CIO

Hackers get around AI with flooding, poisoning and social engineering

Machine learning technologies can help companies spot suspicious user behaviors, malicious software, and fraudulent purchases — but even as the defensive technologies are getting better, attackers are finding ways to get around them. Many defensive systems need to be tuned, or tune themselves, in order to appropriately respond to possible threats. Smoke alarms that go

Hackers get around AI with flooding, poisoning and social engineering Read More »

Five iPad Safety Tips

1. Encrypt, encrypt, encrypt. There are two parts to the data encryption challenge – encrypting stored data, and encrypting data that’s moving over public networks, says  security expert Brian Reed, vice president of products at mobile security vendor BoxTone. SSL encryption on the  iPad is a fast and convenient way to protect data in motion.

Five iPad Safety Tips Read More »