Page 3,801«..1020..3,8003,8013,8023,803..3,8103,820..»

Asensys Announces Former Executive Vice President of Artificial Intelligence & Research at Microsoft Dr. Harry Shum as an Angel Investor – Yahoo…

Distinguished technology leader and AI expert Dr. Harry Shum becomes an angel investor in Asensys, a novel blockchain system designed to empower the decentralized web

SEATTLE, March 5, 2020 /PRNewswire-PRWeb/ --Asensys, a next-generation, high-performance system that brings throughput and capacity to a new, scalable level, is pleased to announce former Executive Vice President of Artificial Intelligence & Research at Microsoft Dr. Harry Shum as an angel investor.

Dr. Shum is a famous AI researcher, who is an IEEE Fellow and an ACM Fellow for his contributions to computer vision and computer graphics. In 2017, he was elected to the National Academy of Engineering of the United States and elected an International Fellow of the Royal Academy of Engineering in the UK in 2018.

Dr. Harry Shum expressed, "Brendon and the Asensys team have developed a system to support the scaled throughput and capacity necessary to realize the promise of the decentralized Web, based on solid peer-reviewed research work on NSDI. I very much look forward to working hand-in-hand with the Asensys team to bring this solution to the forefront of internet technology innovation and ensure that our digital lives empowered by AI are secure and trustworthy."

Dr. Shum's expertise in AI will provide Asensys with an advantage in building a system that works for an increasingly AI-powered economy. AI algorithms are already deployed across finance, e-commerce, and media verticals, but the possibilities enabled by combining forces with blockchain are mostly untapped. Blockchain technology and AI together will drive the evolution of digital society with blockchain allowing for the effective application of AI without weakening data security or privacy.

Asensys Founder Dr. Brendon Wang boasts an impressive background himself, having published dozens of papers in such highly-reputed journals as ACM/TOG and USENIX/NSDI and been granted many US patents for his work. Dr. Wang formerly was a lead researcher at Microsoft Research where he focused on distributed computing systems for high-performance GPU computing and blockchain systems. He earned his PhD from the Institute of Computing Technology Chinese Academy of Sciences focusing on parallel computing and computer graphics.

"I'm honored to announce Harry Shum, as an angel investor in Asensys," said Asensys Founder Dr. Wang. "Involvement by such an acclaimed computer scientist is an unbelievable endorsement of the system we have created to address blockchain's scalability problem and provide a solid infrastructure for the decentralized Web that benefits everyone in the future."

By introducing the novel concept of Asynchronous Consensus Zones, Asensys is able to reduce redundancy of network tasks and process transactions much faster than legacy blockchains like Bitcoin and Ethereum. When Asensys performed a test including 1,200 virtual machines worldwide to support 48,000 nodes, the Asensys system delivered 1,000 times the throughput and 2,000 times the capacity of the Bitcoin and Ethereum networks, as reported in the NSDI research paper.

As the Asensys team continues to develop its novel infrastructure for the decentralized Web, the involvement of Dr. Shum as an eminent technology leader and the former Executive Vice President of Artificial Intelligence & Research at Microsoft represents an important milestone in the project's rollout and build-up of institutional credibility.

To stay up-to-date on Asensys news and updates, visit the website: https://asensys.com/

For media inquiries, please contact Kili Wall at (310) 260-7901 or media(at)asensys(dot)com.

About Asensys Asensys is a new-generation, high-performance system that brings throughput and capacity to a new, scalable level. Asensys aims to meet the needs of the modern digital economy with its novel blockchain infrastructure that will enable web users to realize the full potential of the internet by providing the foundation upon which decentralized applications can be built.

Headquartered in Seattle, WA with a global team, Asensys was founded by Dr. Brendon (JiaPing) Wang, whose research has been published in highly-reputed journals, such as ACM/TOG, and who also has been granted many US patents for his work on distributed computing and blockchain systems. At the prestigious NSDI'19 conference, Dr. Wang and the Asensys team demonstrated how to conquer the Blockchain Trilemmathe idea that decentralization or security must be sacrificed to achieve high performance.

SOURCE Asensys

See the original post here:
Asensys Announces Former Executive Vice President of Artificial Intelligence & Research at Microsoft Dr. Harry Shum as an Angel Investor - Yahoo...

Read More..

What is AIOps? Injecting intelligence into IT operations – CIO

Cloud platforms, managed service providers and organizations undertaking digital transformations are beginning to reap the benefits of an emerging IT trend: the use of AI-powered IT operations technology to monitor and manage the IT portfolio automatically.

This emerging practice, known as AIOps, is helping enterprises head off potential outages and performance issues before they negatively impact operations, customers, and the bottom line. But the more advanced deployments are beginning to use AI systems not just to identify issues, or to predict issues before they happen, but to react to events with intelligent, automated mitigation.

But what exactly is AIOps and how are organizations putting it to use today? Here we take a deeper look at the technologies, strategies, and challenges of AI-assisted IT operations.

AIOps is an emerging IT practice that applies artificial intelligence to IT operations to help organizations intelligently manage infrastructure, networks, and applications for performance, resilience, capacity, uptime, and, in some cases, security. By shifting traditional, threshold-based alerts and manual processes to systems that take advantage of AI and machine learning, AIOps enables organizations to better monitor IT assets and anticipate negative incidents and impacts before they take hold.

Here is the original post:
What is AIOps? Injecting intelligence into IT operations - CIO

Read More..

Dont forget to consider GDPR when using artificial intelligence in the workplace – ComputerWeekly.com

When applying for a new job, candidates may well find that the use of artificial intelligence (AI) tools is involved at some point in the recruitment process. New recruitment businesses and technology are entering the market, setting up entirely automated initial conversations with candidates to help them find the right vacancy for their skill set, saving time for applicant and recruiter alike.

CV screening is also becoming more prevalent, with AI screening and tracking tools being used to quickly analyse CVs to ascertain whether the individual has the qualifications and experience necessary for the role for example, burger chain Five Guys is said to be utilising such technology.

Unilever recently hit the headlines when it announced that, instead of human recruiters, it uses an AI system to analyse video interviews. Candidates record interviews on their phone or laptop, and the system scans candidates language, tone and facial expressions from the videos, assessing their performance against traits that are considered to indicate job success at Unilever.

But it is not just the recruitment stage where AI and people analytics are being used by businesses performance management is another targeted area. Amazon is leading this charge the company was issued with two patents in the US for a wristband for tracking the performance of workers in their warehouse, which would mean that staff receive a little buzz if they place a product near or in the wrong inventory location.

It is also alleged that Amazon uses a computer system to automatically generate warnings or terminations to employees, when their productivity (or lack of) warrants it.

The benefits of such technology for employers are countless and clear, including costs savings, efficiency, and the purported removal of human unconscious bias and prejudice. However, the use of AI in the workplace has come under scrutiny and has posed serious ethical and legal questions, including whether AI itself could in fact be biased.

Another important aspect when implementing AI in the workplace is its relationship with data protection laws such as the EUs General Data Protection Regulation (GDPR). So, what data protection considerations should an employer make when considering the introduction of AI technology?

The use of AI for processing personal data will usually meet the legal requirement for completing a DPIA.

A DPIA enables the business to analyse how the AI plans will affect individuals privacy, and ensures the company can assess the necessity and proportionality of its technology.

As the UK Information Commissioners guidance confirms, the deployment of an AI system to process personal data needs to be driven by the proven ability of that system to fulfil a specific and legitimate purpose, not just by the availability of the technology.

The DPIA should demonstrate that the applicable purposes the AI is being used for could not be accomplished in another reasonable way. In doing so, organisations need to think about and document any detriment to data subjects that could follow from bias or inaccuracy in the algorithms and data sets being used.

A business cannot simply process personal data because it wishes to do so data can only be processed where one of the legitimate grounds or conditions of processing has been met. There are various bases, including performance of a contract, compliance with a legal obligation, consent and legitimate business interests. For the processing of sensitive personal data (such as health data), the bases are even more limited.

Before using AI or people analytics in the workplace, employers will first need to consider what data is being processed by such activity and second what legal basis can be relied upon in processing the data in that way. If they do not have a legal basis, the data cannot be processed.

One of the key principles of GDPR is transparency, requiring businesses to provide individuals with mandatory information about the processing of their personal data, including the reason why it is being processed, the legal basis, who it will be shared with and how long it will be retained. Employers will need to update their privacy notices to ensure anyone subject to the AI technology is made aware of its use.

The privacy notice needs to be concise and intelligible, using clear and plain language this will be particularly difficult when including a complex AI system, as businesses will need to provide a meaningful explanation of the technology to meet the transparency principle of GDPR. Opaque or complex descriptions of the tech may result in contention or pushback from the employees and candidates affected.

GDPR prohibits instances of computer says no and contains the right for data subjects not to be subjected to a decision based solely on automated processing, which has a legal or similarly significant impact on them. Its aim is to protect individuals against the risk that a potentially damaging decision is taken without human intervention, and will therefore likely capture a recruitment result made without any human input.

There are specific exceptions when automated decision-making is permitted, including where explicit consent was given, contractual necessity, or where authorised by law. Where such an exception is being relied upon, such as with the consent of a candidate, the business must still implement further safeguarding measures, including permitting the individual to request human intervention or to contest the decision.

Employers will need to ensure that their automated technology is being lawfully used, before relying on its output.

Go here to read the rest:
Dont forget to consider GDPR when using artificial intelligence in the workplace - ComputerWeekly.com

Read More..

New Research from Farnell Reveals Strong Adoption of Artificial Intelligence within the Internet of Things Ecosystem – IoT Business News

Results from Farnells second IoT Survey also show increasing confidence in companies to lead IoT development.

AIoT is the major emerging trend from the survey, demonstrating the beginning of the process to build a true IoT ecosystem. Research showed that almost half (49%) of respondents already use AI in their IoT applications, with Machine Learning (ML) the most used technology (28%) followed by cloud-based AI (19%).

This adoption of AI within IoT design is coupled with a growing confidence to take the lead on IoT development and an increasing number of respondents seeing themselves as innovators. However, it is still evident that some engineers (51%) are hesitant to adopt AI due to being new to the technology or because they require specialized expertise in how to implement AI in IoT applications.

Other results from Farnells second Global IoT Survey show that security continues to be the biggest concern designers consider in IoT implementation. Although 40% cited security as their biggest concern in 2018 and this has reduced to 35% in 2019, it is still ranked significantly higher than connectivity and interoperability due to the type of data collected from things (machines) and humans, which can be very sensitive and personal. Businesses initiating new IoT projects treat IoT security as a top priority by implementing hardware and software security to protect for any kind of potential threat. Ownership of collected data is another important aspect of security, with 70% of respondents preferring to own the data collected by an edge device as opposed to it being owned by the IoT solution provider.

The survey also shows that although many engineers (46%) still prefer to design a complete edge-to-cloud and security solution themselves, openness to integrate production ready solutions, such as SmartEdge Agile, SmartEdge IIoT Gateway, which offer a complete end-to-end IoT Solution, has increased. 12% more respondents confirmed that they would consider third party devices in 2019 than 2018, particularly if in-house expertise is limited or time to market is critical.

A key trend from last years survey results has continued in 2019 and survey results suggest that the growing range of hardware available to support IoT development continues to present new opportunities. More respondents than ever are seeing innovation coming from start-ups (33%, up from 26%), who benefit from the wide availability of modular solutions and single board computers available on the market. The number of respondents adopting off-the-shelf hardware has also increased to 54% from 50% in 2018.

Cliff Ortmeyer, Global Head of Technical Marketing for Farnell says:

Opportunities within the Internet of Things and AI continue to grow, fueled by access to an increasing number of hardware and software solutions which enable developers to bring products to market more quickly than ever before, and without the need for specialized expertise.

This is opening up IoT to new entrants, and giving more developers the opportunity to innovate to improve lives. Farnell provides access to an extensive range of development tools for IoT and AI which provide off-the-shelf solutions to common challenges.

Despite the swift integration of smart devices such as Amazons Alexa and Google Home into daily life, evidencing a widespread adoption of IoT in the consumer space, in 2019 we saw a slight shift in focus away from home automation with the number of respondents who considered it to be the most impactful application in IoT in the next 5 years reducing from 27% to 22%. Industrial automation and smart cities both gained, at 22% and 16% respectively, underpinned by a growing understanding of the value that IoT data can bring to operations (rising from 44% in 2018 to 50% in 2019). This trend is witnessed in industry where more manufacturing facilities are converting to full or semi-automation in robotic manufacturing and increasing investment in predictive maintenance to reduce production down times.

The survey was conducted between September and December 2019 with 2,015 respondents participating from 67 countries in Europe, North America and APAC. Responses were predominantly from engineers working on IoT solutions (59%), as well as buyers of components related to IoT solutions, Hobbyists and Makers.

View original post here:
New Research from Farnell Reveals Strong Adoption of Artificial Intelligence within the Internet of Things Ecosystem - IoT Business News

Read More..

High tech vs. coronavirus: Using artificial intelligence, analytics are weapons SAS brings to the fight – WRAL Tech Wire

CARY The ongoing spread of the coronavirus is sparking urgent searches for a vaccine to counteract it. Several Triangle firms such as Lenovo and Heat Biologics have joined the fight. Also bringing powerful and emerging technology to the battle is software and data analytics giantSAS, a heavy investor in artificial intelligence and a world leader of tools to extract information from so-called big data information gathered from many sources.

In an exclusive Q&A with WRAL TechWire,Theresa Do, Support Manager for Federal Healthcare at SAS, talks about the potential uses of AI, machine learning and analytics to combat the corornavirus and future health threats. Do also is a Professor ofEpidemiology & Biostatistics at George Washington Univ. in Washington, DC.

Developing new treatments and creating vaccines and antiviral medications for newly discovered viruses is a difficult and time-consuming process, traditionally involving lots of trial and error. AI and advanced analytics can help improve the application of current treatments and speed up the development of new ones.

Theresa Do

For example, AI specifically deep learning is currently being used to help radiologists make better treatment decisions based on medical imaging. Chest x-rays of patients infected with the new coronavirus may serve as input into AI models that can help physicians make faster diagnoses as the outbreak continues. AI can also help here by examining data from similar viral diseases and using that data to predict what types of vaccines and medicines might be more effective.

Data and analytics are the lifeblood for decision-making during infectious-disease outbreaks.Analytics can provide insights about the spread of a disease and the effectiveness of public health action, which can improve the response.The more information people have about case counts, mortality rates, how a disease spreads and how contagious it is, the better decisions they can make to limit, prevent and treat the disease. Public health and scientific data must be shared freely and rapidly with stakeholders and key decision makers so they can take action.

For decades, SAS has provided analytics software to public health and government agencies in the United States and around the world, helping them improve the health and well-being of their citizens. Governments hold much of the critical data needed to understand current conditions during an outbreak, but analytics companies like SAS offer an ability to synthesize this data with other non-government data and specialized tools to get the most insights from this unified data. These data-driven insights support better, faster government and public health decision-making. Events like the ongoing COVID-19 outbreak require public and private sectors to work closely together to limit disease spread and save lives.

Collaboration, integration and rapid information sharing are essentialto improve response and recovery for infectious disease outbreaks.Gone are the days when only governments and public health organizations had valuable data to fight epidemics. Disparate, non-traditional data setscan serve as sentinel sources everything from travel and census data, to demographic information and animal migration patternscan be applied to the public health threats. But the key is how to take advantage of all this data and emerging new data like genetic sequences.

Advanced analytics and AI (particularly machine learning) are essential tools to put data to work and save lives. With more and diverse data sets, the challenge is to synthesize everything to derive the insights needed to make decisions. Asolid data management ecosystem and platform where the data can be stored, cleaned, scaled and shared among key stakeholders and decision makers is essential. So, its not just about the data, but also how that data can be used effectively in global collaboration to fight the emergence and spread of disease.

Finally, having enough good data is a challenge when a new, or novel virus is causing a disease outbreak. Advanced analytics are only as good as the data they can explore, analyze and sift through. For COVID-19, collaboration will continue to improve as more data is shared.

Analytics has an important and growing role to play in the detection and monitoring of all viral-disease outbreaks. Critical insights about disease spread and the effectiveness of public health action can be derived from analytical approaches, which helps decision-makers adjust and adapt their strategies and responses.

AI and machine learning in particular are valuable tools for healthcare professionals and policymakers to reduce or better manage the impact of emerging infectious diseases like COVID-19. Machine learning is designed to consider large amounts of data, find patterns in that data and detect anomalies, and in many cases offer predictions.

AI can help health authorities better detect infectious disease outbreaks by analyzing sentinel data sources for early warning of potential threats.AI can be applied to models on common themes or topics to help identify common symptoms among new and evolving public health threats. Moreover, AI can help to automate data analysis, identify patterns and build models of risk factors to help in scenario analysis of transmission. And when it comes to identifying paths of transmission, AI can aid in the search for a host and/or index case, as well as tracking possible contacts.

When SARS emerged, there were fewer data sources that could be leveraged, such as social media, Internet of Things (IoT) devices and technologies to help with diagnostics. Phone apps for tracking of health data and diagnostics were not yet present. (The iPhone came out in 2007, four years after SARS broke out). With the advent of the iPhone and new types of apps and technologies, scientists can leverage a lot more data for analysis in addition to the available sentinel sources.

Today there are more ways that people can communicate to quickly distribute public health prevention efforts and quell misinformation regarding public health threats such as the some of the misinformation around COVID-19. Providers have more information at their fingertips via technology versus when SARS first broke out during the early stages, as well as the availability of the internet. However, with COVID-19, there is still a lot more to be uncovered and learned.

For any infectious disease outbreak, good responses need good data that can be shared readily and acted upon quickly. That was true then for SARS, and its true today for COVID-19.

Lenovo, Intel team up to accelerate analysis of coronavirus genome in vaccine search

Morrisville-based Heat Biologics joins global effort to discover coronavirus vaccine

Read more from the original source:
High tech vs. coronavirus: Using artificial intelligence, analytics are weapons SAS brings to the fight - WRAL Tech Wire

Read More..

New research on adoption of Artificial intelligence within IoT ecosystem – ELE Times

element14, the Development Distributor, has published new research on the Internet of Things (IoT) which confirms strong adoption of Artificial Intelligence (AI) within IoT devices, alongside new insights on key markets, enablers and concerns for design engineers working in IoT.

AIoT is the major emerging trend from the survey, demonstrating the beginning of the process to build a true IoT ecosystem. Research showed that almost half (49%) of respondents already use AI in their IoT applications, with Machine Learning (ML) the most used technology (28%) followed by cloud-based AI (19%). This adoption of AI within IoT design is coupled with a growing confidence to take the lead on IoT development and an increasing number of respondents seeing themselves as innovators. However, it is still evident that some engineers (51%) are hesitant to adopt AI due to being new to the technology or because they require specialized expertise in how to implement AI in IoT applications.

Other results from element14s second Global IoT Survey show that security continues to be the biggest concern designers consider in IoT implementation. Although 40% cited security as their biggest concern in 2018 and this has reduced to 35% in 2019, it is still ranked significantly higher than connectivity and interoperability due to the type of data collected from things (machines) and humans, which can be very sensitive and personal. Businesses initiating new IoT projects treat IoT security as a top priority by implementing hardware and software security to protect for any kind of potential threat. Ownership of collected data is another important aspect of security, with 70% of respondents preferring to own the data collected by an edge device as opposed to it being owned by the IoT solution provider.

The survey also shows that although many engineers (46%) still prefer to design a complete edge-to-cloud and security solution themselves, openness to integrate production ready solutions, such as SmartEdge Agile, SmartEdge IIoT Gateway, which offer a complete end-to-end IoT Solution, has increased. 12% more respondents confirmed that they would consider third party devices in 2019 than 2018, particularly if in-house expertise is limited or time to market is critical.

A key trend from last years survey results has continued in 2019 and survey results suggest that the growing range of hardware available to support IoT development continues to present new opportunities. More respondents than ever are seeing innovation coming from start-ups (33%, up from 26%), who benefit from the wide availability of modular solutions and single board

computers available on the market. The number of respondents adopting off-the-shelf hardware has also increased to 54% from 50% in 2018.

Cliff Ortmeyer, Global Head of Technical Marketing for Farnell and element14 says: Opportunities within the Internet of Things and AI continue to grow, fueled by access to an increasing number of hardware and software solutions which enable developers to bring products to market more quickly than ever before, and without the need for specialized expertise. This is opening up IoT to new entrants, and giving more developers the opportunity to innovate to improve lives. element14 provides access to an extensive range of development tools for IoT and AI which provide off-the shelf solutions to common challenges.

Despite the swift integration of smart devices such as Amazons Alexa and Google Home into daily life, evidencing a widespread adoption of IoT in the consumer space, in 2019 we saw a slight shift in focus away from home automation with the number of respondents who considered it to be the most impactful application in IoT in the next 5 years reducing from 27% to 22%. Industrial automation and smart cities both gained, at 22% and 16% respectively, underpinned by a growing understanding of the value that IoT data can bring to operations (rising from 44% in 2018 to 50% in 2019). This trend is witnessed in industry where more manufacturing facilities are converting to full or semi-automation in robotic manufacturing and increasing investment in predictive maintenance to reduce production down times.

The survey was conducted between September and December 2019 with 2,015 respondents participating from 67 countries in Europe, North America and APAC. Responses were predominantly from engineers working on IoT solutions (59%), as well as buyers of components related to IoT solutions, Hobbyists and Makers.

element14 provides a broad range of products and support materials to assist developers designing IoT solutions and integrating Artificial Intelligence. Products are available from leading manufacturers such as Raspberry Pi, Arduino and Beagleboard. element14s IoT hub and AI pages also provide access to the latest products for development and insights and white papers to support the design journey. Readers can view an infographic covering the full results of the element14 Global IoT Survey at Farnell in EMEA, Newark in North America and element14 in APAC.

For more information, visit http://www.element14.com

More:
New research on adoption of Artificial intelligence within IoT ecosystem - ELE Times

Read More..

The Pentagon’s AI Shop Takes A Venture Capital Approach to Funding Tech – Defense One

The Joint Artificial Intelligence Center will take a Series A, B, approach to building tech for customers, with product managers and mission teams.

The Joint Artificial Intelligence Center will take a Series A, B, approach to building tech for customers, with product managers and mission teams. By PatrickTucker

Military leaders who long to copy the way Silicon Valley funds projects should know: the Valley isnt the hit machine people think it is, says Nand Mulchandani, chief technical officer of the Pentagons Joint Artificial Intelligence Center. The key is to follow the right venture capitalmodel.

Mulchandani, a veteran of several successful startups, aims to ensure JAICs investments in AI software and tools actually work out. So he is bringing a very specific venture-capital approach to thePentagon.

Heres the plan: when a DoD agency or military branch asks JAIC for help with some mission or activity, the Center will assign a mission team of, essentially, customer representatives to figure out what agency data might be relevant to theproblem.

Subscribe

Receive daily email updates:

Subscribe to the Defense One daily.

Be the first to receive updates.

Next, the JAIC will assign a product manager not DoDs customary program manager, but a role imported from the techindustry.

He or she handles the actual building of the product, not the administrative logistics of running a program. The product manager will gather customer needs, make those into product features, work with the program manager, ask, What does the product do? How is it priced? Mulchandani told Defense One in a phone conversation onThursday.

The mission team and product manager will take a small part of the agencys data to the software vendors or programs that they hire to solve the problem. These vendors will need to prove their solution works before scaling up to take on all availabledata.

Were going to have a Series A, a seed amount of money. You [the vendor] get a half a million bucks to curate the data, which tends to be the problem. Do the problem x in a very tiny way, taking sample data, seeing if an algorithm applies to it, and then scale it, Mulchandani saidon Wednesday at an event hosted by the Intelligence and National Security Alliance, orINSA.

In the venture capital industry, you take a large project, identify core risk factors, like team risk, customer risk, etc. you fund enough to take care of these risks and see if you can overcome the risks through a prototype or simulation, before you try to scale, he addedlater.

The customer must also plan to turn the product into a program of record or give it some other life outside of theJAIC.

Thats very different from the way the Defense Department pays for tech today, he said. The unit of currency in the DoD seems to be Well, this was a great idea; lets stick a couple million bucks on it, see what happens. Were not doing that way anymore he said onWednesday.

The JAIC is working with the General Services Administration Centers of Excellence to create product manager roles in DoD and to figure out how to scale small solutions up. Recently, some members of the JAIC and the Centers of Excellence participated in a series of human-centered design workshops to determine essential roles and responsibilities for managing data assets, across areas that the JAIC will be developing products, like cybersecurity, healthcare, predictive maintenance, and business automation, according to thestatement.

Mulchandani urges the Pentagon not to make a fetish of Silicon Valley. Without the right business and funding processes, many venture startups fail just as badly as poorly thought out government projects. You just dont hear aboutthem.

When you end up in a situation where theres too much capital chasing too few good ideas that are real, you end up in a situation where you are funding a lot of junk. What ends up happening [in Silicon Valley] is many of those companies just fail, he said Wednesday. The problem in DOD is similar. How do you apply discipline up front, on a venture model, to fund the good stuff as opposed to funding a lot of junk and then seeing two or three products that becomesuccessful?

Go here to read the rest:
The Pentagon's AI Shop Takes A Venture Capital Approach to Funding Tech - Defense One

Read More..

HKMA’s paper on Artificial Intelligence in the banking industry – Lexology

Last year, the HKMA commissioned a study into the application of Artificial Intelligence technology (AI) in the Hong Kong banking industry. The report, published on 23 December 2019, summarises insights from academics and industry experts on AI. One key finding was that almost 90% of the surveyed retail banks had adopted or planned to adopt AI applications. 95% of banks which had adopted AI expressed their intention to use AI to shape their corporate strategy, mainly prompted by the need to improve customer experience, stay cost effective and better manage risk.

To help the banking industry understand the risk and potential of AI, the report covered the latest development trends, potential use cases, status of AI development in banking, challenges and considerations in designing and deploying the technology, as well as the market outlook.

This report is the first in a series of AI-related publications produced by the HKMA. The full report can be accessed here.

Go here to see the original:
HKMA's paper on Artificial Intelligence in the banking industry - Lexology

Read More..

Eight ways to improve cyber-hygiene in the enterprise – Security Boulevard

Good hygiene keeps you safe and healthy, as well as others around you. Its the same with cyber-hygiene the sets of practices that organizations are increasingly adopting in a structured way to complement their technological layers of cyberdefense. We highlight cyber-hygiene in many of our publications alongside regularly updated education programs, it can be very effective in preventing and mitigating cyberattacks. Here are eight ways to improve your cyber-hygiene, starting today.

One of the reasons data breaches happen is that its too easy for employees to be complacent about cyberthreats the risks are largely invisible to the untrained eye. This is often compounded by an overconfidence about security infrastructure. A resulting perfect storm of cybersecurity has nothing to do with me and cyberattacks never happen to our department can have disastrous repercussions when, for example, a complacent employee receives a sophisticated phishing email that compromises the entire organization.

This is where cybersecurity culture is invaluable. Becoming a company with a strong cybersecurity culture means adopting responsibility for cyber protection as a shared value of the organization. Think in terms of this is how we do things at this company. Ultimately, the Board needs to show leadership on cybersecurity culture and get buy-in from all levels.

Another problem is helping staff understand the connection between their behavior and the cyber-risk profile of the employer organization. The opsec team should never be the only group within a company that knows how to identify potentially malicious activity. A continual program of spreading awareness ensures constant vigilance and reduces the chances of disruption and financial loss.

When educating your people about cyber-risks, concentrate on what they can influence. A seminar on botnets, for example, has limited relevance beyond establishing wider context. So focus on things like phishing emails and social engineering techniques that attackers use to steal user credentials.

The end user is both the weakest and the strongest link in the chain. Expose your people to real-world threat simulations and test them regularly to identify those needing extra coaching and support. This can transform users from a potential weak spot in your security apparatus to a powerful defensive asset.

Each organizations threat profile is unique so it pays to understand it as much as possible, and gear user training programs to suit. Be cautious with generic e-learning modules that use scenarios that arent applicable to your sector and dont match your users day-to-day experiences.

A regular schedule of pen-testing is crucial to safeguarding data and should be carried out by a qualified third party. Ensure you act upon all critical advisories.

You can go even further with a subset of designated red-team employees. Red-teaming is where your own people try to outfox security defenses without warning. Not only does this keep company personnel on their toes (see above in relation to both awareness and practice), but it also uncovers potential weak spots in security posture that you can subsequently improve.

Regularly scanning computers, networks and applications for known weaknesses is an essential hygiene measure its success rests on the freshness of the insights and your ability to manage and prioritize patching efforts.

Use threat intelligence to scan outside the network to detect leaked, stolen and even sold user credentials in underground marketplaces. IT security teams can apply this intelligence to locate the sources of the initial attacks and patch vulnerabilities to ensure additional breaches do not occur through that vector.

Another feature of advanced threat intelligence is the ability to gain qualified, contextual insights into the actual threat actors and campaigns affecting your organization or sector. Graphical representations of kill chains mean you can practise on highly realistic attack simulations ahead of time, patching potential vulnerabilities and minimizing your attack surface.

Passwords are regularly exploited by attackers because simple security measures are not consistently enforced. A recent Tripwire survey of IT security professionals found that one-third do not require users to change default passwords. Many organizations also fail to crackdown on things like password reuse, employees sharing credentials and users forming passwords with dictionary-based words.

While organizations have increased their use of two-factor authentication to protect access to critical data, attackers have become more adept at circumventing this with stolen passwords. An improved measure is multi-factor authentication (MFA) where more than two factors are required. This is particularly effective in conjunction with one-time passwords (OTPs), which typically expire within 5 minutes and remove the need for users to memorize multiple passwords or place them in a password vault that will inevitably come under attack.

The Center for Internet Security (CIS) offers a diligently researched and updated set of 140+ free to access configuration guidelines for operating systems, cloud providers, server software and desktop software as well as mobile, network and even multifunction print devices. Developed and accepted by government, business and academia, base-level versions of the benchmarks can be implemented simply and rapidly, while more detailed level 2 benchmarks address the needs of the most security-conscious organizations. The US DoDs Defense Information Systems Agency (DISA) publishes similar materials in the form of Security Technical Information Guidelines (STIGs).

Validating your approach with these best-practice benchmarks is labor-saving, plus it allows you to benefit from world-class security resources. Each institution regularly updates its canon in line with system versions and high-level changes to the overall threat landscape.

The key to emerging from cyberattacks intact is discovering them as fast as possible. It suits the cyberattacker to remain silently undetected, particularly when motivated by commercial gain rather than conspicuous disruption. However, not everyone uses fit-for-purpose threat intelligence, which is why the average timelag is 206 days. And each day that attacks go undetected enables attackers to compromise more data. Literally billions of data records were exposed in 2019, many from exploits that lay undetected for weeks if not months.

The problem of spotting new devices on your network is exacerbated by the rapid growth in IoT endpoints. 57% of IT security pros said it takes them hours, weeks or longer to detect these far too long given that cyberattackers only need a few minutes within which to launch a successful attack.

There are lessons to be learned outside of the cyber paradigm, at those sectors where the mindset needed to adopt standard safety hygiene has evolved to become second nature. You cant help but notice it on construction sites in the form of bold signage, specialist apparel and regular inspections.

On hospital wards its less visible but just as ingrained: despite all the advanced drugs and technological therapies money can buy, washing hands and keeping dressings clean is the baseline for medical care.

Thats the objective your organization should have for cyber-hygiene; make these measures so obviously beneficial for everyone that it becomes fully ingrained.

The post Eight ways to improve cyber-hygiene in the enterprise appeared first on Blueliv.

Recent Articles By Author

*** This is a Security Bloggers Network syndicated blog from Blueliv authored by Joshua Hoppen. Read the original post at: https://www.blueliv.com/cyber-security-and-cyber-threat-intelligence-blog-blueliv/improve-cyber-hygiene-enterprise/

Originally posted here:
Eight ways to improve cyber-hygiene in the enterprise - Security Boulevard

Read More..

Internet security Market 2020 | Applications, Challenges, Growth, Shares, Trends and Forecast To 2026 – Packaging News 24

The report on the Internet security Market is a compilation of intelligent, broad research studies that will help players and stakeholders to make informed business decisions in future. It offers specific and reliable recommendations for players to better tackle challenges in the Internet security market. Furthermore, it comes out as a powerful resource providing up to date and verified information and data on various aspects of the Internet security market. Readers will be able to gain deeper understanding of the competitive landscape and its future scenarios, crucial dynamics, and leading segments of the Internet security market. Buyers of the report will have access to accurate PESTLE, SWOT, and other types of analysis on the Internet security market.

Global Internet security Market was valued at USD 32.67 Billion in 2017 and is projected to reach USD 61.42 Billion by 2025, growing at a CAGR of 8.2% from 2018 to 2025.

Get | Download Sample Copy @ https://www.verifiedmarketresearch.com/download-sample/?rid=5846&utm_source=PN24&utm_medium=003

Popular Players

Competition is a major subject in any market research analysis. With the help of the competitive analysis provided in the report, players can easily study key strategies adopted by leading players of the Internet security market. They will also be able to plan counterstrategies to gain a competitive advantage in the Internet security market. Major as well as emerging players of the Internet security market are closely studied taking into consideration their market share, production, revenue, sales growth, gross margin, product portfolio, and other significant factors. This will help players to become familiar with the moves of their toughest competitors in the Internet security market.

The report is just the right tool that players need to strengthen their position in the Internet security market. It is also the perfect resource that will help players to sustain their lead or achieve a competitive position in the Internet security market.

Key Players Mentioned in the Internet security Market Research Report:

Top Segments

The segmental analysis section of the report includes a thorough research study on key type and application segments of the Internet security market. All of the segments considered for the study are analyzed in quite some detail on the basis of market share, growth rate, recent developments, technology, and other critical factors. The segmental analysis provided in the report will help players to identify high-growth segments of the Internet security market and clearly understand their growth journey.

Ask for Discount @ https://www.verifiedmarketresearch.com/ask-for-discount/?rid=5846&utm_source=PN24&utm_medium=003

Leading Regions

The authors of the report have analyzed both developing and developed regions considered for the research and analysis of the Internet security market. The regional analysis section of the report provides an extensive research study on different regional and country-wise Internet security markets to help players plan effective expansion strategies. Moreover, it offers highly accurate estimations on the CAGR, market share, and market size of key regions and countries. Players can use this study to explore untapped Internet security markets to extend their reach and create sales opportunities.

Get Customized Report in your Inbox within 24 hours @ https://www.verifiedmarketresearch.com/product/global-internet-security-market-size-and-forecast-to-2025/?utm_source=PN24&utm_medium=003

Highlights of the Report

About Us:

Verified market research partners with clients to provide insight into strategic and growth analytics; data that help achieve business goals and targets. Our core values include trust, integrity, and authenticity for our clients.

Analysts with high expertise in data gathering and governance utilize industry techniques to collate and examine data at all stages. Our analysts are trained to combine modern data collection techniques, superior research methodology, subject expertise and years of collective experience to produce informative and accurate research reports.

Contact Us:

Mr. Edwyne FernandesCall: +1 (650) 781 4080Email: [emailprotected]

TAGS: Internet security Market Size, Internet security Market Growth, Internet security Market Forecast, Internet security Market Analysis, Internet security Market Trends, Internet security Market

Read more:
Internet security Market 2020 | Applications, Challenges, Growth, Shares, Trends and Forecast To 2026 - Packaging News 24

Read More..