STE Security Innovation Awards info released

Aug. 3, 2012

Security Technology Executive magazine and SecurityInfoWatch.com today released the information on how to enter the 2012 Security Innovation Awards program. You can find the details on our dedicated webpage for the Security Innovation Awards.

Arkadiusz Warguła / iStock / Getty Images Plus via Getty Images
Maliciously crafted inputs can exploit machine learning models at the algorithmic level, bypassing traditional cybersecurity defenses.
Pakhnyushchyy / iStock / Getty Images Plus via Getty Images
Advocates highlight that with proper oversight and adherence to the Five Cs — Community Engagement, Civil Liberties Protection, Common Procedures, Clear Oversight, and Cybersecurity — drones can enhance public safety without compromising civil rights.