Subscribe to DSC Newsletter

All Blog Posts Tagged 'Security' (22)

Why Is It Time for Your Company to Invest in Cloud ERP?

Businesses need to effectively manage and plan their day-to-day activities, business strategies and future planning. To efficiently collect and manage all such…

Continue

Added by Samual Alister on March 28, 2019 at 1:30am — No Comments

How Single Sign-On Helps to Control the Flow of Information

Companies are ramping up their adopting of cloud-based Software-as-a-Service applications. Public cloud spending is expected to reach over $206 billion in 2019.…

Continue

Added by Evan Morris on March 4, 2019 at 9:00pm — No Comments

Adversarial Attacks on Deep Neural Networks: an Overview

Introduction

Deep Neural Networks are highly expressive machine learning networks that have been around for many decades. In 2012, with gains in computing power and improved tooling, a family of these machine learning models called ConvNets started achieving state of the art…

Continue

Added by Anant Jain on February 10, 2019 at 5:49pm — No Comments

5 Risks must be addressed by businesses and governements (AI can be magic wand for such cases of risk)

Players in ecommerce, entertainment, finance, Internet and social media space drive and influence risk indicators for not just for themselves but for users of Internet and increasingly to larger society as side effects spread to social, political and economic scenarios. Any risks from above domains are dominant and may easily be extrapolated in domains too.

There are five risks that may influence society negatively and turn in to resistance force for adoption of digital…

Continue

Added by Chandra Shekhar on January 1, 2019 at 11:00pm — No Comments

Why Data Governance should be on the CEO’s Plate

Traffic policewoman in Pyongyang

 

World-famous Pyongyang policewomen, who are reportedly picked by North Korea’s Supreme Leader himself, have garnered a cult following and even have a website devoted to them, quite a rarity in the North Asia country. The job is seemingly held in high esteem, with only the best being hired.

Traffic in…

Continue

Added by Pedro URIA RECIO on September 14, 2018 at 2:37am — No Comments

AI-Driven Sales | What Has Changed?

Sales Forecasting: Science or Instinct?

Recently, we had talked about marketing automation, a digital transformation in the field that involved both artificial intelligence and machine learning. Even Natural Language Processing (NLP) has come a long way, enough to change the content marketing game. But while marketing has shifted to a digital…

Continue

Added by Jay Nair on June 5, 2018 at 5:30pm — No Comments

AI-Driven Marketing | What Has Changed?

Technology is known to shift landscapes, even change the game. We saw that when the internet exploded in scale and popularity, as computers became smarter, and the world goes through the digital transformation. An easy example is in traditional marketing, which now borders on the irrelevant, unable to hold a candle to its more modern counterparts.

Email, search…

Continue

Added by Jay Nair on May 18, 2018 at 4:30pm — No Comments

Three Stages Of Effective Data Governance In Healthcare

  • Is data governance critical for you?
  • Would you want to build a flexible data governance strategy, iteratively realizing the benefits as it evolves?
  • Would you have big data oriented programs, generating a vast amount of data?
  • Would you want a governance strategy around individual programs or rolled up into some logical grouping?
  • Would you want to improve over your existing governance strategy?
  • Would you have…
Continue

Added by Vijay Kumar on August 1, 2017 at 12:30am — No Comments

Global Cyber Security Market Worth Over $150 Billion by 2021

Global Cyber Security Market – Overview

Cyber Security market is expected to grow with the CAGR of ~8% - 11% during 2016 to 2021, owed to which it is predictable to cross USD $150 billion by 2021, assures the Market Research Future in one of its recently published study report - “Global Cyber Security Market Research Report Forecast 2017- 2021”

With growing industries and preference for centralization amongst the organizations; the computer based systems have become an…

Continue

Added by Sagar kadam on April 27, 2017 at 6:30pm — No Comments

A Walk Through of New Age Endpoint Protection Software to Secure Corporate Environment

Cybersecurity began with the antivirus. It was the antivirus software that we relied on to secure systems and networks, plus of course endpoint devices too. But today, with technology evolving in an unprecedented manner, traditional antivirus has given way to all kinds of advanced security software.

Endpoint protection is today almost impossible with traditional endpoint antivirus. We have new attack techniques like polymorphic malware, wrappers and packers, which would go…

Continue

Added by Emily Lauren on October 14, 2016 at 2:00am — No Comments

Polymorphic Malware Detection Using Sequence Classification Methods

A pdf version of this document created using latex can be downloaded by clicking here.

Abstract



Polymorphic malware detection is challenging due to the continual mutations miscreants introduce to successive instances of a particular virus. Such changes are akin to mutations in biological sequences. Recently, high-throughput methods for gene sequence…

Continue

Added by Jake Drew Ph.D. on May 22, 2016 at 6:32pm — No Comments

Cloud Security Market - Market Trends

Growing need for data security and prevention of data loss and theft are driving the global cloud security market. Companies need to protect privileged and confidential information such as intellectual property information, employee information, patents as well as pending patents, nondisclosure agreements, financial information, and others. Cloud-based security…
Continue

Added by James White on January 17, 2016 at 9:30pm — No Comments

Data Center Security - Hacking and Data Intrusion events across the world are driving the demand for this solution

Data centers are used for centralizing the IT operations in organizations; further, they assist in the management, storage, and dissemination of organizations data. Data centers include organization’s most critical data and are responsible for continous operations of the organziations. They manage infromation technology systems and back-end data storages of…
Continue

Added by James White on January 4, 2016 at 7:57pm — No Comments

Data Scientists Must Focus on Data Security Risk - Cyber Risk Report 2015

Last week we discussed the importance of data scientists prioritizing client confidentiality and the concern of exposing high-value information to…

Continue

Added by Michael Walker on October 1, 2015 at 8:07pm — No Comments

Harnessing Big Data for Security: Intelligence in the Era of Cyber Warfare.

BASICS: DEFINING BIG DATA AND RELATED TECHNOLOGIES.

According to Gartner.com , Big Data is high-volume, high-velocity and high-variety information assets that demand cost-effective, innovative forms of information processing for enhanced insight and decision making.

Are there examples of Big Data in action at major global IT giants?

It is…

Continue

Added by Christopher Alvin Mokaya on June 14, 2015 at 11:00am — No Comments

SMBs and the Cloud: Things to Consider Before Adopting Cloud Strategies

For a very long time, businesses had their documents filed in folders and stored in huge metal cabinets. But thanks to advances in technology, they were eventually coded and stored digitally. As we advance through the Age of Information, the traditional digital storage devices like the floppy, compact, and flash discs evolved into cloud storage. Eric Griffith, a…

Continue

Added by Kyle Albert on October 23, 2014 at 5:51am — No Comments

Big Data Applications Scaling Using Java Architecture in the Cloud

As an individual user, we are no longer living the world of one computer, rather we are living with living and distributed smart devices. Let us first explore a Single-User/Single-Server Architecture that we used in those times, which we survived, without of much hassle either, we still use this architecture most of the time.

A Single user still use to approach a network via a web application with a local front cache, which then allows user to access requested material as per the…

Continue

Added by Atif Farid Mohammad on December 10, 2013 at 8:54am — No Comments

SOA, Cloud Computing and Big Data Security

Let us start with some jargons and distill these into some meaningful things to be understood by us the only intelligent autonomous system in other words humans.

 

SaaS – Applications focused on end-users, used internet as a medium, e-mail, salesforce etc.

PaaS – Set of tools focused on developers, such as Ruby on Rails, Python, Eclipse, REST, SOAP, Oracle.

IaaS – Complete software and hardware solutions, VMware, Amazon EC2, Rackspace Cloud, Google Compute…

Continue

Added by Atif Farid Mohammad on November 22, 2013 at 9:22am — No Comments

Privacy vs. Security and Data Science

"They that can give up essential liberty to obtain a little temporary safety deserve neither liberty nor safety." – Benjamin Franklin

Recent revelations concerning the…
Continue

Added by Michael Walker on June 12, 2013 at 3:30pm — No Comments

Smart Data Scientists Virtualize Data

Smart data scientists use data virtualization to integrate data from many diverse sources - logically and virtualized for on-demand consumption by different data analytical applications. For example, data virtualization is used to address challenges such as rogue data marts, business…
Continue

Added by Michael Walker on May 16, 2013 at 6:30pm — 2 Comments

Monthly Archives

2019

2018

2017

2016

2015

2014

2013

2012

2011

1999

Videos

  • Add Videos
  • View All

© 2019   Data Science Central ®   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service