Remove Agriculture Remove Data Remove Retail Remove Risk
article thumbnail

The Week in Cyber Security and Data Privacy: 5 – 11 February 2024

IT Governance

At the end of each month, these incidents – and any others that we find – will be used to inform our monthly analysis of data breaches and cyber attacks. Financial information, medical data, health reimbursements, postal addresses, telephone numbers and emails are not thought to have been compromised.

article thumbnail

How AI is helping companies meet sustainability goals

IBM Big Data Hub

AI solutions work by collecting asset performance data and feeding it into machine learning models, which can predict asset health and risk of failure. This use case shows how AI can help by processing unstructured image and video data in addition to structured data in the previous examples.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Sustainability trends: 5 issues to watch in 2024

IBM Big Data Hub

Investors, regulators and stakeholders are increasingly demanding that companies disclose their exposure to climate-related risks , such as dependence on fossil fuels or vulnerability to weather events. 2 For example, some are turning to software solutions that can more easily capture, manage and report ESG data.

article thumbnail

The most valuable AI use cases for business

IBM Big Data Hub

Promote cross- and up-selling Recommendation engines use consumer behavior data and AI algorithms to help discover data trends to be used in the development of more effective up-selling and cross-selling strategies, resulting in more useful add-on recommendations for customers during checkout for online retailers.

article thumbnail

Knock, Knock; Who’s There? – IoT Device Identification & Data Integrity Is No Joke

Thales Cloud Protection & Licensing

They all must have unique identifiers and the ability to collect and transfer data over networks to enable monitoring, surveillance, and execution of decisions based on the collected data with little or no human intervention. But making the IoT work requires trust in the devices and the data they collect.

IoT 72
article thumbnail

INSIGHTS from SENTINEL

Thales Cloud Protection & Licensing

This transformation from ownership to usership started in software but can be applied to almost every industry, from entertainment and retail to agriculture, energy, construction, trade, and transport. We have found that companies that manage this transition well, successfully rise, while those that don’t are at risk of failure.

article thumbnail

The Week in Cyber Security and Data Privacy: 15 – 21 April 2024

IT Governance

At the end of each month, these incidents – and any others that we find – will be used to inform our monthly analysis of data breaches and cyber attacks. Compromised data includes names, passport numbers, Social Security numbers, online crypto account identifiers and bank account numbers. Data breached: 5,300,000 records.