AI could be the key to stopping cybercriminals hijacking IoT devices to attack businesses, new research has claimed.New research from Aruba has found that AI can help boost the usefulness and effectiveness of security protection within businesses as more and more IoT products enter the workplace.A quarter of the 4,000 security and IT professionals from across the world surveyed … [Read more...] about AI could be the secret weapon of the security industry
Securities industry automation
Will AI security completely take over from humans and provide a sci-fi like experience to defend against advanced cyber-attacks, or is it still some way behind and should we instead look at the advancements made in machine learning to boost our defences in the near future?These questions and more have been a hot discussion point in the cyber security industry recently, with … [Read more...] about Is AI being over-hyped in the security industry?
LONDON--(BUSINESS WIRE)--May 18, 2018--’s latest market research report on the provides an analysis of the most important trends expected to impact the market outlook from 2018-2022.This press release features multimedia. View the full release here: https://www.businesswire.com/news/home/20180518005620/en/Technavio has published a new market research report on the … [Read more...] about Industrial Automation and Instrumentation Market in India
With the Equifax breach, state-sponsored attacks, Russian manipulation of social media, Wannacry, and more phishing scams that happened in 2017, what will this year bring as far as cyber-attacks are concerned? Data hacks will be on a colossal scale with smarter attackers on the prowl, and security teams and budgets won’t be able to keep up. But there’s an upside. We … [Read more...] about Cyber security tech to expect in 2018
It’s every security professional’s nightmare, come to life: A security breach that starts with a phishing email. After all, there’s no firewall in the world that can prevent an end user from clicking on the latest ploy; losing their cell phone, complete with corporate email addresses; or sending proprietary data using the public Internet.How, then, can … [Read more...] about How to Adopt a Human-Centric Approach to Security