Newsfeed Archive
News & Highlights
(Source: TechTarget) In this Q&A, Justin Somaini, CSO at SAP, talks about how the enterprise softwaregiant uses machine learning for security. Specifically, he describes the differences between supervised and unsupervised algorithms
Read More
News & Highlights
(Source: ChannelLife Australia) The agreement will see Family Zone’s mobile filtering technology pre-loaded onto Alcatel smart devices sold in Australia and New Zealand (A/NZ). The deal is set to
Read More
News & Highlights
(Source: Investor’s Business Daily) … technology is unlikely to materially depress appliance consumption near-term, especially as security complexity increases with data center fragmentation,” she wrote. “We think firewalls could
Read More
News & Highlights
(Source: The Register) Microsoft coordinated a bunch of announcements at the Open Compute Project summit this week, centred around its SONiC open switch software platform. Microsoft … As they are created
Read More
News & Highlights
(Source: ETTelecom.com) The partnership comes at a time when companies are ramping up their cybersecurity capabilities after a wave of attacks on high-profile companies pointed to securityflaws. BlackBerry has focused
Read More
News & Highlights
(Source: TechNative) Security software often can’t detect it, but it costs you in several ways. Unauthorized mining can slow down your computers. Since computers performing active tasks consume more energy than
Read More
News & Highlights
(Source: iTnews) The Digital Transformation Agency will include a liveness detection mechanism in its Govpass identity platform to prevent the creation of fraudulent digital identities. The agency today asked
Read More
News & Highlights
(Source: i-HLS – Israel Homeland Security) With the overwhelming amount of data that has to be reviewed during border security checks, as well as limited budgets and resources in governments, the
Read More
News & Highlights
(Source: Techaeris) Brute-forcing involves software that guesses all your possible passwords until it comes up with one — the same technology often used by wallet recovery services. Hackers can also phone-port
Read More
News & Highlights
(Source: ISBuzz News) Technology based on a software defined perimeter (SDP), originally created by the Department of Defense, is designed to protect against these types of intrusions. The premise is that
Read More