7,612 Results for:algorithms

  • Sort by: 

CISSP training video: Cryptography algorithms and encryption keys

By Shon Harris 03 Oct 2014

In this CISSP Essentials Security School presentation, Shon Harris explains the basics of the Cryptography domain, including definitions, cryptography algorithms, encryption keys and more. Read More

The suburban rogue trader's algorithms behind the 2010 US flash crash

By Karl Flinders 24 Apr 2015

US authorities accuse British trader Navinder Singh Sarao of manipulating the stock market with fraudulent trades, triggering the 2010 flash crash Read More

Machine learning's training data is a security vulnerability

By Nicole Laskowski 31 Oct 2017

Microsoft's Danah Boyd has a sobering message for CIOs: The data used to train machine learning algorithms is at risk. Read More

iXBRL inventor: my algorithm turns UK company data into 'useless PDFs'

By Mark Ballard 11 Aug 2015

The UK business registrar has been rendering its revolutionary company data useless with software written by the very man who invented the principle way to make it meaningful.It has taken Companies ... Read More

Improve your user engagement metrics with emotional analytics

By George Lawton 28 Aug 2017

Find out how new emotion analytics algorithms are bringing feeling, emotional connection, and engagement to modern apps. Read More

Up to 270 women may have died due to breast cancer screening IT failure, says health secretary

By Lis Evenstad 02 May 2018

Computer algorithm failure caused 450,000 women to miss their breast cancer screenings – some of whom will have "had their lives shortened" by the error, Jeremy Hunt has admitted Read More

Secure Hash Algorithm-3: How SHA-3 is a next-gen security tool

By Michael Cobb 30 Oct 2015

Expert Michael Cobb details the changes in SHA-3, including how it differs from its predecessors and the additional security it offers, and what steps enterprises should take. Read More

How machine learning is used to detect fraud

By Aaron Tan 27 Apr 2018

One of machine learning’s most well-known use cases is fraud detection, an area that has drawn the attention of a growing number of technology suppliers looking to develop the best algorithms and ... Read More

RSA-1024 keys: How does a Libgcrypt vulnerability expose them?

By Nick Lewis 31 Jan 2018

A Libgcrypt vulnerability could allow attackers to recover private RSA-1024 keys, as it allows a left-to-right sliding window that shows how specific parts of the algorithm work. Read More

Atos targets universities and research centres with quantum computing simulator

By Karl Flinders 05 Jul 2017

Atos has made a quantum computing simulator available for sale so that organisations can test out the algorithms of the future Read More