Did China’s hack of Exchange involve AI ambitions?
Steven Adair hunts hackers for a living. Back in January, in a corner-of-his-eye, peripheral kind of way, he thought he saw one in his customer’s networks — a shadowy presence downloading emails.
Adair is the founder of a cybersecurity company called Volexity, and he runs traps to corner intruders all the time. So he took a quick look at a server his client was using to run Microsoft Exchange and was stunned to “see requests that we’re not expecting,” he said. There were requests for access to specific email accounts, requests for confidential files.
Tech giants pledge billions to enhance cybersecurity
Google, Microsoft plan to spend billions on cybersecurity after meeting with Biden.
The meeting comes in the wake of several high-profile cyberattacks, including on government software contractor SolarWinds and oil pipeline Colonial Pipeline, that have brought added urgency to such security issues.
The commitments range from working toward new industry standards to supplying other businesses with stronger security tools and providing skills training to workers to fill the roughly 500,000 unfilled U.S. cybersecurity jobs. Biden recently signed an executive order requiring U.S. agencies to use two-factor authentication for logins, which can help prevent cyberattacks.
Researchers find “zero-click” path for iPhone spyware
Bahraini human rights activist’s iPhone was silently hacked earlier this year by a powerful spyware sold to nation-states, defeating new security protections that Apple designed to withstand covert compromises, say researchers at Citizen Lab.
The activist, who remains in Bahrain and asked not to be named, is a member of the Bahrain Center for Human Rights, an award-winning nonprofit organization that promotes human rights in the Gulf state. The group continues to operate despite a ban imposed by the kingdom in 2004 following the arrest of its director for criticizing the country’s then-prime minister.
continue reading: https://techcrunch.com/2021/08/24/nso-pegasus-bahrain-iphone-security/
Building cyber-security strategies for a trusted, digital future
In the age of digital transformation, trust is an elusive asset, but one that’s never out of reach for organisations that have initiated the right actions, such as adopting a sustainable, forward-looking cyber-security strategy.
“It takes 20 years to build a reputation and a few minutes of cyber-incident to ruin it.”1 This statement, as articulately expressed by Stéphane Nappo of Société Générale, illustrates how fragile trust is in the digital sphere. An organisation’s best way to deal with the fast-changing threat landscape is an understandable, well-structured cyber-security strategy. This acts as a shield during the constant and rapid upheaval of digital transformation, protecting the business’s tangible and intangible assets, including its reputation.
How women can succeed in cyber security
A cyber security professional at Australia’s IAG shares her career journey and insights on how women can succeed in the field.
Elaine Muir, security education and awareness manager at insurance company IAG, started her IT career in solutions marketing. But one of her managers – a female former assembler programmer – urged Muir to move into a leadership role.
How to wrangle your data and manage your AI pipeline?
VentureBeat recently chatted with Singhal for his thoughts on how enterprises can best approach data, launch AI initiatives, and manage AI pipelines. He also pulled back the curtain on the company’s own processes and approach to bias and explainability.
This interview has been edited for brevity and clarity.
Rahul Singhal: Innodata has been investing heavily in AI for the last six years, and we’ve built a lot of interesting AI models to automate the content transformation journey for our clients. Three years ago when the CEO, Jack Abuhoff, asked me to join Innodata, one of my premises for joining was that AI is not going to be successful if you don’t have three key ingredients. First, you need to have lots of proprietary content, or access to proprietary content. Second, you need to have lots of subject matter experts and an ability to create pristine quality training data. And third, you need data scientists who are training these models and can then lead and build a large AI pipeline.
continue reading the interview: https://venturebeat.com/2021/08/26/how-to-wrangle-data-and-manage-your-ai-pipeline/
Read more Cyber Security News at https://QUE.com/tag/cybersecurity
Thank you for reading and stay safe.