Skip to content

Electronics and ICT (EICT)

Electronics, Information and Communications Technology

  • Home
  • About Us
  • Electronics
  • IoT
  • Sensors
  • Cyber security
  • web hosting
  • cloud
  • Contact Us

Category: Cyber security

Categories Cyber security ICT security

Benefits, Risks, and Future of AI and ML in Cybersecurity

Amos KingatuaPosted onSeptember 27, 2019June 5, 2020

It’s essential to recognize that machine learning (ML) is not impenetrable or watertight from different attack methods. But on the other hand, it has the … Continue ReadingBenefits, Risks, and Future of AI and ML in Cybersecurity

Cyber Attacks Despite Heavy Spending on Security Products
Categories Artificial Intelligence Cyber security Machine learning security

Cyber Attacks Despite Heavy Spending on Security Products

Amos KingatuaPosted onMay 21, 2019

The number of cyber attacks continues to sour despite heavy spending on security solutions. Today, the changing computing landscape that now includes the cloud, traditional … Continue ReadingCyber Attacks Despite Heavy Spending on Security Products

Categories Artificial Intelligence Cyber security security

Risks and Future of ML and AI in Cybersecurity

Amos KingatuaPosted onMay 13, 2019March 30, 2020

Using ML and AI in cybersecurity solutions has great potential to improve security as long as the technologies use accurate and clean data. Unfortunately, it … Continue ReadingRisks and Future of ML and AI in Cybersecurity

Powering Cybersecurity with Artificial Intelligence and Machine Learning
Categories Artificial Intelligence Cyber security data Data Privacy Machine learning

Powering Cybersecurity with Artificial Intelligence and Machine Learning

Amos KingatuaPosted onMay 7, 2019February 3, 2021

Artificial intelligence and machine learning have the ability to automate and increase the speed of detecting and responding to cyber threats. The technologies can enhance … Continue ReadingPowering Cybersecurity with Artificial Intelligence and Machine Learning

Categories Cyber security Data Privacy personal data

Protected: Personal Data Privacy Techniques in the Wake of GDPR

Amos KingatuaPosted onJanuary 29, 2019January 29, 2019

There is no excerpt because this is a protected post.

Researchers Develop Malware that Compromise Building Automation Systems
Categories building automation Cyber security

Researchers Develop Malware that Compromise Building Automation Systems

Amos KingatuaPosted onJanuary 18, 2019December 19, 2019

Research by a security company, ForeScout, has demonstrated how hackers can use malware to compromise building automation systems (BAS). The company did this by developing … Continue ReadingResearchers Develop Malware that Compromise Building Automation Systems

Categories Cyber security

Protected: AI and ML in Cybersecurity Risks and Future

Amos KingatuaPosted onOctober 24, 2018November 1, 2018

There is no excerpt because this is a protected post.

Posts navigation

Newer Posts

More Categories

Cobra ACXT145 compact, affordable, and lightweight two-way radio/walkie talkie for everyone - up to 16-mile range, NOAA Weather Alerts, Roger Beep Tone, Battery/Power Saver and more. 3 pack - $72.6 and 2 pack -$51.8

Recent Posts

  • Types of Printed Circuit Boards (PCBs)
  • Printed Circuit Board Layout Considerations and Best Practices
  • Electronics Circuits Design and Components Selection for Compliance
  • Designing Electronics for Harsh Environments: Considerations and Best Practices Across Critical Industries
  • Cloud Detection and Response (CDR): Modern Security for the Cloud Era
  • Soldering Tools and Techniques for Marine, Oil Field, and Other Harsh Environments
  • Starlink Internet Faces Challenges in Kenya and Africa

Recommended products

  • Smart Desk that Reduces Back Pain and Health Risks

Subscribe to Blog via Email

Copyright © 2025 Electronics and ICT (EICT) | DevotePress by Catch Themes