article thumbnail

On Technologies for Automatic Facial Recognition

Schneier on Security

Interesting article on technologies that will automatically identify people: With technology like that on Mr. Leyvand’s head, Facebook could prevent users from ever forgetting a colleague’s name, give a reminder at a cocktail party that an acquaintance had kids to ask about or help find someone at a crowded conference.

article thumbnail

Cloudy with Strategic Technology Macro Trends on the Horizon

SecureWorld News

These factors are illustrated and discussed in depth in my article, The Rise of Data Sovereignty and a Privacy Era. Legacy technologies such as Virtual Private Networks (VPNs) do not scale and have been proven to be fraught with risk as evidenced by incidents such as nation-state attacks.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Building a Cyber Threat Hunting Team: Methods, Strategies and Technologies

Tech Republic Security

Cyber threat hunting combines strategies, advanced technologies and skilled analysts to methodically examine networks, endpoints and data repositories. This TechRepublic Premium article, written by Franklin Okeke, aims to look at threat hunting.

article thumbnail

Anatomy of an Attack | ADR vs WAF and EDR Technology | Contrast Security

Security Boulevard

Understanding these threats and the technologies designed to combat them is crucial. This article delves into the mechanics of a common application attack, using the well-known Log4Shell vulnerability as an example.

article thumbnail

Consolidation is Coming to Corporate Security Technology

Security Boulevard

Why removing technology silos is critical to helping security teams save time, cut costs, and reduce risks. This article was originally published in Security Magazine. At its peak, Lotus… The post Consolidation is Coming to Corporate Security Technology appeared first on Ontic.

article thumbnail

InfoWorld’s 2023 Technology of the Year Award winners

InfoWorld on Security

With amazing speed, generative AI has rippled across the entire information technology landscape—from software development and devops tools, to data management platforms and analytics tools, to cloud security, compliance, and governance solutions. To read this article in full, please click here

article thumbnail

Best Practices for Implementing ChatGPT and Similar AI Technologies

GlobalSign

In the below article, we will explore the data security requirements of ChatGPT and similar technologies, providing advice on how to keep customer information safe.