article thumbnail

Examples and uses of GIS

IBM Big Data Hub

For example, planners in fire-prone California use tools that incorporate remote sensing, vector data and satellite images to formulate disaster response plans and optimal placement of fire hydrants. Additionally, IBM and Texas A&M AgriLife have created a tool to help improve crop management strategies.

article thumbnail

Malicious file analysis – Example 01

Security Affairs

Cyber Security Specialist Zoziel Pinto Freire shows an example of malicious file analysis presented during his lecture on BSides-Vitória 2022. My objective with this series of articles is to show examples of malicious file analysis that I presented during my lecture on BSides-Vitória 2022. Example: peframe file_name.

Libraries 102
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What is Tailgating? Definition, Examples & Prevention

IT Governance

Fraudsters have countless tricks up their sleeves to bypass security measures and access sensitive information. The same principle, believe it or not, applies in a cyber security context. More specifically, the fraudster is trying to gain physical access to a secure part of the premises so that they can steal confidential information.

article thumbnail

GUEST ESSAY: Marshaling automated cybersecurity tools to defend automated attacks

The Last Watchdog

Cybersecurity tools evolve towards leveraging machine learning (ML) and artificial intelligence (AI) at ever deeper levels, and that’s of course a good thing. Sophisticated tools were employed to auto generate content that compelled users to respond. Related: Business logic hacks plague websites. Accelerate time-sensitive processes.

article thumbnail

How to Package and Price Embedded Analytics

Just by embedding analytics, application owners can charge 24% more for their product. How much value could you add? This framework explains how application enhancements can extend your product offerings. Brought to you by Logi Analytics.

article thumbnail

NUVOLA: the new Cloud Security tool

Security Affairs

nuvola is the new open-source cloud security tool to address the privilege escalation in cloud environments. nuvola is the new open source security tool made by the Italian cyber security researcher Edoardo Rosa ( @_notdodo_ ), Security Engineer at Prima Assicurazioni. Cloud Security Context.

Cloud 91
article thumbnail

Shedding light on AI bias with real world examples

IBM Big Data Hub

Examples of AI bias in the real world show us that when discriminatory data and algorithms are baked into AI models, the models deploy biases at scale and amplify the resulting negative effects. ” Examples of AI bias from real life provide organizations with useful insights on how to identify and address bias.