and in Your Browser

In the last post we highlighted the privacy risks associated with using popular social networking sites and browsers. You might not appreciate just how much of your personal data is being accessed by advertisers and other third parties via your social media accounts and internet browsing. Similarly, your privacy settings may have changed significantly since…

Unsurprisingly, most won’t be ready for GDPR on 25th May

With less than a month until the GDPR comes into force, many companies will not be ready when it takes effect on May 25th, 2018. 62% of IT Decision Makers (ITDMs) surveyed describe themselves as ‘confident’ in the build-up, with 1 in 5 (18%) saying they are nervous, according to WinMagic. Only half (51%) of companies say they have…

Global AI business value to reach $1.2 trillion in 2018

Global business value derived from artificial intelligence (AI) is projected to total $1.2 trillion in 2018, an increase of 70 percent from 2017, according to Gartner. AI-derived business value is forecast to reach $3.9 trillion in 2022. The Gartner AI-derived business value forecast assesses the total business value of AI across all the enterprise vertical sectors covered…