SecurityBrief UK - Technology news for CISOs & cybersecurity decision-makers

Mila stories - Page 131

Mila is a research institute and innovation hub focused on advancing artificial intelligence from the lab into real-world impact. Stories under this tag explore how Mila collaborates with industry, investors and policymakers to turn strong AI research foundations into thriving startup ecosystems and practical applications.

By reading Mila-tagged articles, you’ll gain insight into how AI research organizations are shaping investment priorities, influencing venture capital flows and advocating for the infrastructure needed to scale cutting-edge ideas. These stories highlight the strategies, partnerships and policy recommendations that can help transform scientific advances in AI into sustainable companies and long-term economic value.

Scams

Valentines beware: scams are targeting you

Thu, 11th Feb 2016
#
martech
#
email security
#
cybersecurity
Beware of Valentine's Day scams targeting lovebirds, warns antivirus provider Bitdefender. Fake offers and phishing attempts are on the rise.
Loyalty

Loyalty cards go mobile, according to new research

Tue, 9th Feb 2016
#
mobile wallet
#
analyst report
#
retail
More than 3bn loyalty cards will be mobile-only or integrated into mobile apps by 2020, up from 1.4bn last year.
Growth

Yotta looks to break into Aussie market with asset management platform

Fri, 22nd Jan 2016
#
market
#
distributors
#
it infrastructure
Infrastructure asset management provider Yotta is launching its latest version of the Horizon platform in a bid to break into the Australian market.
2016 goals

The CIO's resolutions for 2016 - it's never too late to improve

Wed, 20th Jan 2016
#
digital transformation
#
opinion
Do you believe New Year's resolutions are too old fashioned for the digital age? Marc Zuckerberg, the CEO of Facebook doesn't think so.
Facebook london

Inside Facebook's offices - what they really look like

Thu, 17th Dec 2015
#
facebook
#
social media
#
creative technologies
Take an exclusive tour behind Facebook's closed doors and discover the eclectic workspaces powering the global tech giant.
Security what a classic

Kiwi SMEs: Will you earn the 'cyber security tick'?

Mon, 14th Dec 2015
#
uc
#
breach prevention
#
cybersecurity
New Zealand launches cyber credentials scheme for small businesses to encourage good cyber security practices.
Down and out

Cyber security could come to affect your credit rating

Tue, 1st Dec 2015
#
fintech
#
cybersecurity
#
finance, leasing & rental
When it comes to credit analysis, eventually cyber threats will be seen in a similar vein as other extraordinary event risks, such as natural disaster.
Business expansion

NetComm Wireless establishes itself in the US

Fri, 27th Nov 2015
#
uc
#
netcomm wireless
#
netcomm
NetComm Wireless has made a significant step forward in its global expansion plans and is further establishing itself in the United States.
Artificial intelligence

Report predicts dire impacts from AI

Wed, 25th Nov 2015
#
robots
#
ai
#
smart machines
New reports sound the alarm: Up to 35% of UK, 47% of US jobs at risk as AI advances could widen wealth gaps, leaving many struggling.
Servers

Lenovo ramps up hyper-converged push with Nutanix deal

Fri, 6th Nov 2015
#
converged infrastructure
#
lenovo
#
simplivity
Lenovo and Nutanix are joining forces to jointly develop, market and sell a family of Lenovo hyper-converged appliances powered by Nutanix software.
Mobile malware

Blue Coat sounds alarm on escalating mobile malware

Wed, 4th Nov 2015
#
malware
#
endpoint protection
#
edr
Blue Coat Systems has sounded the alarm for individual and organisations to strengthen mobile device defences after seeing an escalation in attacks.
Payment security

Visa and FireEye partner up, take on payments systems

Thu, 15th Oct 2015
#
martech
#
commerce systems
#
supply chain
Visa and FireEye partner to launch cyber intelligence service for the payments industry to identify and respond to attacks on systems.
Tppa

What we always knew: The TPP and Intellectual Property

Thu, 15th Oct 2015
#
government
#
opinion
#
nato
The recently leaked Trans-Pacific Partnership Agreement shows the corporate seizure of copyright & pharmaceutical protection.
Datacenter

SDN and SD-WAN on the rise

Fri, 9th Oct 2015
#
network infrastructure
#
sd-wan
#
hyperscale
Software-Defined Networking adoption in the data centre is gaining interest, with SD Wide-Area Networking emerging as the next wave of innovation.
Up and down

Tale of two markets for integrated platforms and infrastructure

Mon, 28th Sep 2015
#
integrated infrastructure and platforms market
#
analyst report
A tale of two markets is playing out between integrated platforms and integrated infrastructure systems, as one market booms and the other contracts.
Sharing ideas

Cloud Security Alliance establishes threat sharing scheme

Fri, 25th Sep 2015
#
cloud security
#
breach prevention
#
cloud security alliance
Collaboration between vendors and businesses is a crucial part of ensuring attack reports are up-to-the-minute and provide specific info about threats.
Mobile secuirty

Mobile security threats and trends, according to Gartner

Fri, 11th Sep 2015
#
risk & compliance
#
cybersecurity
#
healthtech
The threats to mobile security have not changed, but the consequences have, warns Dionisio Zumerle, research director at Gartner.
Cyber attacks ahead

Are you prepared for 'living off the land' attacks?

Wed, 9th Sep 2015
#
malware
#
network infrastructure
#
cybersecurity
Organisations, particularly those that are housing valuable or sensitive information, need to be on alert for threats that use little to no malware.
Gettyimages 1078377006

Leaping Tiger: the app which lets gamers find other gamers to play against

Mon, 7th Sep 2015
#
gaming
#
digital entertainment
#
technology gifts
Leaping Tiger, a location-based friend finding app for gamers, has gained over 6,000 users in 70 countries since its launch in May 2015.
Internet of things

How the IoT is changing the cybersecurity conversation

Thu, 3rd Sep 2015
#
iot
#
cybersecurity
#
it managers
The Internet of Things (IoT) is changing the nature of cybersecurity and redrawing the lines of IT responsibilities for the enterprise.