Think about an adversary who can understand asymmetric cyber risk management and is capable of leveraging cognitive capabilities to conduct hacks. Hence future digital organizations warrant a cognitive risk framework… Read more »
Trust is a market differentiator for the 21st century clients. To achieve trust, service providers need to protect client’s sensitive information which are either corporate secrets or personal information. Add… Read more »
Layers & extent of product security function and integrating security in rapid deployment cycle Ever since the field of software development has existed, the security of the product being developed… Read more »
Cognitive Computing has just started permeating into our lives and is taking small steps to transform business models in the industry. Its use cases are not limited to speech, image… Read more »
…Realities, possibilities, experimentations, use cases and underlying capabilities. How it’s influencing solving security problems. The aim of cognitive computing is to mimic human thought process in a computerized model. Using… Read more »
This post is in regard to a session hosted at AISS 2016 – ‘Post-humans: Blurring of the Boundaries between Humanity and Technology’ wherein the speakers deliberated upon the issues of ethics and morality of technologically enhanced “post-humans”. The speakers of this session were Mr. Vinayak Godse, DSCI; Ms. Aastha Dhamija, DSCI; and Mr. Balaji Suryanarayana, Director & COO, CustomerXPs.