Research from the 2022 Ponemon Institute Cost of Insider Threats Global Report says the time to contain the Insider Threat Incident has increased from 77 days to 85 days in a couple of years. The cost of insider threat has doubled within the last 4 years…
In 2022’s first episode of Humans and Machines , I had the pleasure of reviewing the state of CyberSecurity AI research with Dr. Nur Zincir-Heywood from Dalhousie University, Canada. I could think of no one better than Nur to help us list the top three…
On 6 January the U.S. Department of Justice announced that Xiang Haitao, a Chinese national formerly residing in Chesterfield, Missouri, pleaded guilty to conspiracy to commit economic espionage . According to court documents, Xiang conspired to steal…
What do agriculture, autonomous vehicles, and toilets all have in common? They all can use internet of things (IoT) devices to enhance their performance! IoT has the potential to transform industries and improve product offerings worldwide. IoT in the…
The Dialog and the Dance
In our latest episode of Humans and Machines podcast, titled UX and Visualizations: Dialog AND Dance , I had such a great time chatting with Noah Iliinsky , the Principal UX Architect at Collibra and well-known speaker and author…
Despite all the buzz around Artificial Intelligence (AI) and Machine Learning (ML), it’s not a silver bullet. As with all tools, AI has areas that it struggles with, but also use cases that are uniquely amenable to AI-treatment. One such area is insider…
Confused about artificial intelligence (AI)? Tired of the buzzwords? Join the club! AI has been portrayed as everything from the salvation of humankind to the end of human civilization. Thankfully, there is a way to separate fact from fiction so we can…
In general, technology is neutral; it is how a given technology is used that makes it good or bad. This is certainly true for Security AI. Artificial Intelligence can be used for good – by defenders to detect APT, zero day attacks and insider threats…
Sometimes the marketing buzz in the area of Security and AI just gets too much. Do you remember when AI and ML was just called “Math”? If so, you might also remember that time when “Big Data” was just called “Data”. Underneath all the industry buzzwords…
Ransomware is making headlines everywhere. From the energy industry ( Colonial Pipeline’s ransom payment of $4.4M ) to the food industry ( JBS Foods’ ransom payment of $11M ), mounting data suggests this insidious trend may be getting out of control.…
I love the following quote from my conversation with Julian Cerruti : “You can think of these robots as … servers on wheels!” He then proceeds to describes the situation with cybersecurity in the space of robots and robotic AI. And Julian would know;…
As CyberRes , we promote the value of solutions that can adapt in near real-time to defend and respond to growing cyberattacks. In essence, there should be a feedback loop to humans defending the organization that leverages analytics to continually analyze…
Blockchain has become a household buzzword synonymous with cryptocurrency with the launch of Bitcoin over ten years ago. Originally designed to function as an open, distributed, public and secure ledger for bitcoin and other cryptocurrencies, blockchain…
Everything about quantum computing sounds like science fiction. Quantum computers work by seemingly able to cheat all we were taught about computers and how binary they are; this new form of computing means all standard encryption will suddenly become…
Although just a fictional character, Sherlock Holmes may be the most famous detective around the world. Holmes is known for his proficiency with observation, deduction, behavior analysis, and logical reasoning . Dr. Watson is Holmes’s best friend and…
Sometimes you just need to follow the money.
Despite the global pandemic, investments in high tech startups are greater than ever. Further, the intersection of cybersecurity and artificial intelligence is among the fastest growing and most heavily invested…
The areas of law and artificial intelligence might feel like worlds that never connect, but that’s no longer true. In fact, growing concerns around data privacy, ethical and responsible AI, and data and model bias, have made the intersection of law and…
One of the great controversial questions of our time is if AI can be used in an ethical and safe manner. Complicating this issue, many industry thought leaders such as Elon Musk claim that AI is a “fundamental risk to the existence of human civilization…
For the past seven years in my role as CTO of Interset, I’ve been struck by the importance of communication . The areas of analytics, artificial intelligence, and machine learning are all sophisticated and fast-moving, it’s no wonder it can sometimes…
The only constant in life is change and there is no area where this is more true than the technology field. Our ‘Humans & Machines’ podcast looks at the ever-changing technology landscape by interviewing thought leaders in the data, security and Artificial…
As we continue with our volunteer research on COVID-19 variants predictions with our COVID-19 Forecast app , we feel it is important to give an update concerning the modeling on the COVID-19 variants of concern (March 3, 2021), like B.1.1.7, and their…
B117 COVID variant may become the majority by the middle of March in Ontario, Florida, Texas, other states
In our ongoing volunteer research efforts into COVID-19 projections and our COVID-19 Forecast app , we’ve been watching with apprehension the…
I vividly remember when I came back from my last work trip, in early-March 2020. I had just come back from RSA in San Francisco, back in the office, chatting about the trip.
Other than the trip, we were talking about the coronavirus of course. Everyone…
You’ve set up your security protections, and you’re positive nothing’s getting in. You’ve spent tens of thousands (or even hundreds of thousands) of dollars setting up the best security defense available, and now you’re confident you can put the fear…
“To know your future you must know your past” – George Santanyana
This approach has been used for many years by computer security, risk management and compliance teams. However through advancements in technology, disruptions in the market and advanced…