
Protecting workstations: How not to overblock
To reduce the attack surface you can block many vulnerable features of software. The question is, how can you do that but not interfere with business-processes?
29 articles
To reduce the attack surface you can block many vulnerable features of software. The question is, how can you do that but not interfere with business-processes?
Artificial intelligence assists judges, police officers, and doctors. But what guides the decision-making process?
Any piece of malware can be captured if you know it for what it is — for example, if you use a trainable behavioral model.
Effective protection of industrial facilities requires permanent monitoring of both information systems and operational processes. We have just the tool.
Google’s new E-Screen Protector prompts users when prying eyes are on their smartphone screen. Is this technology useful?
The essence of the HuMachine concept is a fusion of big data, machine learning, and our analysts’ expertise. But what is behind these words?
Lately, tech companies have gone crazy about machine learning. What is machine learning, and what are its implications? Here’s our take on this technology.