CyberGRX

CyberGRX provides enterprises and their third parties with the most cost-effective and scalable approach to third-party cyber risk management today. Built on the market's first third-party cyber risk Exchange, CyberGRX arms organizations with a dynamic stream of third party-data and advanced analytics so they can efficiently manage, monitor and mitigate risk in their partner ecosystems.

C-Suite On Deck

Responsive image

Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...

Contact Us

Events

Related News

APPLE RESEARCHERS TRAIN AI DRIVERS TO MERGE LANES IN A SIMULATED ENVIRONMENT

Apple | January 29, 2020

news image

Apple has yet to openly discuss its self-driving vehicle research, but it’s a poorly kept industry secret. Around 5,000 employees — including a portion of those previously employed by Drive.ai, an autonomous car startup Apple acquired last year — are said to be involved with code-name Project Titan, a joint effort with Volkswagen to develop autonomous cars and shuttle vans. And a preprint paper published on Arxiv.org this week appears to pull back the curtains further: In it, A...

Read More

AMAZON TAKES ANOTHER ALEXA DEVICE OFF THE SHELF - DISCONTINUES ECHO LOOK

Venturebeat | June 01, 2020

news image

Amazon this week discontinued the Echo Look after pulling the Alexa-powered camera from store shelves in December 2019. Style by Alexa, which suggests, compares, and rates apparel using a combination of AI and human curation.

  • Read More
  • GOOGLE & ALPHABET CEO CALLS FOR AI REGULATION

    Alphabet | January 21, 2020

    news image

    Google and Alphabet CEO Sundar Pichai has laid out his case for greater regulation of artificial intelligence. He has highlighted serious security issues that can occur because ofmisuse of facial recognition technique. He suggested t...

    Read More

    AI TECH

    HOW TO CUT THROUGH THE OVERHYPE AND MAXIMIZE THE POTENTIAL

    ISACA | December 08, 2021

    news image

    Artificial intelligence (AI), machine learning (ML), and deep learning (DL) are often applied in cybersecurity, but their applications may not always work as intended. ISACA’s new publication, AI Uses in Blue Team Security, looks at AI, ML and DL applications in cybersecurity to determine what is working, what is not, what looks encouraging for the future and what may be more hype than substance. Leveraging interviews with some of the engineers behind these technologies, fir...

    Read More
    news image

    APPLE RESEARCHERS TRAIN AI DRIVERS TO MERGE LANES IN A SIMULATED ENVIRONMENT

    Apple | January 29, 2020

    Apple has yet to openly discuss its self-driving vehicle research, but it’s a poorly kept industry secret. Around 5,000 employees — including a portion of those previously employed by Drive.ai, an autonomous car startup Apple acquired last year — are said to be involved with code-name Project Titan, a joint effort with Volkswagen to develop autonomous cars and shuttle vans. And a preprint paper published on Arxiv.org this week appears to pull back the curtains further: In it, A...

    Read More
    news image

    AMAZON TAKES ANOTHER ALEXA DEVICE OFF THE SHELF - DISCONTINUES ECHO LOOK

    Venturebeat | June 01, 2020

    Amazon this week discontinued the Echo Look after pulling the Alexa-powered camera from store shelves in December 2019. Style by Alexa, which suggests, compares, and rates apparel using a combination of AI and human curation.

  • Read More
  • news image

    GOOGLE & ALPHABET CEO CALLS FOR AI REGULATION

    Alphabet | January 21, 2020

    Google and Alphabet CEO Sundar Pichai has laid out his case for greater regulation of artificial intelligence. He has highlighted serious security issues that can occur because ofmisuse of facial recognition technique. He suggested t...

    Read More
    news image

    AI TECH

    HOW TO CUT THROUGH THE OVERHYPE AND MAXIMIZE THE POTENTIAL

    ISACA | December 08, 2021

    Artificial intelligence (AI), machine learning (ML), and deep learning (DL) are often applied in cybersecurity, but their applications may not always work as intended. ISACA’s new publication, AI Uses in Blue Team Security, looks at AI, ML and DL applications in cybersecurity to determine what is working, what is not, what looks encouraging for the future and what may be more hype than substance. Leveraging interviews with some of the engineers behind these technologies, fir...

    Read More

    Resources

    Events

    C-Suite On Deck

    Responsive image

    Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...

    Contact Us