If you’re concerned about the increased threat of cyberattacks by state-sponsored hackers and hacktivist groups in the current geopolitical atmosphere, you’re certainly justified. Criminal groups are emerging from the shadows and pledging their allegiance to Russia. They’re conducting reconnaissance attacks and coalescing into the roles they’ll play in the global cyberwar many see on the…

Led by Tiger Global and Alkeon, the latest funding round values the company at $1.5 billion. Veriff says that its video-first technology leverages more than 1,000 data points and an AI-powered decision engine that can analyze more than 10,000 variations of government-issued IDs from over 190 countries in 40 different languages. The company claims that…

Following the massive infusion of cash, investors are valuing the company at $8.3 billion. San Francisco, California-based Lacework was founded in 2015 by Mike Speiser (managing director of Sutter Hill Ventures) Sanjay Kalra (now founder and CEO at ShiftRight), and Vikram Kapoor (CTO). It was built on the principal that cloud security is fundamentally a…

Robotic Process Automation (RPA) is one of the key technologies fueling digital transformation. Ranked by industry experts as one of the fastest-growing enterprise software categories, RPA is helping businesses and their employees achieve the efficiency, accuracy and speed needed to compete and thrive. By approaching RPA automation projects and cybersecurity hand in hand, organizations can…

Organized crime is not limited to cybercrime, but cybercrime has become a major part of organized criminal activity. Europol sees this increasing – business transformation, the increasingly digital society, and the growth of remote working all provide new vulnerabilities and more opportunities for exploitation. “Critical infrastructures will continue to be targeted by cybercriminals in the…

Threat management, or cyber threat management, is a framework often used by cybersecurity professionals to manage the life cycle of a threat in an effort to identify and respond to it with speed and accuracy. The foundation of threat management is a seamless integration between people, process and technology to stay ahead of threats.

When it comes to protecting the growing infrastructure at Polaris Alpha, CISO Eric Schlesinger believes in a people-and-processes approach over a tools-based approach. But five years from now, those priorities will likely shift. “I believe that machine learning and AI are the future to security operations. An ‘artificial analyst’ can replace one or two full-time…

But a new report published by the SHERPA consortium – an EU project studying the impact of AI on ethics and human rights – finds that while human attackers have access to machine learning techniques, they currently focus most of their efforts on manipulating existing AI systems for malicious purposes instead of creating new attacks…