Metanav

  • 20-EA-332C-AutomotiveCyberSecurityAd-FNL-ORG-940x260_title

    Ideal for technical professionals who need to understand automotive cyber security evolution, this five-course program explores cyber security issues, vehicular data collection, and automotive applications of blockchain technology.
    Learn more

  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7

Latest Posts


image-segmentation

New “Tiny” Machine Learning Model Enables Edge Devices to Perform Image Segmentation 

Image segmentation, key to both human and computer vision, is the process of parsing data into distinct groups. While this process comes naturally to humans, it has been a frustrating challenge for the machine learning models vital for enabling computer vision.  Currently, segmentation depends on ...
Read More

Three Ways To Prepare for Data Privacy Laws

When it comes to personal data, individuals and governments alike are becoming more privacy conscious, and it’s not hard to see why. Cyber attacks ensnaring government and private organizations, such as those launched against SolarWinds and Colonial Pipeline, are becoming more frequent. Meanwhile, organizations are ...
Read More
digital-transformation-for-growth

Six Ways Organizations Can Leverage Digital Transformation for Growth

Thousands of organizations all over the world underwent digital transformations during pandemic-related shutdowns as a means of survival. Now, as they emerge from lockdowns, many are beginning to use digital transformation as a tool for growth. Moving forward, organizational leaders need to determine key metrics ...
Read More
becoming-a-better-leader

Three Simple Steps to Becoming a Better Leader

Managers promoted for their technical knowledge sometimes lack the soft skills vital for them to be effective leaders who inspire and foster commitment among their teams. With the right training, these managers can grow to become strong, well rounded leaders. How Can You Become A ...
Read More
fair-ai-systems

U.S. Federal Trade Commission: Seven Ways to Help Ensure Fair AI Systems

In April, the European Union (EU) and the U.S. Federal Trade Commission (FTC) each released regulations aimed at curbing the potential risks of artificial intelligence (AI). While the FTC regulations apply nationally in the U.S., enforcement of the EU regulations is left to EU member ...
Read More
5g-threat-vectors

Protecting Against Three Major 5G Threat Vectors

A recent report from the U.S. Cybersecurity and Infrastructure Security Agency, the National Security Agency, and the Office of the Director of National Intelligence, warns of three major threat vectors that can potentially imperil 5G networks. The report, titled Potential Threat Vectors to 5G Infrastructure, ...
Read More

Cyber Security Demand is Expected to Grow. Is Your Organization Prepared? 

The demand for cyber security professionals dropped sharply a year ago. According to a recent (ISC)² 2020 Cyber Security Workforce Study report, global demand plummeted from 4 million in 2019 to 3.1 million in 2020. The decline represents a staggering 25% decrease in the 2020 ...
Read More
invisible-leadership-transitions

Four Ways To Make “Invisible” Leadership Transitions Easier

The COVID-19 pandemic has disrupted the way businesses operate, forcing thousands of organizations to digitize their workforces. In the process, job transitions have exploded, and many managers are undergoing major shifts in their roles and responsibilities. In some cases, these leadership transitions are transparent while ...
Read More
blockchain-and-iot-applications

Why the Future Internet of Things Depends on Blockchain

The Internet of Things (IoT) has the power to connect all devices through a cloud-based ecosystem. In the future, it could potentially undergird the infrastructure of smart cities in order to make communications far more streamlined and efficient than they are today. However, a major ...
Read More

Loading...