The Cognitive Era of Security

October 18, 2016

Application of Cognitive Computing to Cyber Security. Understanding of natural language, images and other sensory information. Complex reasoning and deep interaction with experts. Hypothesis and question generation across arbitrary domains; meta-heuristic to automate algorithm choices.

Spotlight

San Pedro Valley

The Startups community of Belo Horizonte! San Pedro Valley was born from the initiative of entrepreneurs who realized the potential of innovation in the city. Today, it is a self-managed by their own startups community, which operates by common interests, seeking visibility, investment, validating ideas, solutions, and community building. The Startups scenario of Belo Horizonte had his first highly visible when the Akwan, Startup created by UFMG teachers, became the first acquisition of a Startup outside the US by Google. Some years later, a group of young entrepreneurs who have set up their startups in the San Pedro neighborhood region in BH and is often found in cafes and restaurants in the area, toyed with the fact that many technology companies are located there, raising the likeness of region with the Silicon Valley, USA. Thus arose the name San Pedro Valley.

OTHER WHITEPAPERS
news image

MEC security; Status of standards support and future evolutions

whitePaper | September 28, 2022

The present White Paper will focus on MEC (Multi-access Edge Computing) technologies and intends to explore security-related use cases and requirements with the aim of identifying aspects of security where the nature of edge computing results in insufficient industry approaches to cloud security. Edge computing environments are by nature characterized by a complex multi-vendor, multi-supplier, multi-stakeholder ecosystem of equipment including both HW and SW devices. Given this overall level of system heterogeneity, the areas of security, trust, and privacy are key topics for the edge environments. Finally, the advent of edge cloud federations and the presence of (far) edge devices, e.g., in Internet-ofThings environments, requires tackling MEC security with an end-to-end (E2E) approach by leveraging existing standards relevant in the area, as carefully selected to be applicable in edge computing systems.

Read More
news image

Addressing The New Threat in Modern It Infrastructures

whitePaper | December 29, 2022

Data has become a new global currency. As with other currencies, it has also become a target for threats from those who wish to exploit its value. Ransomware is the new threat to data and it’s wreaking havoc on businesses of all sizes around the world. Until recently, if you ask an IT organization to describe typical causes for service outages they would most likely mention network failures, power failures, hardware failures, user error, etc. In today’s world, we can add ransomware to that list.

Read More
news image

Adobe Operational Security Overview

whitePaper | December 30, 2022

With a cloud footprint that includes public and private clouds across different providers, the Adobe® multi-cloud strategy requires consistent and repeatable guardrails that are readily available to our product and service teams. To that end, our dedicated operational security team focuses on securing cloud resources at scale and helping ensure the safety and security of customer applications and data within our continually evolving cloud infrastructure operations.

Read More
news image

Supercharge Your DLP Security Program

whitePaper | December 22, 2022

Today’s digitally transformed organizations handle vast volumes of data that is at perpetual risk for loss and leakage, either intentionally through data breaches or unintentionally through employee errors. With cybercrime damages expected to reach $10.5 trillion annually by 2025, 1 organizations must protect their threat surface holistically.

Read More
news image

Data Security: The Key to Defeating Ransomware Attacks

whitePaper | May 26, 2022

Ransomware attacks have become increasingly pervasive and pernicious. Many organizations have suffered from at least one ransomware attack, and many ransomware victims have unfortunately been left with no resort other than paying the ransom and hoping to recover their data.

Read More
news image

Identity and Zero Trust: A Health-ISAC Guide for CISOS

whitePaper | August 25, 2022

These days, you can’t have a conversation about cybersecurity without talking about zero trust. The security concept requires that all individuals and devices on a network be continuously authenticated, authorized, and monitored. Gone are the days of letting someone in the front door, giving them a role with access privileges and then having them go about their merry way.

Read More

Spotlight

San Pedro Valley

The Startups community of Belo Horizonte! San Pedro Valley was born from the initiative of entrepreneurs who realized the potential of innovation in the city. Today, it is a self-managed by their own startups community, which operates by common interests, seeking visibility, investment, validating ideas, solutions, and community building. The Startups scenario of Belo Horizonte had his first highly visible when the Akwan, Startup created by UFMG teachers, became the first acquisition of a Startup outside the US by Google. Some years later, a group of young entrepreneurs who have set up their startups in the San Pedro neighborhood region in BH and is often found in cafes and restaurants in the area, toyed with the fact that many technology companies are located there, raising the likeness of region with the Silicon Valley, USA. Thus arose the name San Pedro Valley.

Events