Krk WiFi vulnerability affected WiFi encryption on over a billion devices – Privacy News Online

A vulnerability in Broadcom and Cypress WiFi chips makes it possible for attackers on your local WiFi network to decrypt your WPA2 encrypted internet traffic. The vuln, known as the Krk (kr00k) vulnerability, has the designation CVE-2019-15126, ESET, the discoverer of the kr00k vulnerability, estimated that over a billion devices were affected. Apple products such as iPhone, iPad, and Macs were all affected; however, Apple has since patched the issue for iOS and MacOS so make sure that you are up to date on your updates. Even with quick action to correct the vulnerability by affected parties, there will still be millions of devices that wont be patched and will remain vulnerable. What Krk really does is remind us as internet users why properly implemented encryption is important.

Apple described the impact of the kr00k vulnerability as such when they patched this vulnerability in October 2019:

An attacker in Wi-Fi range may be able to view a small amount of network traffic.

The Broadcom and Cypress WiFi chips have a built in feature that resets the encryption key to all zeroes in the event of a connection break between the access point and the target device. The thing is, some WPA2 encrypted packets from the target device would still continue to be sent during that time and an attacker could intercept and decrypt those by using an all-zeroes encryption key. Since the disconnection can be triggered at will by the attacker, this attack can be extremely targeted to decrypt a WiFi users internet activity at will.

While the attacker might not be able to decrypt HTTPS encrypted data and information that is sent to HTTPS sites that youre visiting like your banking website they still would be able to intercept domain name system (DNS) or server name indication (SNI) requests and know what websites youre visiting even if theyre otherwise secured through HTTPS.

While the CVE worked as intended and the main companies with affected chips were able to push out patches to fix the vuln, its still possible that there are unpatched devices out there for whatever reason. The researchers at ESET emphasized in their reporting:

Krk affects devices with Wi-Fi chips by Broadcom and Cypress that havent yet been patched. These are the most common Wi-Fi chips used in contemporary Wi-Fi capable devices such as smartphones, tablets, laptops, and IoT gadgets.

Its best to assume that WiFi encryption is incomplete and that WPA2 is not enough encryption to protect your internet traffic when youre on WiFi. Before kr00k, there was also the KRACK WPA2 WiFi vulnerability which affected even more devices. Even when youre on 4G networks, there are 4G vulnerabilities that allow decryption, tracking, spoofing, and spamming and some of them even remain unpatched. This isnt the first and it wont be the last vulnerability affecting WiFi encryption.

Caleb Chen is a digital currency and privacy advocate who believes we must #KeepOurNetFree, preferably through decentralization. Caleb holds a Master's in Digital Currency from the University of Nicosia as well as a Bachelor's from the University of Virginia. He feels that the world is moving towards a better tomorrow, bit by bit by Bitcoin.

Read the rest here:
Krk WiFi vulnerability affected WiFi encryption on over a billion devices - Privacy News Online

The EARN IT Act Is a Sneak Attack on Encryption – WIRED

A bipartisan pair of US senators today introduced long-rumored legislation known as the EARN IT Act. Meant to combat child sexual exploitation online, the bill threatens to erode established protections against holding tech companies responsible for what people do and say on their platforms. It also poses the most serious threat in years to strong end-to-end encryption.

As the final text of the bill circulated, the Department of Justice held a press conference about its own effort to curb online child predation: a set of 11 "voluntary principles" that a growing number of tech companiesincluding Facebook, Google, Microsoft, Roblox, Snap, and Twitterhave pledged to follow. Though the principles the companies are pledging to adopt don't specifically impact encryption themselves, the event had an explicit anti-encryption message. The cumulative effect of this morning's announcements could define the geography of the next crypto wars.

Child predators "communicate using virtually unbreakable encryption," US attorney general William Barr said during the press conference. "The department for one is prioritizing combatting child sexual exploitation and abuse in our prosecution efforts. And we are also addressing child exploitation in our efforts on retaining lawful access and in analyzing the impact of Section 230 of the Communications Decency Act on incentives for platforms to address these crimes."

EARN IT focuses specifically on Section 230, which has historically given tech companies freedom to expand with minimal liability for how people use their platforms. Under EARN IT, those companies wouldn't automatically have a liability exemption for activity and content related to child sexual exploitation. Instead, companies would have to "earn" the protection by showing that they are following recommendations for combatting child sexual exploitation laid out by a 16-person commission.

"This is a profoundly awful proposal on multiple levels."

Julian Sanchez, Cato Institute

The bill, written by South Carolina Republican senator Lindsey Graham and Connecticut Democrat Richard Blumenthal, would create a way for law enforcement officials, attorneys general, online child sexual exploitation survivors and advocates, constitutional law scholars, consumer protection and privacy specialists, cryptographers, and other tech experts to collectively decide what digital companies should do to identify and reduce child predation on their platformsand then require companies to actually do it. The safeguards the committee might recommend would likely include things like proactive, dynamic content scanning to identify abusive photos and videos, but also communication surveillance to watch for predators who could be forming relationships with potential victims and "grooming" them for exploitation.

Though it seems wholly focused on reducing child exploitation, the EARN IT Act has definite implications for encryption. If it became law, companies might not be able to earn their liability exemption while offering end-to-end encrypted services. This would put them in the position of either having to accept liability, undermine the protection of end-to-end encryption by adding a backdoor for law enforcement access, or avoid end-to-end encryption altogether.

Facebook has most prominently made the argument in recent months that it can adequately identify child predation threats without eliminating or undermining user data protections like end-to-end encryption. The safeguard only makes data readable on the sender's and receiver's devices, boxing companies out of accessing user data directly.

Law enforcement officials and members of Congress have countered, though, that tech companies can't do enough to stop child predation and distribution of illegal content on their platforms if they can't access their users' data.

"We share the EARN IT Act sponsors commitment to child safety and have made keeping children safe online a top priority by developing and deploying technology to thwart the sharing of child abuse material," Thomas Richards, a Facebook spokesperson, said in a statement. "Were concerned the EARN IT Act may be used to roll back encryption, which protects everyones safety from hackers and criminals, and may limit the ability of American companies to provide the private and secure services that people expect."

Read more here:
The EARN IT Act Is a Sneak Attack on Encryption - WIRED

The Benefits of Encryption and the Implications of Creating Backdoors – American Action Forum

Encryption technology has allowed consumers to keep their data and communication private, but it has also allowed criminals to evade surveillance. Policymakers are once again considering whether law enforcement agencies need new tools to handle this technology, such as a backdoor or built-in access to encrypted data into their apps. Yet the federal government and law enforcement often already have the ability to access needed digital evidence, and reforms should not endanger the benefits of encryption technology that consumers and businesses enjoy, argues AAFs Director of Technology and Innovation Policy Jennifer Huddleston.

An excerpt:

Law enforcement should have the resources to address concerns about illegal activity, including those conducted via encrypted technologies. In providing these tools, however, policies should not create greater risk that undermine security and civil liberties. Rather than creating a risky and expansive policy by requiring a backdoor, policymakers and law enforcement should seek to better use existing tools and to focus on the underlying problematic behavior.

Read the analysis.

View post:
The Benefits of Encryption and the Implications of Creating Backdoors - American Action Forum

Encryption Software Market is expected to see growth rate of 18.1% and may see market size of USD11.2 Billion by 2024 – MENAFN.COM

(MENAFN - GetNews) Encryption Software Comprehensive Study by Type (Encryption for Data-at-rest, Full Disc Encryption (FDE), File Level Encryption, Others), Application (Disk Encryption, File/Folder Encryption, Data Base Encryption, Web Communication Encryption, Network Traffic Encryption, Cloud Encryption, Others), Deployment Mode (On-premises, Cloud), Enterprise Size (Small and Medium-sized Enterprises (SMEs), Large Enterprises), Industry Vertical (BFSI, IT & Telecom, Retail, G&PA, Healthcare, Defense & Aerospace, Education, Manu

Encryption software is a cryptographic program that avoids unauthorized access to digital data. Cryptography is used primarily to protect data digital information. This digital information is sent over the Internet to other computers. Portable document format is one of the world's most widely used file formats and to maintain the privacy of records, this file format supports the encryption of files. Portable document format encryption is an important desktop tool that allows the user to change the security of existing acrobat portable document format files by password. This ensures that with 128-bit encryption users can secure portable document format files and also users can easily remove existing password protection. According to AMA, the Global Encryption Software market is expected to see growth rate of 18.1% and may see market size of USD11.2 Billion by 2024.

Advance Market Analytics released a new market study on Global Encryption Software Market with 100+ market data Tables, Pie Chat, Graphs & Figures spread through Pages and easy to understand detailed analysis. At present, the market is developing its presence. The Research report presents a complete assessment of the Market and contains a future trend, current growth factors, attentive opinions, facts, and industry validated market data. The research study provides estimates for Global Encryption Software Forecast till 2025*. Some are the key players taken under coverage for this study are IBM (United States), Microsoft (United States), Symantec (United States), Thales e-Security (France), Trend Micro (Japan), Sophos (United Kingdom), Check Point (Israel), Micro Focus (United Kingdom), McAfee (United States) and Dell (United States).

Click to get Global Encryption Software Market Research Sample PDF Copy Here @: https://www.advancemarketanalytics.com/sample-report/9364-global-encryption-software-market

Market Leaders and their expansionary development strategies

In December 2018, the Symantec (United States) Company has partnered with Fortinet (United States) Company, which provider of integrated and automated cybersecurity solutions. Hence, this partnership will affect the growth of the market.In June 2018, the Sophos Company has launched Sophos Email Advanced, which is an email protection solution. Therefore, this launch will increase the product portfolio of the company.

Market Trend

Market Drivers

Opportunities

Restraints

Challenges

Important Features that are under offering & key highlights of the report:

1) what all companies are currently profiled in the report? Following are list of players that are currently profiled in the the report 'IBM (United States), Microsoft (United States), Symantec (United States), Thales e-Security (France), Trend Micro (Japan), Sophos (United Kingdom), Check Point (Israel), Micro Focus (United Kingdom), McAfee (United States) and Dell (United States)

** List of companies mentioned may vary in the final report subject to Name Change / Merger etc.

2) Can we add or profiled new company as per our need? Yes, we can add or profile new company as per client need in the report. Final confirmation to be provided by research team depending upon the difficulty of survey.** Data availability will be confirmed by research in case of privately held company. Upto 3 players can be added at no added cost.

3) Can inclusion of additional Segmentation / Market breakdown is possible? Yes, inclusion of additional segmentation / Market breakdown is possible subject to data availability and difficulty of survey. However a detailed requirement needs to be shared with our research before giving final confirmation to client.

** Depending upon the requirement the deliverable time and quote will vary.

Enquire for customization in Report @ https://www.advancemarketanalytics.com/enquiry-before-buy/9364-global-encryption-software-market

The Global Encryption Software Market segments and Market Data Break Down are illuminated below:

by Type (Encryption for Data-at-rest, Full Disc Encryption (FDE), File Level Encryption, Others), Application (Disk Encryption, File/Folder Encryption, Data Base Encryption, Web Communication Encryption, Network Traffic Encryption, Cloud Encryption, Others), Deployment Mode (On-premises, Cloud), Enterprise Size (Small and Medium-sized Enterprises (SMEs), Large Enterprises), Industry Vertical (BFSI, IT & Telecom, Retail, G & PA, Healthcare, Defense & Aerospace, Education, Manufacturing), Component (Software, Services {Consulting Services, Training and Education Services, Support and Maintenance Services, Managed Services})

To comprehend Global Encryption Software market dynamics in the world mainly, the worldwide Encryption Software market is analyzed across major global regions. AMA also provides customized specific regional and country-level reports for the following areas.

North America: United States, Canada, and Mexico. South & Central America: Argentina, Chile, and Brazil. Middle East & Africa: Saudi Arabia, UAE, Turkey, Egypt and South Africa. Europe: UK, France, Italy, Germany, Spain, and Russia. Asia-Pacific: India, China, Japan, South Korea, Indonesia, Singapore, and Australia.

Buy Full Copy Global Encryption Software Report 2018 @ https://www.advancemarketanalytics.com/buy-now?format=1 & report=9364 Try a limited scope research document specific to Country or Regional matching your objective. GET FULL COPY OF United States Encryption Software market study @ USD 2000

And, Europe Encryption Software market study @ USD 2500

Strategic Points Covered in Table of Content of Global Encryption Software Market:

Chapter 1: Introduction, market driving force product Objective of Study and Research Scope the Encryption Software market

Chapter 2: Exclusive Summary the basic information of the Encryption Software Market.

Chapter 3: Displayingthe Market Dynamics- Drivers, Trends and Challenges of the Encryption Software

Chapter 4: Presenting the Encryption Software Market Factor Analysis Porters Five Forces, Supply/Value Chain, PESTEL analysis, Market Entropy, Patent/Trademark Analysis.

Chapter 5: Displaying the by Type, End User and Region 2013-2018

Chapter 6: Evaluating the leading manufacturers of the Encryption Software market which consists of its Competitive Landscape, Peer Group Analysis, BCG Matrix & Company Profile

Chapter 7: To evaluate the market by segments, by countries and by manufacturers with revenue share and sales by key countries in these various regions.

Chapter 8 & 9: Displaying the Appendix, Methodology and Data Source

finally, Encryption Software Market is a valuable source of guidance for individuals and companies.

Browse for Full Report at @: https://www.advancemarketanalytics.com/reports/9364-global-encryption-software-market

Key highlights of the Study:

Actual Numbers & In-Depth Analysis, Business opportunities, Market Size Estimation Available in Full Report.

Thanks for reading this article, you can also get individual chapter wise section or region wise report version like North America, Europe or Asia.

About Author:

Advance Market Analytics is Global leaders of Market Research Industry provides the quantified B2B research to Fortune 500 companies on high growth emerging opportunities which will impact more than 80% of worldwide companies' revenues.

Our Analyst is tracking high growth study with detailed statistical and in-depth analysis of market trends & dynamics that provide a complete overview of the industry. We follow an extensive research methodology coupled with critical insights related industry factors and market forces to generate the best value for our clients. We Provides reliable primary and secondary data sources, our analysts and consultants derive informative and usable data suited for our clients business needs. The research study enable clients to meet varied market objectives a from global footprint expansion to supply chain optimization and from competitor profiling to M & As.

Media Contact Company Name: AMA Research & Media LLP Contact Person: Craig Francis Email: Send Email Phone: +1 (206) 317 1218 Address: Unit No. 429, Parsonage Road Edison, NJ New Jersey USA - 08837 City: New Jersey State: New Jersey Country: United States Website: https://www.advancemarketanalytics.com

MENAFN1103202000703268ID1099830955

Originally posted here:
Encryption Software Market is expected to see growth rate of 18.1% and may see market size of USD11.2 Billion by 2024 - MENAFN.COM

Big Boom in Encryption Key Management Software Market that is Significantly Growing with Top Key Players Netlib Security, Fortanix, Avery Oden, AWS -…

Encryption key management software is used to handle the administration, distribution, and storage of encryption keys. Proper management will ensure encryption keys, and therefore the encryption and decryption of their sensitive information, are only accessible for approved parties. Increasing implementation of enterprise mobility and IoT across industry verticals has led to a surge in demand for encryption software. The Encryption Key Management Software Market is expected to reach +17% CAGR during forecast period 2019-2027.

Get Sample copy of this Report @:

https://www.marketresearchinc.com/request-sample.php?id=39541

Key Players in this Encryption Key Management Software Market are:

Netlib Security, Fortanix, Avery Oden, AWS, Microsoft, OpenBSD, HyTrust, GnuPG, Hashicorp, Gemalto

The report collates data from a number of surveys, interviews, and many other primary and secondary research methodologies. The vast amount of data thus gathered from these sources is narrowed down with the help of industry-best analytical methods to present before the reader only the most crucial sets of data essential to understand the factors that will have the most profound impact on the overall development of the market. The global market for the Encryption Key Management Software and the underlying industry are discussed in great depth in a market intelligence for the readers to understand better and get the clear picture about this market.

Early Buyers will Get up to 40% Discount on This Premium Research now @:

https://www.marketresearchinc.com/ask-for-discount.php?id=39541

Across the globe, several regions have been considered to study some significant parameters of the businesses. North America, Latin America, Asia-Pacific, Africa, and Europe have been analyzed on the basis of various parameters of businesses such as type, size, application, and end-users. The global Encryption Key Management Software market is presented to various readers as a snapshot of different business strategies. To increase the outcome of the industries some applicable sales methodologies have been included in this research report.

The Encryption Key Management Software study covers extensive analysis of product type:

Global Encryption Key Management Software market applications

Access complete Report @:

https://www.marketresearchinc.com/enquiry-before-buying.php?id=39541

In this study, the years considered to estimate the size of Encryption Key Management Software are as follows:

History Year: 2013-2018

Base Year: 2018

Estimated Year: 2019

Forecast Year 2020 to 2027.

Table of Contents

Global Encryption Key Management Software Market Research Report

Chapter 1 Encryption Key Management Software Market Overview

Chapter 2 Global Economic Impact on Industry

Chapter 3 Global Market Competition by Manufacturers

Chapter 4 Global Production, Revenue (Value) by Region

Chapter 5 Global Supply (Production), Consumption, Export, Import by Regions

Chapter 6 Global Production, Revenue (Value), Price Trend by Type

Chapter 7 Global Market Analysis by Application

Chapter 8 Manufacturing Cost Analysis

Chapter 9 Industrial Chain, Sourcing Strategy and Downstream Buyers

Chapter 10 Marketing Strategy Analysis, Distributors/Traders

Chapter 11 Market Effect Factors Analysis

Chapter 12 Global Market Forecast

About Us

Market Research Inc is farsighted in its view and covers massive ground in global research. Local or global, we keep a close check on both markets. Trends and concurrent assessments sometimes overlap and influence the other. When we say market intelligence, we mean a deep and well-informed insight into your products, market, marketing, competitors, and customers. Market research companies are leading the way in nurturing global thought leadership. We help your product/service become the best they can with our informed approach.

Contact:

Market Research Inc

Kevin

51 Yerba Buena Lane, Ground Suite,

Inner Sunset San Francisco, CA 94103, USA

Call Us:+1 (628) 225-1818

Write Us@sales@marketresearchinc.com

See the article here:
Big Boom in Encryption Key Management Software Market that is Significantly Growing with Top Key Players Netlib Security, Fortanix, Avery Oden, AWS -...

Artificial Intelligence (AI) in Supply Chain Market to Grow at a CAGR of 45.3% to Reach $21.8 billion by 2027, Largely Driven by the Consistent…

London, March 11, 2020 (GLOBE NEWSWIRE) -- TheArtificial Intelligence (AI) in supply chain market is expected to grow at a CAGR of 45.3% from 2019 to 2027 to reach $21.8 billion by 2027.

Artificial intelligence has emerged as the most potent technologies over the past few years, that is transitioning the landscape of almost all industry verticals. Although enterprise applications based on AI and Machine Learning (ML) are still in the nascent stages of development, they are gradually beginning to drive innovation strategies of the business.

DownloadFree Sample Report Now @https://www.meticulousresearch.com/download-sample-report/cp_id=5064

In the supply chain and logistics industry, artificial intelligence is gaining rapid traction among industry stakeholders. Players operating in the supply chain and logistics industry are increasingly realizing the potential of AI to solve the complexities of running a global logistics network. Adoption of artificial intelligence in the supply chain is routing a new era or industrial transformation, allowing the companies to track their operations, enhance supply chain management productivity, augment business strategies, and engage with customers in digital world.

The growth in the AI in supply chain market is mainly driven by rising awareness of artificial intelligence and big data & analytics and widening implementation of computer vision in both autonomous & semiautonomous applications. In addition, consistent technological advancements in the supply chain industry, rising demand for AI-based business automation solutions, and evolving supply chain complementing growing industrial automation are further offering opportunities for vendors providing AI solutions in the supply chain industry. However, high deployment and operating costs and lack of infrastructure hinder the growth of the artificial intelligence in supply chain market.

In this study, the global artificial intelligence(AI) in supply chain market is segmented on the basis of component, application, technology, end user, and geography.

Based on component, AI in supply chain market is broadly segmented into hardware, software, and services. The software segment commanded the largest share of the overall AI in supply chain market in 2019. This can be attributed to the increasing demand for AI-based platforms and solutions, as they offer supply chain visibility through software, which include inventory control, warehouse management, order procurement, and reverse logistics & tracking.

Based on technology, AI in supply chain market is broadly segmented into machine learning, computer vision, natural language processing, and context-aware computing. In 2019, the machine learning segment commanded the largest share of the overall AI in supply chain market. The growth in this market can be attributed to the growing demand for AI based intelligent solutions; increasing government initiatives; and the ability of AI solutions to efficiently handle and analyze big data and quickly scan, parse, and react to anomalies.

Based on application, AI in supply chain market is broadly segmented into supply chain planning, warehouse management, fleet management, virtual assistant, risk management, inventory management, and planning & logistics. In 2019, the supply chain planning segment commanded the largest share of the overall AI in supply chain market. The growth of this segment can be attributed to the increasing demand for enhancing factory scheduling & production planning and the evolving agility and optimization of supply chain decision-making. In addition, digitizing existing processes and workflows to reinvent the supply chain planning model is also contributing to the growth of this segment.

To gain more insights into the market with a detailed table of content and figures, click here:https://www.meticulousresearch.com/product/artificial-intelligence-ai-in-supply-chain-market-5064/

Based on end-user, artificial intelligence(AI) in supply chain market is broadly segmented into manufacturing, food & beverage, healthcare, automotive, aerospace, retail, and consumer packaged goods sectors. The retail sector commanded the largest share of the overall AI in supply chain market in 2019. This can be attributed to the increase in demand for consumer retail products.

Based on geography, the global artificial intelligence (AI) in supply chain market is categorized into five major geographies, namely, North America, Europe, Asia Pacific, Latin America, and the Middle East & Africa. In 2019, North America commanded for the largest share of the globalAI in supply chain market, followed by Europe, Asia-Pacific, Latin America, and the Middle East & Africa. The large share of the North American region is attributed to the presence of developed economies focusing on enhancing the existing solutions in the supply chain space, and the existence of major players in this market along with a high willingness to adopt advanced technologies.

On the other hand, the Asia-Pacific region is projected to grow at the fastest CAGR during the forecast period. The high growth rate is attributed to rapidly developing economies in the region; presence of young and tech-savvy population in this region; growing proliferation of Internet of Things (IoT); rising disposable income; increasing acceptance of modern technologies across several industries including automotive, manufacturing, and retail; and broadening implementation of computer vision technology in numerous applications. Furthermore, the growing adoption of AI-based solutions and services among supply chain operations, increasing digitalization in the region, and improving connectivity infrastructure are also playing a significant role in the growth of this AIin supply chain market in the region.

The global artificial intelligence in supply chain market is fragmented in nature and is characterized by the presence of several companies competing for the market share. Some of the leading companies in the AIin supply chain market are from the core technology background. These include IBM Corporation (U.S.), Microsoft Corporation (U.S.), Google LLC (U.S.), and Amazon.com, Inc. (U.S.). These companies are leading the market owing to their strong brand recognition, diverse product portfolio, strong distribution & sales network, and strong organic & inorganic growth strategies.

The other key players operating in the globalAI in supply chain market are Intel Corporation (U.S.), Nvidia Corporation (U.S.), Oracle Corporation (U.S.), Samsung (South Korea), LLamasoft, Inc. (U.S.), SAP SE (Germany), General Electric (U.S.), Deutsche Post DHL Group (Germany), Xilinx, Inc. (U.S.), Micron Technology, Inc. (U.S.), FedEx Corporation (U.S.), ClearMetal, Inc. (U.S.), Dassault Systmes (France), and JDA Software Group, Inc. (U.S.), among others.

DownloadFree Sample Report Now @https://www.meticulousresearch.com/download-sample-report/cp_id=5064

Key questions answered in the report-

Related Reports:

Artificial Intelligence in Manufacturing Marketby Offering (Hardware, Software, and Services), End-use Industry (Semiconductors and Electronics, Energy and power, Pharmaceuticals, Chemical, Medical Devices, Automobile, Heavy Metal and Machine Manufacturing, Food and Beverages, Others), Technology (Machine Learning, NLP, Context-Aware Computing, and Computer Vision), Application (Predictive Maintenance, Material Movement, Production Planning, Field Services, Quality Management, Cybersecurity, Industrial Robotics, and Reclamation), and Region - Global Forecast to 2025

Artificial Intelligence in Healthcare Marketby Product (Hardware, Software, Services), Technology (Machine Learning, Context-Aware Computing, NLP), Application (Drug Discovery, Precision Medicine), End User, And Geography - Global Forecast To 2025

Artificial Intelligence in Retail Marketby Product (Chatbot, Customer Relationship Management), Application (Programmatic Advertising), Technology (Machine Learning, Natural Language Processing), Retail (E-commerce and Direct Retail)- Forecast to 2025

Automotive Artificial Intelligence Marketby Offering (Hardware, Software), Technology (Machine Learning, Deep Learning, Computer Vision, Context Awareness, Natural Language Processing), Process (Signal Recognition, Image Recognition, Voice Recognition, Data Mining), Drive (Autonomous Drive, Semi-autonomous Drive), and Region Global Forecast to 2025

Artificial Intelligence in Security Marketby Offering (Hardware, Software, Service), Security Type (Network Security, Application Security), Technology (Machine Learning, NLP, Context Awareness,), Solution, End-User, and Region - Global Forecast to 2027

Meticulous Researchalso offersCustom Researchservices providing focused, comprehensive and tailored research.

About Meticulous Research

The name of our company defines our services, strengths, and values. Since the inception, we have only thrived to research, analyze and present the critical market data with great attention to details.

Meticulous Research was founded in 2010 and incorporated as Meticulous Market Research Pvt. Ltd. in 2013 as a private limited company under the Companies Act, 1956. Since its incorporation, with the help of its unique research methodologies, the company has become the leading provider of premium market intelligence in North America, Europe, Asia-Pacific, Latin America, and Middle East & Africa regions.

With the meticulous primary and secondary research techniques, we have built strong capabilities in data collection, interpretation, and analysis of data including qualitative and quantitative research with the finest team of analysts. We design our meticulously analyzed intelligent and value-driven syndicate market research reports, custom studies, quick turnaround research, and consulting solutions to address business challenges of sustainable growth.

See the original post here:
Artificial Intelligence (AI) in Supply Chain Market to Grow at a CAGR of 45.3% to Reach $21.8 billion by 2027, Largely Driven by the Consistent...

Cybersecurity pros are using artificial intelligence but still prefer the human touch – TechRepublic

More than half of organizations have adopted AI for security efforts, but a majority are more confident in results verified by humans, according to WhiteHat Security.

Security professionals need a varied bag of tricks to keep up with savvy and sophisticated cybercriminals. Artificial intelligence is one valuable weapon in the arsenal as it can handle certain tasks faster and more efficiently than can human beings. But AI being AI, it's far from perfect. That's why many security pros still want the human element to play a significant role in their security defense, according to a survey from WhiteHat Security.

SEE:The 10 most important cyberattacks of the decade (free PDF)(TechRepublic)

Based on a survey of 102 industry professionals conducted at the RSA Conference 2020, WhiteHat's "AI and Human Element Security Sentiment Study" found that more than half of the respondents are using AI or machine learning (ML) in their security efforts. More than 20% said that AI-based tools have made their cybersecurity teams more efficient by eliminating a huge number of more mundane tasks.

Image: WhiteHat Security

Further, almost 40% of respondents said they feel their stress levels have dropped since adding AI tools to their security process. And among those, 65% said that AI tools let them focus more on migitating and preventing cyberattacks than they could previously.

However, incorporating AI doesn't take human beings out of the security equation; just the opposite. A majority of those polled agreed that the human element offers skills that AI and ML can't match.

Almost 60% of the respondents said they remain more confident in cyberthreat findings that are verified by human over AI. When asked why they prefer the human touch, 30% pointed to intuition as the most important human element, 21% mentioned the role of creativity, and almost 20% cited previous experience and frame of reference as the most critical advantage of humans over AI.

On its end, WhitePoint described three reasons it supplements its own AI and ML learning systems with human verification:

Strengthen your organization's IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices. Delivered Tuesdays and Thursdays

Image: Getty Images/iStockphoto

Read more from the original source:
Cybersecurity pros are using artificial intelligence but still prefer the human touch - TechRepublic

The VA Has Embraced Artificial Intelligence To Improve Veterans’ Health Care – KPBS

Wednesday, March 11, 2020

Stephanie Colombini/American Homefront

Credit: Stephanie Colombini/American Homefront

Above: Drs. Andrew Borkowski (left) and Stephen Mastorides analyze slides under a microscope to spot cancer in tissue samples in this undated photo.

Aired 3/11/20 on KPBS News

Listen to this story by Stephanie Colombini.

Inside a laboratory at the James A. Haley Veterans' Hospital in Tampa, Fla., machines are rapidly processing tubes of patients' body fluids and tissue samples. Pathologists examine those samples under microscopes to spot signs of cancer and other diseases.

But distinguishing certain features about a cancer cell can be difficult, so Drs. Stephen Mastorides and Andrew Borkowski, decided to get a computer involved.

In a series of experiments, they uploaded hundreds of images of slides containing lung and colon tissues into artificial intelligence software. Some of the tissues were healthy, while others had different types of cancer, including squamous cell and adenocarcinoma.

Then they tested software with more images the computer had never seen before.

"The module was able to put it together, and it was able to differentiate, 'Is it a cancer or is it not a cancer?'" Borkowski said. "And not only that, but it was also able to say what kind of cancer is it."

The doctors were harnessing the power of what's known as machine learning. Software pre-trained with millions of images, like dogs and trees, can learn to distinguish new ones. Mastorides, chief of pathology and laboratory medicine services at the Tampa VA, said it took only minutes to teach the computer what cancerous tissue looks like.

The two VA doctors recently published a study comparing how different AI programs performed when training computers to diagnose cancer.

"Our earliest studies showed accuracies over 95 percent," Mastorides said.

Enhance, not replace

The doctors said the technology could be especially useful in rural veterans clinics, where pathologists and other specialists aren't easily accessible, or in crowded VA emergency rooms, where being able to spot something like a brain hemorrhage faster could save more lives.

Borkowski. the chief of the hospital's molecular diagnostics section, said he sees AI as a tool to help doctors work more efficiently, not to put them out of a job.

"It won't replace the doctors, but the doctors who use AI will replace the doctors that don't," he said.

The Tampa pathologists aren't the first to experiment with machine learning in this way. The U.S. Food and Drug Administration has approved about 40 algorithms for medicine, including apps that predict blood sugar changes and help detect strokes in CT scans.

The VA already uses AI in several ways, such as scanning medical records for signs of suicide risks. Now the agency is looking to expand research into the technology.

The department announced the hiring of Gil Alterovitz as its first-ever Artificial Intelligence Director in July 2019 and launched The National Artificial Intelligence Institute in November. Alterovitz is a Harvard Medical School professor who co-wrote an artificial intelligence plan for the White House last year.

He said the VA has a "unique opportunity to help veterans" with artificial intelligence.

As the largest integrated health care system in the country, the VA has vast amounts of patient data, which is helpful when training AI software to recognize patterns and trends. Alterovitz said the health system generates about a billion medical images a year.

He described a potential future where AI could help combine the efforts of various specialists to improve diagnoses.

"So you might have one site where a pathologist is looking at slides, and then a radiologist is analyzing MRI and other scans that look at a different level of the body," he said. "You could have an AI orchestrator putting together different pieces and making potential recommendations that teams of doctors can look at."

Alterovitz is also looking for other uses to help VA staff members make better use of their time and help patients in areas where resources are limited.

"Being able to cut the (clinician) workload down is one way to do that," he said. "Other ways are working on processes, so reducing patient wait times, analyzing paperwork, etc."

Barriers to AI

But Alterovitz notes there are challenges to implementing AI, including privacy concerns and trying to understand how and why AI systems make decisions.

Last year, DeepMind Technologies, an AI firm owned by Google, used VA data to test a system to predict deadly kidney disease. But for every correct prediction, there were two false positives.

Those false results may cause doctors to recommend inappropriate treatments, run unnecessary tests, or do other things that could harm patients, waste time, and reduce confidence in the technology.

"It's important for AI systems to be tested in real-world environments with real-world patients and clinicians, because there can be unintended consequences," said Mildred Cho, the Associate Director of the Stanford Center for Biomedical Ethics.

Cho also said it's important to test AI systems with a variety of demographics, because what may work for one population may not for another. The DeepMind study acknowledged that more than 90 percent of the patients in the dataset it used to test the system were male veterans, and that performance was lower for females.

Alterovitz said the VA is taking those concerns into account as the agency experiments with AI and tries to improve upon the technology to ensure it is reliable and effective.

This story is part of our American Homefront Project, a public media collaboration on in-depth military coverage with funding from the Corporation for Public Broadcasting and The Patriots Connection.

KPBS' daily news podcast covering local politics, education, health, environment, the border and more. New episodes are ready weekday mornings so you can listen on your morning commute.

To view PDF documents, Download Acrobat Reader.

Original post:
The VA Has Embraced Artificial Intelligence To Improve Veterans' Health Care - KPBS

Artificial intelligence, machine learning primed to deliver ‘a wave of discoveries’ – The Northern Miner

The past 20 years have seen remarkable advances in the mining industry, particularly in mineral exploration technologies with vast volumes of data generated from geologic, geophysical, geochemical, satellite and other surveying techniques. However, the abundance of data has not necessarily translated into the discovery of new deposits, according to Colin Barnett, co-founder of BW Mining, a Boulder, Colorado-based data mining and mineral exploration company.

One of the problems were facing in exploration is the huge increase in the amounts of data we have to look at, said Barnett, in his presentation at theManaging and exploring big data through artificial intelligence and machine learning session at the recent PDAC 2020 convention in Toronto. And although its high-quality data, the sheer volume is becoming almost overwhelming for human interpreters, and so we need help in getting to the bottom of it.

By integrating hundreds or even thousands of interdependent layers of data, with each layer making its own statistically determined contribution, machine learning offers a solution to the problem of tackling the massive amounts of data generated, and a powerful new tool in the search for mineral deposits.

But, in an interview with The Northern Miner, he cautioned that to fully exploit the potential of machine learning in mineral exploration, prospectors will still need to devote considerable time and effort to the preparation of data before machine learning techniques can add value for companies.

To illustrate his point, Barnett demonstrated how he and his partner at BW Mining, Peter Williams, are using machine learning to analyze data from geological, geochemical and geophysical surveys of the Yukon in northwestern Canada to locate new deposits.

The Yukon became famous for the Klondike gold rush during the late 1890s, which petered out after a few years as prospectors moved onto Alaska. Today the area is experiencing a renewed interest in what has become known as the Tintina Gold Belt, with significant lode deposits being found over the past two decades and, according to Barnett, more waiting to be discovered.

We used the Yukon bedrock geology map published by the Yukon Geological Survey, which is very detailed and shows over 200 different geological formations, explained Barnett. However, you cant simply put 200 formations into a machine learning process. First, the data requires special treatment.

By representing each of the formations with a separate grid and by continuing the grids upward, they were able to see overlaps between formations, allowing them to consolidate the data by grouping the formations by rock type and age, and thereby reducing the data set down to around 50 discrete and different formations. They then used the same process to represent structural data provided by the map.

The structural data is important because it represents the pathways that the mineralization generally took to reach the surface, said Barnett. We then used geophysical maps of the area provided by Natural Resources Canada, which contain enormous amounts of information that can be extracted and subjected to the same statistical treatment, explained Barnett.

Applying the same approach to geochemical, gravity, topographical and satellite data, they were able to generate detailed data sets covering over 300,000 400,000 square kilometers of the study area.

The most critical layer of data for our machine learning process is the known deposits because this is used to train our artificial neural network against all the other layers to identify deposit formations, said Barnett.

Artificial neural networks operate much like the human brain. They can recognize patterns in the different layers of data and cluster or classify them into groups according to similarities in the input data. They are then capable of discriminating between zones of high and low mineral potential.

After scouring through geologic publications, company websites and NI 43-101 technical reports, Barnett and Williams were able to develop accurate mineral footprints for more than 30 deposits using their model, which, according to Barnett, reportedly contain over 46 million oz. of gold.

They then used an artificial neural network to establish the statistical favourability of a location containing an economically viable deposit across the entire region of interest. This approach is essentially an inversion process that uses exploration data relating to a given location as inputs to the network, which then produces the corresponding favourability as the output.

Image of a typical target. Red areas are highly favourable, while purple areas are shown as unfavourable for gold. Credit: BW Mining.

This requires very sophisticated software to analyze and interpret the data, so you cant just use off-the-shelf software, explained Barnett. We first started analyzing the data on a parallel-processor in the basement of the University of Sussex [in England] back in 1992, where my partner was a professor. But it would take five days to get an answer by which time wed forgotten what the question was.

However, with improvements to computer software and hardware, they are now able to generate an answer in a matter of hours using a common laptop.

Barnetts and Williams use of artificial intelligence and machine learning has led to a highly-focused target map that assigns numerical probabilities of making an economic discovery anywhere in the region of interest. And can be used to systematically rank and rate targets and plan cost-effective follow-up programs that take into account the expected return on investment for any given target.

Although Barnett believes there is currently a lack of understanding of artificial intelligence and machine learning in the industry, he is convinced that as these techniques become more widely used and available, machine learning and artificial intelligence will lead to a wave of discoveries. And within ten years, they will be commonly used tools in the mineral exploration industry.

Read the original:
Artificial intelligence, machine learning primed to deliver 'a wave of discoveries' - The Northern Miner

Jvion Tackles Socioeconomic Barriers to Care with Industry-Leading Artificial Intelligence – GlobeNewswire

ATLANTA, March 11, 2020 (GLOBE NEWSWIRE) -- Jvion, a leader in Clinical Artificial Intelligence (AI), today announced the release of its innovative Social Determinants of Health (SDOH) solution that identifies socioeconomic barriers driving an individuals health risk and opportunities for investment in community benefit programs to address gaps in care. Leveraging Jvions peer-reviewed analytics layer and Microsoft Azure Maps, the solution empowers providers and health systems to address underserved populations and inequalities in existing healthcare delivery. Jvion goes beyond helping providers better understand the impact of SDOH by offering individualized interventions that aid in aligning community benefits more effectively.

Providers and healthcare executives recognize the growing role of socioeconomic insights in healthcare, especially in meeting the needs of underserved populations. To date, capturing that data and turning it into meaningful and actionable intelligence has proved elusive for many, said Shantanu Nigam, CEO of Jvion. Our unique approach turns socioeconomic, environmental, and behavioral data into real clinical value that drives higher engagement, more tailored interventions, and greater alignment between need and risk, resulting in better outcomes for individuals and the community as a whole.

As alignment and access to community benefit programs continue to be the cornerstone of building healthier communities, providers need appropriate insight into their populations and individual healthcare needs. Hospitals spent $95 billion on community benefits in the most recent year data is available (American Hospital Association), and increasingly both federal and state regulators are seeking clarity on what benefits are being provided to communities with this spend and their impact. Jvions SDOH solution not only fulfills the federal and state assessment needs for healthcare organizations, but also strategically informs providers where to allocate their community benefit spend to have the greatest level of impact.

Jvions SDOH solution requires limited input from providers and none from patients, largely relying on its high-performing AI approach, which leverages a global instance of de-identified patients to power the inferential outputs of the solution. Through this approach, the community inherits the attributes of the individual versus traditional methods, which apply community qualities to the individual. The SDOH solution features an interactive map interface built using Microsoft Azure maps and a web-based portal.

Were pleased that this technology collaboration is helping healthcare organizations in transforming patient care and their businesses. The Microsoft platform helps responsibly unify people, devices, apps and information by prioritizing compliance, security and trust, said Gareth Hall, director of business strategy for Worldwide Healthcare at Microsoft. Our partners are critical in helping healthcare organizations use technology to address industry challenges and seize opportunities to impact peoples lives in a positive way. The combination of the Microsoft platform and partner innovation is key to helping our industry transform.

The Jvion SDOH solution is now available. Register here to schedule a virtual demo. Additional information is available at https://jvion.com/jvionclinicalai/.

The latest KLAS report, Healthcare AI 2019 - Actualizing the Potential of AI, recognized Jvion as having by far the largest client base in the healthcare AI market," and "the largest offering of pre-built healthcare content for machine learning models/vectors." Additionally, Jvion was featured in the CB Insights Digital Health 150, showcasing the most promising private digital healthcare companies in the world.

About JvionJvion enables healthcare organizations to prevent avoidable patient harm and lower costs through its AI-enabled prescriptive analytics solution. An industry first, the Jvion Machine goes beyond simple predictive analytics and machine learning to identify patients on a trajectory to becoming high risk and for whom intervention will likely be successful. Jvion determines the interventions that will more effectively reduce risk and enable clinical action. And it accelerates time to value by leveraging established patient-level intelligence to drive engagement across hospitals, populations, and patients. To date, the Jvion Machine has been deployed across about 50 hospital systems and 300 hospitals, who report average reductions of 30% for preventable harm incidents and annual cost savings of $6.3 million. For more information, visit http://www.jvion.com.

Jvion PR Contact:Lexi Herosianlexi@scratchmm.com

Go here to see the original:
Jvion Tackles Socioeconomic Barriers to Care with Industry-Leading Artificial Intelligence - GlobeNewswire