The quest for digital transformation has guided business strategies today, and in this context, several pillars of IT stand out, among them: software development (look around and ask yourself: how far do you is a software application?), and information security, whose value lies in risk reduction (o
Microsoft has begun implementing a new authentication technology in its online services called FIDO2. With this, you and an additional 800 million people will be able to access Outlook, Skype, Xbox Live, OneDrive and others without typing passwords or usernames. This is just one more of Mic
Facebook and Instagram are using Artificial Intelligence technologies to proactively detect images related to drugs of abuse without there being any need for such content to be previously reported by the user community. The measure aims to make social networks less attractive to potential sellers of
Before we go into the subject of probabilities, behavior, linear algebra ... it is very interesting to clarify well what is "Machine Learning". Machine Learning is nothing more than a new name for something very old; is just a new terminology for a set of equations and algorithms based almo
Information represents one of the most important assets for any business, and the amount of data companies have been working with is increasing every day. This makes information security a key issue by entering the list of the most important strategies for a well-assembled IT infrastructure.
The difference between ransomware and typical malware is in the effects. In a ransomware attack, the data is encrypted and the decryption key is not provided until a redemption is paid. Already the malware attempts to damage or disable computers and systems, reports Gartner. "The good news
Here is a sincere question to ask you: do you know how much your digital campaigns are exposed to fraud? How secure are your data and data on your leads? How safe are the consumers who are making a purchase on your site? In digital marketing, fraud is a real problem. So real that, by 2015 a
AT&T Inc said on Tuesday that it has agreed to buy privately held Silicon Valley-based startup AlienVault, allowing the telecommunications giant to expand its line of cybersecurity products targeted at small and medium businesses. Terms of the deal were undisclosed, but the transaction is e
CrowdStrike, an AI-powered cybersecurity platform specializing in endpoint protection and threat intelligence, has raised $200 million in a series E round of financing co-led by Accel, General Atlantic, and IVP, with participation from existing investor CapitalG — Alphabet’s late-stage v
The news often reports on incidents involving large corporations facing massive data breaches where the personal information of millions of consumers was potentially leaked. However, we don't often hear reports about the hacking of small businesses, mainly because these types of attacks aren't publi
The amount of healthcare breaches has increased slightly since August 2017, yet individuals/records affected has decreased during this same time period. In the month of August, healthcare providers experienced 28 breaches with 695,225 individuals/records affected; yet in September, healthcare provid
What to Expect in 2017 2016 saw an alarming number of Canadian organizations (public and private) become victims of malicious cyberattacks and data breaches. Hackers did not discriminate who they targeted – victims included financial institutions, universities, hospitals, government agencies,