Paying at shops? Listening to music? Booking a cab? Tracking a courier package? Look around yourself and almost everything is handled digitally. Technology is the virtual life support system of mankind because our ways of living have got extremely fast and easier with its perusal along with Artificial Intelligence and Machine Learning. This calls for a constant inspection of areas to improve, which brings you to read this article on 15 AI-ML trends to watch out in 2020.Read More
In light of the pandemic that has taken the entire world by storm, starting with China and then the European Union turning out to be the new epicenter, businesses have suffered big blows. The negative disruption brought forth by the global outbreak of the COVID-19 virus (or popularly known as the novel Coronavirus) has led to most organizations enabling their employees to work from home to ensure the continuity of their business. However, this brings with itself several implications from the cybersecurity perspective, along with people management issues in general. To throw some light on these issues, top security and risk management leaders took part in an intriguing virtual panel discussion on the topic ‘Cybersecurity enabling businesses in COVID-19 situation’ on 21st March 2020, hosted by CyberFrat – an enterprise risk management community.Read More
Modern-day business security leaders openly talk about maintaining intrinsic data on how users and systems behave. What do they do with this? When exactly do they need this? Who helps them in using this? Does it ease the pain of boosting the overall enterprise security and answering stakeholders? All of these shall be answered in this piece on Behavioral Analytics, one of the go-to methods for modern cybersecurity professionals to nip suspicious activities in the bud.Read More
What crosses your mind when you hear the word fatigue? Does it remind you of the times when you return home tired after an intense workout session, or of tiredness in general? In either case, it signifies the intent to give up the intent to rectify something amiss. To the dismay of most CISOs today, such a thing has crept up the minds of employees for whom cyberattacks, especially data breaches, are just part of everyday life now. This article deals with this phenomenon, technically termed ‘Breach Fatigue‘ and some subtle ways of combating it.Read More
How would a human body survive without a nervous system that constantly responds to external and internal stimuli?
How could a traffic controller perform without constantly sensing the traffic situation and reacting accordingly?
How on Earth could a candidate pass a modern job interview without knowing current affairs?
Advocates of modernization love to associate the word ‘data’ with every business problem. It is indeed true that data-driven decisions are the most practical and helpful decisions to prevent the boat from sinking. However, the pool of data is too huge to be managed by traditional analytical systems such as Big Data and Business Intelligence. Just like the human body, the traffic controller and the interview candidate, modern businesses also require a thorough (yet quick) analysis of real-time data that, when augmented with analyzing historical data, can provide the most rewarding solutions for the enterprise and make it sustainable in the long run. We are talking about the trend of Continuous Intelligence (or CI), and here we shall see what it can bring to the table in the context of business problem-solving.Read More
Have you ever imagined your organization’s network getting infiltrated by a bot swarm that eventually steals data and leaves you spellbound? If you haven’t, it is time to beware of such a possibility. Advances in Artificial Intelligence have made intelligence sharing and correlation a possible approach for specialized bots to interact amongst themselves in real-time and improvise an attack in perfect synchronization. We have entered the age of swarm technology and it is only apt to brace ourselves for an impending attack from the new miscreants.Read More
Sticking to the concept of evolution, bad actors on the web have come up with yet another channel to get their work done. This new threat has grabbed eyeballs after affecting global retailers such as Puma, Macy’s, Target and British Airways and helping hackers steal millions of credit card numbers over the past 2 years. Termed E-skimming, this is one of the latest threats to the cyber community, especially when it comes to making online payments. This article aims at throwing some light on it and the ways for the average internet user to safeguard himself/herself.Read More
Cognitive, motor and emotional abilities make humans the smartest organisms in the world. Otherwise, we would not have witnessed the series of industrial revolutions in our history of technological advancements. But ever since robotics changed the game, humans have increasingly grown dependent on the artificially intelligent machines and used them for innumerable applications. The riveting question is – are these bots fully dependable? If not, what makes them vulnerable, and is there a way to strengthen them?Read More
Gone are the days when users of software applications would always rely on text commands or graphical user interfaces (GUIs) to get their jobs done. Instead, we seem to have gone back to older times when errand boys would listen to our instructions and accomplish the tasks on our behalf. That’s right, this is the age of conversational user interfaces and enterprises have rapidly adopted chatbots that continue to benefit the businesses and users alike.Read More