The story is familiar. Technology innovation develops at a rapid clip, but agile threat actors seem to never be far behind. Hear what two cybersecurity experts have to say about outthinking threats and minimizing cyber crime through artificial intelligence, cognitive computing and connected
The ongoing struggle between good and evil that characterizes the ongoing battles between cyber warriors and cyber criminals only grows more technologically complex. Hear what leading cybersecurity leaders have to say about the application of artificial intelligence and cognitive computing to help
The world is increasingly challenged by water supply problems because of aging and deteriorating infrastructure, operating incidents and disruptions, drought and water scarcity, declining water quality, climate change and other factors. Take a look at an IBM and Veolia alliance that is using
How can public agencies, law enforcement and citizens utilize advanced technologies to their advantage in the war on cyber threats, terrorism, fraud and crime? Hear what leading security experts have to say in a recent Analytics Brief on staying ahead of cyber criminals, terrorists and hackers.
Fraud detection and prevention are critical, but the banking industry needs to see beyond fraud. By effectively using cybersecurity assessment tools, banking regulators and institutions along with the financial services industry need to intelligently adapt and be ever-vigilant against the rise in
Scientists are using predictive weather data capabilities to analyze and forecast storm paths with increasing accuracy. They’re tapping into data from a variety of sources for information, and these developments and applications of data analytics help keep communities in the paths of oncoming
Body-worn cameras are very likely to become part of a police officer’s standard issue along with body armor, firearm and baton. But body-worn camera programs can be costly when it comes to storing, managing and redacting all that video footage data. See what several law enforcement experts have to
Cameras, cameras, cameras. These devices are seemingly everywhere. And today there is considerable discourse on cameras worn by people working in law enforcement and other public agencies. How can all this video data not only be managed effectively, but also used intelligently to improve policing
The public, media and others have a right to see video footage collected from body-worn cameras on law enforcement officers, but compliance issues with governing agencies adds a lot of complexity to these requests. Consider four key questions agencies owning—and are responsible for—all that video
A growing number of law enforcement agencies are realizing the community-relations benefits of body-worn camera programs. But the volumes of video footage those cameras create can be challenging to access, manage, search through and more. One solution offers four good reasons law enforcement can
Ubiquitous data is so easily generated, and for that reason many enterprises today are exceedingly challenged to handle it all successfully. Take a look at a comprehensive information lifecycle governance solution that can help prevent enterprises from becoming submerged in their own sea of data.
Ever hear of the dark web? The reality is, the dark web is bigger than just hidden services, some of which exist on Tor and some of which exist on clear web sites. Learn more about how the dark web is made up of sites and activities that pretty closely mirror offline crime statistics and what we
Data analytics is fueling new strategies in law enforcement from the federal level down to local departments. Whether it's finding patterns across time and location, predicting new threats or linking resources to responders during major events, data is the future of proactive emergency plans.
Gottfried Leibbrandt, chief executive of the Society for Worldwide Interbank Financial Telecommunication (SWIFT), declared that he is going "on the offensive against cyber criminals." With the recent spate of cyber attacks on banks including an 81 million heist we are in dire need of a tight
Commercial organizations are fair game for cyber criminals, hactivists and terrorists. Now, the practice of mining data for intelligence and sharing it is increasingly vital for enterprises to stay ahead of threat actors and their criminal strategies and tactics.