article thumbnail

2014 Trusted Cyber Collaboration Workshop: 24-26 Sep in Crystal City VA

CTOvision

TSCP’s Trusted Cyber Collaboration Workshop is an opportunity for professional information sharing focused on secure collaboration among industry partners and their supply chain members, mitigating the risks of information security breaches, and accelerating secure information sharing while reducing overall program costs.

CTO 262
article thumbnail

Federal Government Signals Interest In Several Key Leading Edge Technologies

CTOvision

Big data is an evolving term that describes any voluminous amount of structured, semi-structured and unstructured data that has the potential to be mined for information. Although big data doesn’t refer to any specific quantity, the term is often used when speaking about petabytes and exabytes of data.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

SINET Announces 2015 Top 16 Emerging Cybersecurity Companies

CTOvision

BehavioSec – Disruptive verification & authentication solutions that make consumers part of the security solution, rather than the problem. Capable of detecting intrusions in machine time, machine learning and big data are used to detect anomalies in HW and SW execution based on analysis of AC, DC and EMI signals.

Company 150
article thumbnail

Overcoming the Equation: Security = Friction

CTOvision

However, those solutions require fingerprint readers, better encryption, key management programs, and card provisioning systems, which also translates to more people needed to manage the security infrastructure. The main concept is to leverage big data to determine the unique identity of an individual based on his or her behavior.

Security 249
article thumbnail

5G-enabled manufacturing: Realizing Industry 4.0

TM Forum

A two-year project with Ford Motor Company has shown how 5G, mobile private networks, multi-access edge computing (MEC), IoT (Internet of Things), big data, cloud, artificial intelligence will deliver Industry 4.0 and the factory of the future. 5G Enabled Manufacturing (5GEM). Securing the MPN was a key feature of this.

Industry 130
article thumbnail

Insider Threat: A perspective on how to address the increasing risk

CTOvision

Next, we work with our clients to help them understand the nature of cyber risk, the continuum of insider threat and review what programs they may have in place today. The Special Case Of Big Data Analytics In Insider Threat Detection. We recommend architectures that also enable analysis of streaming data.

How To 150
article thumbnail

Bell Canada uses AI and machine learning to improve fraud detection delays on targeted schemes by 200%

TM Forum

How: Bell Canada’s solution was developed by Bell Canada and Amdocs, with Amdocs leveraging TM Forum business assurance and AI best practices, and learnings from the TM Forum Catalyst Program. focused on using big data analytics and AI to implement a variety of algorithms and models.