cybersecurity Archive

Just how vulnerable is election technology?

Larry Alton Crunch Network Contributor Larry Alton is an independent business consultant specializing in social media trends, business and entrepreneurship. More posts by this contributor: How to join the network This year’s electoral process has been unconventional, to say the least, and most voters are either polarized or frustrated (sometimes both) with how we got to this point. Now, as this volatile election approaches the …

The emerging Darwinian approach to analytics and augmented intelligence

Mark Palmer Crunch Network Contributor Mark Palmer is senior vice president and general manager of engineering at TIBCO. How to join the network Much has been made about the business implications of recent, rapid advancements in cognitive computing — that is, the possibility of advanced analytics tools to help human knowledge workers glean actionable insight from vast and deep lakes of historical, transactional and machine-generated …

What if cybersecurity followed physics?

The first cybersecurity unicorn kernel popped in late 2013 with the announcement of CloudFlare’s $50 million Series C investment. Today, 10 privately held companies hold membership in the ultra-exclusive cybersecurity unicorn club. With the addition of each new member, eyebrows are raised and questions are asked. What underlying data supports such valuations? Would there ever be sufficient revenue in the cybersecurity market to sustain unicorn valuations? …

How connected cars are turning into revenue-generating machines

History repeats herself, but she mumbles. Some have expressed that she enjoys rhymes or puns. One must lean in close and listen carefully to understand exactly what she’s getting at. Most of the time we can only in retrospect discern what she was trying to say. Sometimes, though, history’s intent is clear. Evidence suggests a chain of events that will yield to an educated guess …

How data science fights modern insider threats

Ben Dickson Crunch Network Contributor Ben Dickson is a software engineer and freelance writer. He writes regularly on business, technology and politics. More posts by this contributor: How to join the network Insider threats are the biggest cybersecurity threats to firms, organizations and government agencies. This is something you hear a lot at security conference keynotes and read about in data breach reports, white papers and surveys — and …

Carnegie Mellon’s Mayhem AI takes home $2 million from DARPA’s Cyber Grand Challenge

The 2016 DARPA Cyber Grand Challenge has concluded, and the winning team — Carnegie Mellon University’s ForAllSecure — is taking home the $2 million grand prize. What’s that you say — what’s the Cyber Grand Challenge? I’m glad you asked! Like the other challenges the Defense Department’s R&D arm has offered, the CGC is focused on autonomy — but where the original Grand Challenge and …

Understanding Hillary Clinton’s innovation plan

Andrew Keen Crunch Network Contributor Andrew Keen is the author of three books: Cult of the Amateur, Digital Vertigo and The Internet Is Not The Answer. He produces Futurecast, and is the host of Keen On. More posts by this contributor: How to join the network It’s been an all-Hillary week. But in her Philadelphia acceptance speech, she said next-to-nothing about innovation and absolutely nothing …