If your security operations center (SOC) team is overwhelmed when it comes to cybersecurity, it's time to consider AI to automate your time-consuming tasks.
While the use of AI in healthcare promises to improve visibility and implementation, there are serious risks associated with the emerging technology if misused by staff or abused by threat actors.
Law firms tasked with analyzing mounds of data can vastly improve their efficiency by using legal AI tools.
Decoy File Systems (DcyFS), a new file system approach recently unveiled in Paris, complement access control schemes and can help overcome many of the fundamental limitations of traditional ACLs.
As bitcoin theft increases and the crypto market remains volatile, the question emerging around cryptocurrency securities is whether government regulation will help stabilize the digital economy.
Insider threats are not only the most common cause of cybersecurity risk, but also the costliest and hardest to detect.
With enhanced features for users' personal and professional lives alike, Android 9 Pie raises the bar yet again for Google's mobile OS offering.
As a young girl in Romania, Irina Nicolae was fascinated with machinery and how different parts fit together. Today, she conducts AI research to develop ways to protect this technology from threats.
Topics of discussion at this year's Black Hat conference included the Internet of Things (IoT) in smart cities, the latest advancements in vulnerability management and more.
DeepLocker has changed the game of malware evasion by taking a fundamentally different approach from any other current evasive and targeted malware. Here's what you need to know.