Subscribe Digital Security
Critical Infrastructure Security
This Critical Infrastructure Security report details critical infrastructure spending on cybersecurity. The critical infrastructure is defined as the basic physical and organizational structure needed for the functioning of a modern society. ABI Research has broken down the infrastructure into eight segments: Defense, Energy, Finance, Health, Information & Communication Technologies, Public Security, Transport, and Water & Waste Management. Each segment's spending is further broken down by sector (Government, Industry, etc.), by type (IT, Countermeasures, Procedures, etc.), by region (North America, Europe, Asia-Pacific, Middle East & Africa, Latin America), and by country (United States, United Kingdom, China, Russia, Israel, Canada, and Australia).Continue
Reports & Data
On August 4, 2017, Bloomberg announced that Apple’s next smart watch model, due for release later this year, would be equipped with LTE connectivity. In effect, this would allow usage to be completely untethered from the handset, enabling standalone functions including the ability to make and receive calls, stream music, download apps and songs, all achieved without an iPhone in sight. This is certainly a bold move by Apple, attempting to break the bond between handset and smart watch, in a clear effort to raise the smart watch bar from handset companion to standalone device.
Every client is assigned a key member of our research team, based on their organization’s needs and goals. And, an unlimited number of Analyst Inquiry calls are available to answer your specific questions.
Cybersecurity Gets an Upgrade – Machine Learning, Automation, and the Potential for Artificial Intelligence
With each passing quarter cyberattacks are becoming increasingly more frequent and potent, causing organizations to adapt out of necessity to these emerging threats. Luckily, artificial intelligence (AI), machine learning (ML), and automation applications are also advancing rapidly and have finally found their way to cybersecurity.
This webinar will explore the benefits offered by these applications, as well as any vital prerequisites, and barriers for adoption. It will also describe the key current technologies (deep learning, user and entity behavior analytics [UEBA], and cognitive computing), provide insights regarding algorithm training approaches, and describe the current and future state of the market.This webinar will seek to answer key questions:
- How is ML applied in cybersecurity?
- How can companies derive value from it?
- What processes should be automated?
- What data sources should be used for algorithm training?
- What constitutes a good UEBA product?
- What does the future of AI hold for cybersecurity?