SecurityBrief UK - Technology news for CISOs & cybersecurity decision-makers

Mila stories - Page 124

Mila is a research institute and innovation hub focused on advancing artificial intelligence from the lab into real-world impact. Stories under this tag explore how Mila collaborates with industry, investors and policymakers to turn strong AI research foundations into thriving startup ecosystems and practical applications.

By reading Mila-tagged articles, you’ll gain insight into how AI research organizations are shaping investment priorities, influencing venture capital flows and advocating for the infrastructure needed to scale cutting-edge ideas. These stories highlight the strategies, partnerships and policy recommendations that can help transform scientific advances in AI into sustainable companies and long-term economic value.

Thinkstockphotos 669476796

Here's why WannaCry might be the tip of the iceberg

Wed, 7th Jun 2017
#
malware
#
ransomware
#
cybersecurity
Much ink is still being expended trying to determine who was responsible for WannaCry and what their motives were. But there's a bigger lesson here.
Thinkstockphotos 509617708

Gartner reveals four major forces powering the security software market

Thu, 1st Jun 2017
#
risk & compliance
#
cybersecurity
#
mssp
The security market is going through a major shakeup as advanced analytics, SaaS, managed services, and other trends explode, says Gartner.
Iot analytics

Rockwell Automation CEO discusses future of industrial IoT

Tue, 30th May 2017
#
iot
#
iiot
#
rockwell automation
Blake Moret spoke on the Internet of Things (IoT) and its impact on industrial productivity at the recent Cisco IoT World Forum in London.
Thinkstockphotos 491525994

Hackers target subtitle files in major media players - including VLC

Mon, 29th May 2017
#
malware
#
digital entertainment
#
cybersecurity
VLC, Kodi, Popcorn-Time and strem.io media players have vulnerabilities that allows attackers to take over your entire device.
Thinkstockphotos 469419470

Forcepoint expands with new cybersecurity analytics & data centre offerings

Fri, 26th May 2017
#
hyperscale
#
dc
#
casb
Forcepoint introduces updated cloud security portfolio, aiming to accelerate secure adoption of cloud applications.
Thinkstockphotos 453612803

The birth of Cyxtera Technologies: BC Partners and Medina Capital join forces

Fri, 5th May 2017
#
hyperscale
#
colocation
#
centurylink
BC Partners and Medina Capital announce Cyxtera Technologies' launch, a $2.8bn merger forming a commanding presence in global data centre security.
Thinkstockphotos 479631160

Fake Chrome extensions inject code into web pages

Tue, 2nd May 2017
#
malware
#
digital entertainment
#
cybersecurity
Recently, here at our research lab, we have seen an increase in the number of JS/Chromex.Submelius threats detected.
Thinkstockphotos 674757016

Carbon Black: How to set up a threat hunting program

Mon, 1st May 2017
#
endpoint protection
#
edr
#
threat intelligence
UK firms urged to proactively hunt cyber threats by mastering OS intricacies and tailoring threat hunting teams to bolster digital defences.
Thinkstockphotos 531430677

TrickBot malware ramps up attacks against ANZ financial firms

Mon, 1st May 2017
#
malware
#
cybersecurity
#
ibm security
Attackers behind the TrickBot Trojan have been taking their tactics to the next level, researchers from IBM X-Force have uncovered.
Thinkstockphotos 493888509

Big data and machine learning make compelling argument for security

Wed, 26th Apr 2017
#
data analytics
#
martech
#
planning
Big data and machine learning help organisations identify security breaches, according to a report by the Ponemon Institute.
Thinkstockphotos 475507032

Why stakeholder collaboration is key to your cloud success

Fri, 21st Apr 2017
#
devops
#
apm
#
cybersecurity
However, adoption of the cloud often starts with the infrastructure team and fails to bring other key teams along on the journey.
Thinkstockphotos 488253356

Zero day distributing FINSPY espionage malware and LATENTBOT malware

Tue, 18th Apr 2017
#
malware
#
breach prevention
#
cybersecurity
FireEye recently identified a vulnerability – CVE-2017-0199 – that allows a malicious actor to download and execute a Visual Basic script.
Thinkstockphotos 187890557

Don't buy the elixir of youth: Machine learning is not magic

Tue, 18th Apr 2017
#
malware
#
ai
#
cybersecurity
If someone told you they had a magic elixir that would heal all your illnesses or injuries, and make you young again, would you believe them?.
Thinkstockphotos 178998470

Google's hacking contest 'Project Zero' was a flop: What went wrong?

Tue, 11th Apr 2017
#
google
#
exploits
#
technology gifts
Not a single person claimed Google's Project Zero prizes, even after six months of being open to participants.
Thinkstockphotos 519335432

Dridex banking trojan targets Australian organisations

Tue, 11th Apr 2017
#
email
#
trojan
#
proofpoint
Proofpoint has detected a massive spike in Dridex banking trojans that are targeting Australian organisations.
Thinkstockphotos 83017290

A brief history: How Broadcom, Brocade & Extreme Networks got together

Wed, 5th Apr 2017
#
martech
#
commerce systems
#
casb
In a bold move, Extreme Networks snaps up Brocade's data centre biz from Broadcom for $55m, bolstering its enterprise solution portfolio.
Thinkstockphotos 655596958

Don't pay for what is for free: Malicious Adobe Flash Player app found on Google Play

Wed, 5th Apr 2017
#
malware
#
martech
#
cybersecurity
F11 did not contain any harmful code. Instead, it relied purely on social engineering, tricking users into paying €18 ($19) for Adobe Flash Player.
Thinkstockphotos 86805750

Don't let an aging UPS bring you down: Assess your replacement options

Mon, 27th Mar 2017
#
datacentre infrastructure
#
hyperscale
#
dc
Aged UPS units pose critical risks; time to evaluate newer, efficient alternatives and avert potential IT disasters.
Thinkstockphotos 621358098

Comparing master data management with application data management

Mon, 20th Mar 2017
#
data management
#
opinion
#
analyst report
Gartner Analysts delve into MDM vs. ADM, unravelling the complexities of data governance from tactical perspectives.
Thinkstockphotos 486740544

Unit 42 reports 'Blank Slate' malspam campaign pummels hosting providers in 'cycle of abuse'

Tue, 14th Mar 2017
#
malware
#
firewalls
#
network infrastructure
Unit 42 has provided an inside look at how a malicious spam campaignis using double-zipped Word files to spread ransomware on Windows computers.