Join today’s leading executives online at the Data Summit on March 9th. Register here.
As Russia’s invasion of Ukraine continues unabated, it’s becoming a test case for the role of technology in modern warfare. Destructive software — presumed to be the work of Russian intelligence — has compromised hundreds of computers at Ukrainian government agencies. On the other side, a loose…
Join today’s leading executives online at the Data Summit on March 9th. Register here.
When Oklahoma shifted into remote work at the start of the pandemic in 2020, the security issues involved with having employees working from home manifested almost immediately.
Join today’s leading executives online at the Data Summit on March 9th. Register here.
CISOs’ time and teams are stretched too thin, keeping remote and hybrid workforces as well as the fast-growing number of machine-based endpoints secure from new, unpredictable…
Join today’s leading executives online at the Data Summit on March 9th. Register here.
Gaps in endpoints are the fuel that’s driving an increasingly intense arms race between bad actors and cybercriminal gangs versus cybersecurity vendors and organizations they protect. The arms race in endpoint security is accelerating, thanks to the increasingly aggressive use of AI and ML by bad…
Join today’s leading executives online at the Data Summit on March 9th. Register here.
At A.S. Watson Group, a global health and beauty retailer, shifting employees into the home meant that many of the company’s critical cybersecurity tools were no longer…
How AI-powered XDR can secure the hybrid workforce
March 4, 2022
Join today’s leading executives online at the Data Summit on March 9th. Register here.
A year ago, NOV Inc. was in the middle of evaluating a new security product to help with securing its globally distributed workforce, spread across more than 60 countries. The…
Join today’s leading executives online at the Data Summit on March 9th. Register here.
Bad actors know all they need to do is find one unprotected machine identity, and they’re into a company’s network. Analyzing their breaches shows they move laterally across systems, departments, and servers, looking for the most valuable data to exfiltrate while often embedding ransomware. By…
Join today’s leading executives online at the Data Summit on March 9th. Register here.
As large, powerful AI models like OpenAI’s text-generating GPT-3 come into wider use, the hardware traditionally used to train these models — mostly GPUs — will have to be…
Luminous Computing, which is developing a light-based AI accelerator chip, raises $105M
March 3, 2022
Join today’s leading executives online at the Data Summit on March 9th. Register here.
According to some experts, the growth in the compute power necessary to develop future AI systems might run up against a wall with mainstream chip technologies. While startups like…
Join today’s leading executives online at the Data Summit on March 9th. Register here.
Today, AI threat detection provider CardinalOps announced it had raised $17.5 million as part of a Series A funding round led by Viola Ventures, to expand its go-to-market and product innovation.
The company’s solution provides enterprises with a cloud-based AI platform that automatically generates…