Implementing AI security solutions: A crawl-before-you-run strategy


source: | image:


In navigating the shift from burglar alarms to digital security systems, many organizations are adopting artificial intelligence (AI) to bolster their security postures. In fact, a large majority of security operation centers (SOCs) employ AI and machine learning tools to detect advanced threats. However, not all AI is created equal and reaching too high too quickly with technological solutions can leave security teams with unclear or inefficient workflows. To get the most out of new technologies, security practitioners should focus on starting small with foundational AI technologies in order to lay the groundwork for a more reliable and mature security system.

It’s important to keep in mind that AI technology is still maturing every day. New AI tools for security, often related to computer vision and surveillance camera analytics, are continually surfacing on the market. Often many organizations feel pressured to try the “latest and greatest” and end up testing expensive solutions that don’t deliver what they promise, which turns them off to using AI entirely.

In some cases, too-advanced systems can provide a lower ROI 

In most fields these promises are easy to see through and organizations quickly become savvy to vendors that overpromise and underdeliver. For example, there is no AI that comes close to being able to flag “suspicious people,” and this also opens the doors for privacy and ethical issues.

Continue reading “Implementing AI security solutions: A crawl-before-you-run strategy”

China has won AI battle with U.S., Pentagon’s ex-software chief says

source: | image:


LONDON, Oct 11 (Reuters) – China has won the artificial intelligence battle with the United States and is heading towards global dominance because of its technological advances, the Pentagon’s former software chief told the Financial Times.

China, the world’s second largest economy, is likely to dominate many of the key emerging technologies, particularly artificial intelligence, synthetic biology and genetics within a decade or so, according to Western intelligence assessments.


















What Is Artificial Intelligence?

source: | image:

Artificial intelligence (AI) has become a red-hot topic, with record levels of investment in “AI” companies and promises of capabilities that will revolutionize our lives. Many are puzzling through how AI can add value, and a growing number of vendors claim to be “AI-powered.” Given the buzz and rush to wrap the mantle of AI around any new technology, it makes sense to ask the basic question, “What exactly is AI?”

Start with the practical definition that artificial intelligence is any technology that tries to replicate some broader aspect of human intelligence. I emphasize “broader,” as that’s where a fair amount of confusion emerges. Think, for example, of the ability to perform arithmetic. Most people would agree that this capability is uniquely human. But I doubt anyone would conclude that a calculator is built on artificial intelligence.

Continue reading “What Is Artificial Intelligence?”

How to Permanently Delete Your Facebook Account


If you’ve finally hit your breaking point, here’s how to say goodbye to Mark Zuckerberg’s empire.


THERE’S NEVER A bad time to delete your Facebook account: Chances are good you use it less than ever, and every time you do log on you’re greeted by a slurry of reheated viral news and life updates from two or three distant acquaintances. Now, though, feels like an especially good time to pull the plug.

There’s the ongoing series of Wall Street Journal stories that claim the company repeatedly ignored internal research about the various harms its products cause. There’s the prolonged outage that made you think maybe so much of the world’s internet activity shouldn’t run through a single company. And there’s the general sense that Facebook is probably, on the whole, not so great for society. At a certain point it’s too much, you know? If you’ve reached that point, here’s how to quit Facebook for good, along with how to limit how much it can track you after you’re gone.

The CIA’s Least Covert Mission


contributed by Artemus FAN, Stephen L. Page

Image by David Mark from Pixabay 



In the bowels of its Langley headquarters, a fluorescent-lit, mundane office space houses a team of about a dozen people engaged in what is perhaps the Central Intelligence Agency’s least covert mission: to make American citizens “like” the agency on social media.

An edict is posted to the wall: “Every time you make a typo….the errorists win.”

The United State’s premier intelligence agency has slowly ramped up its social media presence since joining Facebook and Twitter in 2014, creating one of the federal government’s quirkiest, creative, and controversial PR campaigns.

Continue reading “The CIA’s Least Covert Mission”


The Argument for a National US Data Privacy Framework


Photo by ThisIsEngineering from Pexels


Against the backdrop of escalating cybercrime and data breaches throughout 2020 and 2021, state legislators in over 29 US states have thrown the spotlight on data privacy this year, putting it high on the agenda in legislative sessions.

Among other things, the rights of consumers to opt out of data collection on websites, providing watertight protection and privacy for children online, and the monitoring of employee emails have all been closely scrutinized.

Perhaps most crucially, legislators have taken a closer look at the role and responsibility of commercial and governmental entities in ensuring data protection, as well as the need for companies to make clear what data is collected, what will be done with it, and for how long it will be kept.

Continue reading “The Argument for a National US Data Privacy Framework”



Photo by Sora Shimazaki from Pexels

More Than 90% of Q2 Malware Was Hidden in Encrypted Traffic

Analysis of threat trends from last quarter reveals attackers ramped up their use of fileless malware, and zero-day malware accounted for almost two-thirds of all detections.


Organizations that have not implemented controls for detecting malware hidden in encrypted network traffic are at risk of having a vast majority of malicious tools being distributed in the wild, hitting their endpoint devices.

A study of threat activity conducted by WatchGuard Technologies using anonymized data gathered from customer networks showed 91.5% of malware detections in the second quarter of 2021 involved malware arriving over HTTPS-encrypted connections. Only 20% of organizations currently have mechanisms for decrypting and scanning HTTPS traffic for malware, meaning the remaining 80% are at risk of missing nine-tenths of the malware hitting their networks daily, WatchGuard said.

Corey Nachreiner, chief security officer at WatchGuard, says one reason why more organizations have not enabled network-based HTTPS decryption controls is because of both the perceived and somewhat real complexity of this setup. 

“[For] man-in-the-middle decryption to work without messing up the sanctity of the HTTPS certificates that secure that traffic, you have to set up an intermediate or root CA certificate that is part of the official certificate verification process,” he says.

There are multiple ways to do this, some of which are tricky and others not as complicated. 

Continue reading “More Than 90% of Q2 Malware Was Hidden in Encrypted Traffic”

Battelle to Supply the Department of State with Armored Vehicles


contributed by Artemus FAN, Steve Jones


Battelle will begin transforming Toyota’s Land Cruiser 200 series standard SUVs into specialized armored vehicles for the U.S. Department of State’s Diplomatic Security Service (DSS) under a new contract award.

Over the past decade, Battelle has steadily built its specialty automotive manufacturing capabilities at facilities on the west side of Columbus, Ohio, building hundreds of armored vehicles for select Department of Defense customers.

Under a Blanket Purchase Agreement (BPA) awarded last year by the Department of State, Battelle recently won a BPA call to build 229 armored Land Cruisers. Delivery of the vehicles is scheduled to begin in March 2022 and be completed in June 2023.

Continue reading “Battelle to Supply the Department of State with Armored Vehicles”

Federal Agencies Mostly Use Facial Recognition Tech for Digital Access

source: |  image:



The most popular uses for facial recognition technology (FRT) by federal agencies are cybersecurity and digital access, according to a new report by the United States Government Accountability Office.

The GAO surveyed 24 agencies about their FRT activities in the fiscal year 2020 and found 75% (18) use an FRT system for one or more purposes.

Sixteen agencies reported deploying the technology for digital access or cybersecurity purposes, with two of these agencies (General Services Administration and Social Security Administration) saying that they were testing FRT to verify the identities of people who were accessing government websites.

Continue reading “Federal Agencies Mostly Use Facial Recognition Tech for Digital Access”

Groundbreaking Research Identifies Likely Cause of Alzheimer’s Disease – Potential for New Treatment

source:  | image:


A likely cause of Ground-breaking new Curtin University-led research has discovered a likely cause of Alzheimer’s disease, in a significant finding that offers potential new prevention and treatment opportunities for Australia’s second-leading cause of death.

The study, published in the prestigious PLOS Biology journal and tested on mouse modelsidentified that a probable cause of Alzheimer’s disease was the leakage from blood into the brain of fat-carrying particles transporting toxic proteins. 

Continue reading “Groundbreaking Research Identifies Likely Cause of Alzheimer’s Disease – Potential for New Treatment”