Artificial intelligence (AI) is the most disruptive innovation in a generation. It is quickly becoming an essential component in many industries, including public safety. However, these are still the nascent stages of AI adoption, and with that, come challenges.
The authors of a new study by the Mineta Transportation Institute hope their findings will assist those responsible for security planning around travel on public transport. In their latest Peak Hour Study, Brian Michael Jenkins and Bruce R Butterworth analyzed more than 500 attacks on passenger rail and bus systems in modern developed countries between 1970 and 2020. They found that more than 60% of the attacks occurred in off-peak hours, as opposed to only 19% occurring during peak hours. However, the peak-hour attacks were 4.5 times more lethal. (The timing of the remaining attacks is unknown so they could not make a determination.)
IBM selected six school districts to receive its IBM Education Security Preparedness Grant, which totals $3 million. The in-kind grant was created to help United States K-12 public school districts proactively prepare for and respond to cyberattacks.
Director of Security for the Pojoaque Valley School District in New Mexico, Gary Johnson has taken a lead role in implementing COVID-19-related screening procedures, safety and security plans, and reopening protocols, but more importantly, he’s placed a focus on supporting students, staff and community members.
Gary Johnson is much more than Director of Security for the Pojoaque Valley School District in New Mexico. He’s in charge of safety and security, transportation and more, but his most important role is supporter, with this role becoming even more prominent in the wake of the COVID-19 pandemic.
Feedzai has announced its Quarterly Financial Crime Report, an analysis of over 12 billion global banking transactions from January – March 2021. The report identifies trends in spending and in fraud attempts to show that this past quarter, as consumer activities increased, fraudsters attempted to hide their fraudulent transactions in legitimate banking. In fact, combining all banking fraud – internet, telephone, and branch – attacks grew a whopping 159% in Q1 2021 compared to Q4 2020.
Circa Resort and Casino, the first new downtown Las Vegas hotel and entertainment venue in over 40 years, has selected an end-to-end Aruba ESP-based network for its wired, wireless and security solutions at the 35-story, 777-room sports-themed property, as well as at satellite locations throughout Nevada, Colorado, and other jurisdictions.
Checkout.com, cloud-based global payment solutions provider, announced the hire of J.P. Morgan cybersecurity expert and cloud evangelist Adrian Asher as Chief Information Security Officer (CISO) and head of cloud architecture.
To more effectively reduce risk and capitalize on the capabilities, intelligence and experience of both the corporate application security team and the product security team, John Scimone, Dell Technologies Chief Security Officer, recommends converging these programs. Once converged, the security organization will see immediate benefits. Here, Scimone explores why organizations should converge these teams and the benefits.
Threat actors are now not only encrypting critical business systems, but also backups. They’ve brought businesses to a standstill, leaving some non-operational and really, with no good options for recovery. In many cases, it’s been pay the ransom to obtain a decryption key — or go out of business.
Software intelligence company Dynatrace announced the findings of an independent global survey of 700 CISOs, which reveals the rising adoption of cloud-native architectures, DevOps, and agile methodologies has broken traditional approaches to application security. As organizations shift more responsibility "left" to developers to accelerate innovation, increasingly complex IT ecosystems and outdated security tooling can slow releases by leaving blind spots and forcing teams to manually triage countless alerts, many of which are false positives reflecting vulnerabilities in libraries that are not used in production.