Remove Architecture Remove Artificial Intelligence Remove Big data
article thumbnail

Conversational AI Company Uniphore Leverages Red Box Acquisition for New Data Collection Tool

Tech Republic Security

Red Box provides the open architecture for data capture. Uniphore then feeds that data into U-Capture, its conversational AI automation tool.

article thumbnail

Cybersecurity Predictions for 2023: My Reflections

Jane Frankland

Nonetheless, cloud computing will continue to dominate digital transformation efforts, and many benefits will occur including enhanced data asset protection, fewer compliance failures, cyber resilience, and business productivity. Sustainability. More companies will be focused on sustainability. Automated technologies.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The business case for security strategy and architecture

Notice Bored

c omplementing and supporting various other business strategies and architectures such as cloud first, artificial intelligence, IIoT, big data, new products, new markets.); There are tools and techniques to help with strategy and architecture, just as there are for information risk and security management.

article thumbnail

Digital Transformation starts with the Employees

Thales Cloud Protection & Licensing

As in previous years, digital transformation remained a key theme at the event as well as discussions around artificial intelligence (AI) and IoT technologies impacting the workforce. There are two opinions out there about these new technologies when it comes to workforce implications.

article thumbnail

Fintech Cybersecurity Trends in 2021

Security Boulevard

Luckily, multi-cloud solutions offer the best of both worlds, giving businesses greater transparency and security in their data usage while providing a back-up system for vulnerable data. Financial institutions like MasterCard are adopting artificial intelligence and machine learning processes to predict and prevent fraud.

article thumbnail

Exploring Cybersecurity Research Topics for Master’s Degree Studies

CyberSecurity Insiders

Privacy and Data Protection: Explore techniques and frameworks for protecting personal information and ensuring compliance with privacy regulations. Investigate topics such as privacy-preserving data mining, secure data sharing, and the impact of emerging technologies like artificial intelligence and big data analytics on individual privacy.

article thumbnail

Why security pros should care about making zero trust frictionless

SC Magazine

companies need to strike a balance between fixing the access for remote and unmanaged endpoints while preparing the existing digital infrastructure to adopt zero trust architecture. . This happens in real-time, using big data to discover patterns, intent, behavior, and incidents, with the system becoming smarter every day. .