Uber recently applied for a patent to use artificial intelligence to spot drunken drivers in a move that has cyber-security professionals questioning the privacy implications of such software.
As Israel's Cyber Week kicked off, SC Media UK met up with Professor Isaac Ben-Israel, head of Blavatnik ICRC, director at the Cyber Security Research Centre (Yuval Ne'eman Workshop for Science, Technology and security).
In the opening presentation of Reset 2018, Mary Haigh, product director BAE Systems dissected the analogy of cyber-immune systems and biological immune systems, concluding there were indeed parallels - but its not an exact fit.
Reset 2018, held in central London yesterday, is a cyber-security conference with a difference, comprising insights from 15 female experts in cyber-security explaining the evolving cyber-threat landscape.
The shipping industry's cyber-security is still in its infancy and prone to attacks which could allow a threat actor to track, hijack, or even sink a vessel along with other ways to disrupt the shipping industry.
As an industry we need to change the hunter-hunted narrative altogether if we're to inspire the kind of proactive approach to cyber-security which organisations desperately need. We must run with the bulls, not wait to react.
The biometric side of the cyber-security equation is getting ready to put fingerprint readers in its rear-view mirror as newer technologies coming into the market prove more capable.
Another chink has developed in the Apple operating system's usually tough ability to ward off cyber-security issues with a new cryptocurrency miner being discovered that is hitting macOS devices.
The US Department of Homeland Security (DHS) and the Department of Transportation (DoT) joined forces to create a cyber-security implementation and operational primer to secure US federal vehicle fleets.
Even though thousands of smart devices are being regularly connected to enterprise networks, many organisations do not have security policies for connected devices, or their employees do not follow existing policies by the book.
Needing constant human input for AI training in cyber-security defeats the purpose of reducing the required human labour. Unsupervised learning is a whole other challenge. But AI needn't be 100 percent supervised or unsupervised.
Magnus Carling, the Chief Information Security Officer (CISO) of Stena AB, spoke with SC's Grace Johansson about cyber-security threats and the Scandinavian shipping line Stena.
*SPONSORED CONTENT* Discussing 'the true value of actionable intelligence', SC Media UK's latest roundtable saw a gathering of senior cyber-security practitioners to discuss actionable threat intelligence.
Microsoft's Office 365 has been found vulnerable to attack methodology that enables malicious links to sneak past most of the product's cyber-security defences by splitting off the dangerous part of the link to it is not spotted.
In the past couple of years, while we have seen a rise in businesses adopting new cyber-security policies, such measures have not been able to curb the rise of malicious malware and cyber-weapons used against healthcare.
Until governments catch up with IoT security standards and regulation the industry needs to establish a commercial IoT security testing standard and share best practices for IoT risk mitigation.
Many smaller businesses are still complacent about security, assuming that they are safe from malicious attacks when, in reality, it's quite the opposite. SMEs are seen as a 'gateway' to the larger organisations.
The Prime Minister has announced that the UK will give up to £15 million to the Commonwealth countries to help them strengthen their cyber-security capabilities and help tackle cyber-criminal groups as well as hostile state actors.
Ikea's freelance labour marketplace Task Rabbit temporarily shut down its app and website amid an investigation of a "cyber-security incident."
Possibly the second most ambitious crossover in history after Infinity War. Thirty eight companies have signed an accord to develop long-term, wide-reaching cyber-security akin to a "Digital Geneva Convention."
What do cybersec professionals need to know to build a cyber-business? Guidance from one of the UK's leading cyber-security accelerators.
A £13.5 million cyber-innovation centre is to be built at London's Queen Elizabeth Olympic Park, intended to boost the thriving East London digital cluster and help create 2,000 UK jobs in cyber-security.
Implementation of basic cyber-security practices isn't just down to the IT department, however, but needs to be enforced at all levels of an organisation, from the very top to the very bottom.
Businesses, under constant threat of cyber-attack, have been forced to change the way they view and manage cyber-security to ensure they're not leaving themselves vulnerable.
Cyber-security researchers from four major universities have disclosed a new processor-based vulnerability called BranchScope similar to Spectre/Meltdown, but is immune to the fixes put in place that patch those vulnerabilities.
Use the lessons learned from past attacks, ensure security is a high priority in the organisation and train staff appropriately, plus source solutions that are both reputable, transparent and independently audited.
The UK is responding to finding itself in conflict with Russia by flaunting its cyber-skills and promoting exports to its allies with a new cyber security export strategy.
As DevOps is becoming DevSecOps, cloud is being put at the heart of cyber-security by some; a cloud-first approach to cyber-security puts you at a starting point of natively operationalising security so it can scale with demand.
The widespread drive to adopt cloud services is exposing a growing rift in UK enterprises between speed of adoption and cyber-security, according to a new study.
The fact is that 'shoulder-surfing' or 'visual hacking' is a threat to organisational data that is just as serious as any other, and not one to be ignored.