Covering Scientific & Technical AI | Friday, January 31, 2025

IoT Security Adopts a Platform Approach

As is often the case, network security tools are just now beginning to keep catch up with vulnerable Internet of Things deployments, particularly leading edge industrial IoT infrastructure. With ...Full Article

Harnessing App Development With ‘Low-Code’ Platforms

One of the offshoots of the open source movement has been the gradual rise of "citizen application developers" operating on enterprise-grade "low-code" platforms. While the approach is seen as ...Full Article

U.S.: Cybersecurity Must Go Beyond Passwords

If indeed we are operating in a "digital economy," standard security measures such as passwords are no longer sufficient to shield the underlying IT infrastructure from sophisticated hackers, asserts ...Full Article

Wanted: IoT Interoperability, Security Specs

Yet another survey, this one by an Internet of Things standards group, emphasizes the need for interoperability and security standards as more devices are connected. Moreover, the survey of ...Full Article

Cyber Skills Gap Grows Along With Threats

A corporate job opening typically draws as many as 250 applicants with varying qualifications. In stark contrast, a new survey of the growing cyber security skills gap reveals that ...Full Article

Security News Ahead of RSA: Breach Worries Stop Digital Transformation

In advance of next week’s big RSA data security show in San Francisco, we’ve received a bevy of security product announcements from companies leveraging data analytics, AI, behavior analytics ...Full Article

Startup Targets Runtime Container Security

Promising stronger and faster security for application containers in production, a startup has unveiled a new continuous security approach based on adaptive behavioral learning. The approach is said to ...Full Article

Security Survey: The Botnets are Coming!

A new infrastructure vulnerability study confirms what became apparent late last year: botnets are exploiting inherent security weaknesses in Internet of Things (IoT) devices. The infrastructure security report released ...Full Article

“Why Don’t My Security Tools Work?” A Unified Cyber Defense Battle Plan

Threat actors are getting better, faster, and more efficient at compromising networks, taking only minutes or less to breach systems. Unfortunately, organizations are taking weeks, if not longer, to ...Full Article

Google Expands Cloud Encryption Options

Responding to growing concerns about cloud security and data governance across different platforms, Google is expanding its cloud security options with the release of encryption key management service. The ...Full Article
Page 26 of 34« First...1020...2425262728...Last »
AIwire