For a long time, information security has been a war between men but recently it has become a battle between man and machine. The development of AI is slowly moving this fight into a new environment: machine versus machine, carefully directed by scientists or hackers. A number of cybersecurity companies are now turning to machine learning in an attempt to stay one step ahead of professionals working to steal industrial secrets, disrupt national infrastructures, hold computer networks for ransom and even influence elections. A study from 2016 uncovered that information theft is the primary concern of companies. Yet, over half of them (5 8%) don’t have the necessary systems in place to detect a sophisticated attack, which is explained by the fact that 42% don’t have a threat det
ESET East Africa has set up a free online training for businesses in Kenya in a move to Educate employees while enabling firms to curb the impact of cyber attacks and data breaches that are becoming more severe to business operations around the world. A recent survey by ESET in its North American markets found that more than 30 percent of people polled have never received any cyber training or education in their workplace, even though majority of cyber breaches are caused by employee errors and omissions. About 52 percent of data and information security breaches globally are caused by human error, pointing to a glaring need for cyber security training and awareness within organizations. On the other hand, cybersecurity training can cost hundreds of thousands of shillings per perso...
Organizations and individuals are overwhelmed by the rising number of threats. There’s simply too much security- related data coming onto the network from an ever-widening array of connected devices. In addition, threats are growing in scale and complexity. To meet this demand, a new solution has emerged offering to apply machine learning to enterprise security. These tools deliver the ability to analyze networks, learn about them, detect anomalies and protect enterprises from threats. This security solution is a type of artificial intelligence (AI) that provides computers with the ability to learn without being explicitly programmed. Machine learning focuses on the development of computer programs that can teach themselves to grow and change when exposed to new data. This
Hundreds of millions of computers running everything from ATMs to the power grid will be vulnerable to hacking next month when Microsoft stops supporting its old Windows XP operating system. Hackers have been holding onto flaws in Windows XP and waiting to exploit them until after the software giant stops issuing security updates on April 8, experts say. Adam Meyers, vice president of intelligence at Crowdstrike, a cybersecurity firm, said it was “fairly dangerous” to continue using the 12-year-old operating system because after the deadline “victims can’t defend themselves.” “I certainly wouldn't run Windows XP after the 8th," Meyers said in an interview. Microsoft announced six years ago it will no longer provide security patches or technical support for the out-of-date software.
Stakeholders in the ICT sector are lobbying against the ratification of an African Union regulations on cyber security because of fears the proposed rules will stifle Internet growth. The African Union Convention on Cyber Security (AUCC) is scheduled to be adopted at a meeting in January if none of its members oppose it. But some Kenyan stakeholders have filed a petition to bar the convention from being ratified into law, saying the agreement in its current form would derail penetration of the Internet and curtail freedom. Strathmore Centre for Intellectual Property managing director Marcela Sinda called for wider consultations before the decision is ratified. “This is being conducted in total darkness. We have identified provisions harmful to our