Top news of the week: 23.10.2020.

#cybersecurity #AI #5G #MachineLearning #infosec #Fintech #DataScience #DeepLearning #ArtificialIntelligence #DigitalTransformation

Innovations And Trends

On Oct 21, 2020
@archonsec shared
RT @Fabriziobustama: Cybersecurity for the Next Stage of Digital Transformation By @Channelnomics https://t.co/U01lAezEby #DigitalTransformation #CyberSecurity Cc: @NevilleGaunt @MikeQuindazzi @DrJDrooghaag @JolaBurnett @fogle_shane @andi_staub @Corix_JC @labordeolivier @AkwyZ @avrohomg @archonsec https://t.co/SWFblmUsVl
Open
On Oct 20, 2020
@automeme shared
RT @FintechFor: RT @DeepLearn007: My Article: Making #AI #MachineLearning Work for You https://t.co/KxXSIlpghI @SpirosMargaris @Xbond49 @psb_dc @jblefevre60 @nigewillson @Paula_Piccard @ipfconline1 @pierrepinna @HaroldSinnott @Nicochan33 @JimMarous #DeepLearning #Dat… https://t.co/eY0bYO7Dwi
Open

Making AI, Machine Learning Work for You!

Making AI, Machine Learning Work for You!

This article will consider how to successfully implement Machine Learning into an organisation. The latter part has a summary of the Machine Learning and Deep Learning techniques often ...

On Oct 21, 2020
@sbmeunier shared
RT @archonsec: #cybersecurity #infosec VIA @TechRepublic Cisco reports highlight widespread desire for data privacy & fears over remote work security More 👉 https://t.co/6OwpwIE7fv @chuckdbrooks @PVynckier @mclynd @sbmeunier @DrJDrooghaag @digitalcloudgal @fogle_shane @gvalan @BillMew
Open

Cisco reports highlight widespread desire for data privacy and fears over remote work security

Cisco reports highlight widespread desire for data privacy and fears over remote work security

Workers are increasingly concerned about the ability of enterprises to keep them protected as they work from home.

On Oct 19, 2020
@automeme shared
RT @stratorob: The lack of clarity as to what constitutes #AI has contributed to skepticism regarding the reality of its delivery. So, how real is #ArtificialIntelligence? https://t.co/FpIgCcRBHP @gezgintrk @the404code @TrendingNews_7 @automeme @Anastas13165653 #IoT #5G #Blockchain #SmartCity https://t.co/i7KKhkwXSk
Open

How real is AI? Featured

How real is AI? Featured

The lack of clarity as to what constitutes AI has contributed to skepticism regarding the reality of its delivery. In this, the fourth in the 'controversial question' series, we ...

On Oct 22, 2020
@EdgeIotAi shared
RT @pmenonkp: RT How AI Will Supercharge Spear-Phishing https://t.co/UfeRMoiDXF #AI #phishing #spearphishing #threatintel
Open

How AI Will Supercharge Spear-Phishing

How AI Will Supercharge Spear-Phishing

To keep pace with intelligent, unpredictable threats, cybersecurity will have to adopt an intelligent security of its own.

On Oct 17, 2020
@AghiathChbib shared
Academia Adopts Mitre ATT&CK Framework https://t.co/TBHRvOW77z #DataPrivacy #Cybersecurity https://t.co/uSPlcFr5WM
Open

Academia Adopts Mitre ATT&CK Framework

Academia Adopts Mitre ATT&CK Framework

Security pros and academic researchers discuss the best ways to use MITRE's framework to inform cybersecurity efforts, analyze threats, and teach future workers.

On Oct 21, 2020
@archonsec shared
RT @khurramcyber: ENISA Threat Landscape 2020: #CyberAttacks Becoming More Sophisticated, Targeted, Widespread & Undetected https://t.co/m7oMkuhsPX @archonsec @DrJDrooghaag @ShiCooks @michaelbathurst @cybersec2030 @CyrilCoste @PVynckier @sallyeaves @HaroldSinnott @mclynd @KSA_Security #infosec
Open

ENISA Threat Landscape 2020: Cyber Attacks Becoming More Sophisticated, Targeted, Widespread and Undetected

ENISA Threat Landscape 2020: Cyber Attacks Becoming More Sophisticated, Targeted, Widespread and Undetected

Threat landscape maps Malware standing strong as #1 Cyber Threat in the EU, with an increase in Phishing, Identity Theft, Ransomware; Monetisation holding its place as cyber criminals’ top ...

On Oct 21, 2020
@AghiathChbib shared
Here’s a five-step security plan for industrial environments https://t.co/DRNkZnNHSk
Open

Here’s a five-step security plan for industrial environments

Here’s a five-step security plan for industrial environments

How much should we fear for-profit hackers or nation-states tampering with industrial devices to cause a catastrophe?