Tag Archive for: intelligence

Debunking the biggest myths about artificial intelligence

HAL 9000 in the film 2001.

The concept of inhuman intelligence goes back to the deep prehistory of mankind. At first the province of gods, demons, and spirits, it transferred seamlessly into the interlinked worlds of magic and technology. Ancient Greek myths had numerous robots, made variously by gods or human inventors, while extant artefacts like the Antikythera calendrical computer show that even in 200 BCE we could build machinery that usefully mimicked human intellectual abilities.

There has been no age or civilisation without a popular concept of artificial intelligence (AI). Ours, however, is the first where the genuine article—machinery that comfortably exceeds our own thinking skills—is not only possible but achievable. It should not be a surprise, then, that our ideas of what that actually means and what will actually happen are hopelessly coloured by cultural assumptions ancient and modern.

We rarely get it right: Kubrick’s 2001 saw HAL 9000 out-thinking highly trained astronauts to murderous effect; Bill Gates’ 2001 gave us Clippy, which was more easily dealt with.

Read 53 remaining paragraphs | Comments

Technology Lab – Ars Technica

IBM lets customers, partners write apps for QRadar threat intelligence platform

IBM is launching a program where customers can share apps they write to augment IBM’s QRadar platform that analyzes security data, detects behavior anomalies and sorts out high-priority risks from the mass of incidents it examines.

To accomplish this, the company is opening APIs into QRadar, issuing software developer kits and creating a Security App Exchange where these custom apps can be distributed.

The exchange has already been seeded with 14 apps written by IBM itself and some of its partners including Bit9 + Carbon Black, BrightPoint Security, Exabeam and Resilient Systems.

Four of these apps are:

  • User Behavior Analytics – Integrates Exabeam’s analysis of user behaviors and risk profiling into QRadar’s dashboard.
  • Threat Intelligence – Pulls data from threat feeds and create rules about how to handle the data, such as raising the threat score for incidents involving IP addresses from a particular watch list.
  • Carbon Black App for QRadar – Analyzes data from Carbon Black’s endpoint sensors within the QRadar interface, enabling faster responses to endpoint attacks.
  • Incident Overview – A visualization app that uses bubbles, colors and correlation lines to help analysts quickly identify links among incidents.

IBM says it will vet applications before they are made available in the app exchange. Dozens of businesses have joined the exchange, the company says, and the apps are free.

To read this article in full or to leave a comment, please click here

Network World Tim Greene

Simple Mobile Security Steps to Protect Health Information – Security Intelligence (blog)


Security Intelligence (blog)

Simple Mobile Security Steps to Protect Health Information
Security Intelligence (blog)
Thankfully, this mobile threat escalation and the need for mobile security hasn't gone completely unnoticed. About 81 percent of health care executives in KPMG's “2015 Healthcare Cybersecurity Survey” revealed that their organizations have been …

“mobile security” – read more

Does Your Mobile Security Strategy Let You Support a Multi-OS Environment? It … – Security Intelligence (blog)


Security Intelligence (blog)

Does Your Mobile Security Strategy Let You Support a Multi-OS Environment? It
Security Intelligence (blog)
Worrying about operating systems and mobile security strategies is not an irrational fear! While a new OS represents its own challenges, the fact of the matter is that the CISO also has to worry about all previous versions of the system and the devices
Is It time to re-evaluate your BYOD policy?CSO Online

all 2 news articles »

“mobile security” – read more