We live in a world where everything is being automated – from the “smart” gadgets in your home to, eventually, the self-driving car that takes you to work. Now and in the future, it will be difficult to find something that is not suited to automation.
While cybercriminals create new malware strains or look for software vulnerabilities to exploit, other criminal minds happily rely on an old, yet effective, trick: phishing scams. Such scams persist because people still fall for fraudulent email that asks recipients to reveal personal information or download an attachment containing malware.
Did you know that learning how to use an application is a two-way process? In fact, your applications learn something new about you after every interaction. They take note of your frequently visited sites and other data points to make your tasks easier so you can avoid repetitive work.
As George Box noted several decades ago, “All Models are essentially wrong, but some are useful”. The work of statistical analysis, and its modern day derivatives of Machine Learning and Deep Learning, continue to be bold attempts at capturing what are essentially complex activities into a much simpler set of equations, even if those equations themselves often […]
Movies have always created powerful mystique about artificial intelligence. For example, 2001: A Space Odyssey had the computer, Hal 9000, that recognized astronauts, spoke to them, and even locked the door to prevent an astronaut from entering the spacecraft.
What recent tech fads has your SMB dismissed as silly? 3D printing, internet of things…Pokémon GO? Juvenile as they may seem, these trends helped a lot of businesses make money. Navigating them may seem like a lost cause, but with the right know-how, you can earn profits by exploiting current tech trends.
Technological advancements have a tremendous effect on the healthcare industry. Something called machine learning is the first step toward artificial intelligence (AI) and it’s already streamlining service delivery for those in the medical profession.
There is a recurring theme at Black Hat every year: security researchers come together and show the world how to hack into systems and things. This year was no exception. The sheer size of the cyber-attack surface becomes more daunting by the day. Networks now connect data centers and on-premise hardware to private and public […]
We are a long way away from the day when all of InfoSec can run autonomously using machine learning (ML). We, humans, are still the most advanced component in the InfoSec chain, and we will be for some time. We have the experience, analytic skills, and collaboration skills that just aren’t there yet with ML. […]