article thumbnail

Privacy for Tigers

Schneier on Security

Wildlife crime syndicates can not only coordinate better but can mine growing public data sets, often of geotagged images. Privacy matters for tigers, for snow leopards, for elephants and rhinos ­ and even for tortoises and sharks. Video here.

Privacy 83
article thumbnail

MY TAKE: Why Satya Nadella is wise to align with privacy advocates on regulating facial recognition

The Last Watchdog

We’re just a month and change into the new year, and already there have been two notable developments underscoring the fact that some big privacy and civil liberties questions need to be addressed before continuing the wide-scale deployment of advanced facial recognition systems. It’s a healthy thing that a captain of industry can see this.

Privacy 157
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: What if Big Data and AI could be intensively focused on health and wellbeing?

The Last Watchdog

Towards this end it has begun sharing videos, whitepapers and reports designed to rally decision makers from all quarters to a common cause. Healthcare providers haven’t yet figured out how to digitalize medical records in a way that robustly preserves patient privacy and keeps patient information out of data thieves’ hands.

Big data 279
article thumbnail

MY TAKE: Here’s why we need ‘SecOps’ to help secure ‘Cloud Native’ companiess

The Last Watchdog

In that caper, a core API was left open allowing them to exploit it and begin using Tesla’s servers to mine cryptocurrency. Compliance with existing and fresh data security and privacy rules and regulations is another variable driving companies to start introducing SecOps into their workflow.

Cloud 203
article thumbnail

Embeddable AI saves time building powerful AI applications

IBM Big Data Hub

With embeddable AI, you get a set of flexible, fit-for-purpose AI models that developers can use to provide enhanced end-user experiences—like, automatically transcribing voice messages and video conferences to text. Users can then mine the data using simple keyword searches to find the information they need.

article thumbnail

US Journalist Detained When Returning to US

Schneier on Security

After I gave him the password to my iPhone, Moncivias spent three hours reviewing hundreds of photos and videos and emails and calls and texts, including encrypted messages on WhatsApp, Signal, and Telegram. Nothing on mine was spared. Consider everything on your phone right now. Pomeroy, meanwhile, searched my laptop.

Mining 104
article thumbnail

5 IoT Security Predictions for 2019

Security Affairs

2018 was the year of the Internet of Things (IoT) – massive attacks and various botnets, a leap in regulation and standards, and increased adoption of IoT devices by consumers and enterprises, despite the existence of security and privacy concerns. Insights from VDOO’s leadership. 2019 will continue these trends but at a faster pace.

IoT 89