WHAT’S UNDER YOUR NETWORK’S HOOD

August 11, 2020

Authentication technologies are front-burner tools to protect your network from COVID-19 pandemic email vulnerabilities. With attackers focusing on your users, common sense and technology go a long way. Scott Mace reports. Without letup the cyberattacks keep coming but they are not necessarily aimed at your network’s protocols or software vulnerabilities — at least, not at first. Instead, they maneuver themselves into part of your corporation’s most vulnerable infrastructure and manipulate your employees to fall for some email message that is not what it appears to be.

Spotlight

AbacusNext

AbacusNext® helps firms with stringent security and compliance needs grow by providing Compliance-Ready™ turnkey technology solutions, allowing our clients to leverage the power of cloud computing without the added challenges and expenses of managing complex IT infrastructures on their own. As an end-to-end solutions provider, our products and services portfolio includes virtual desktop (DaaS), private cloud, case management software (CMS), email hosting services, security endpoint protection, business continuity (BCP), and on-premise solutions.

OTHER WHITEPAPERS
news image

AI and Cities: Risks, Applications and Governance

whitePaper | October 20, 2022

Artificial intelligence has already started to have an impact on urban settings at an unprecedented pace, with sophisticated solutions being deployed in the streets, at airports and in other city installations. In fact, cities are becoming experimental sites for new forms of artificial intelligence and automation technologies that are applied across a wide variety of sectors and places.

Read More
news image

Certifying Fairness of AI-Applications An Impossible Task?

whitePaper | January 28, 2022

Since more and more decisions that used to be made by humans are nowadays made either with the help of Artificial Intelligence (AI) or by AI alone, it is essential that the AI algorithms are “fair.” In this whitepaper, we discuss issues surrounding the fairness of AI applications, with a special focus on how it can be assessed independently and subsequently certified. We explain why an AI application cannot be classified – and subsequently certified – as “fair” or “unfair” in a general sense and propose an approach that makes it possible to classify it as “fair” or “unfair” under the (application)-specific definition of fairness.

Read More
news image

Leveraging a comprehensive reference architecturefor AI that significantly reduces time-to-insight

whitePaper | September 29, 2021

Penguin Computing’s Analytics Practice acts as a single point of reference for hardware, software, architectural design, and much more, enabling organizations to focus their energy on their AI projects. Access this white paper to learn more about this secure, end-to-end solution designed to alleviate AI infrastructure woes.

Read More
news image

THE NEED FOR EFFECTIVE INCIDENT RESPONSE

whitePaper | June 23, 2020

Modern organizations face unprecedented threats to their critical information assets and data. In previous years, the mindset of many cybersecurity professionals and business leaders was focused on avoiding attacks and building a strong perimeter to deflect them. However, more recently this approach has shifted, and these leaders now understand that attacks are inevitable. With this fundamental shift in thinking, cybersecurity professionals must build strong incident response programs that are capable of detecting threats in a timely manner and responding effectively when they occur.

Read More
news image

Trusted Artificial Intelligence Towards Certification of Machine Learning Applications

whitePaper | March 30, 2022

Artificial Intelligence is one of the fastest growing technologies of the 21st century and accompanies us in our daily lives when interacting with technical applications. However, reliance on such technical systems is crucial for their widespread applicability and acceptance. The societal tools to express reliance are usually formalized by lawful regulations, i.e., standards, norms, accreditations, and certificates. Therefore, the TÜV AUSTRIA Group in cooperation with the Institute for Machine Learning at the Johannes Kepler University Linz, proposes a certification process and an audit catalog for Machine Learning applications.

Read More
news image

Modern Risk Management for AI Models

whitePaper | September 15, 2022

The concept of Artificial Intelligence (AI) and Machine Learning (ML) dates back to the 1950s with researchers trying to use machines to simulate human intelligence in machines. However, their use in the financial sector has been limited. With enhanced customer service and mounting cost pressures, financial institutions (FIs) have now started to look at AI as a possible solution for improving cost and operational efficiencies.

Read More

Spotlight

AbacusNext

AbacusNext® helps firms with stringent security and compliance needs grow by providing Compliance-Ready™ turnkey technology solutions, allowing our clients to leverage the power of cloud computing without the added challenges and expenses of managing complex IT infrastructures on their own. As an end-to-end solutions provider, our products and services portfolio includes virtual desktop (DaaS), private cloud, case management software (CMS), email hosting services, security endpoint protection, business continuity (BCP), and on-premise solutions.

Events