The holiday season is upon us. After a difficult year, and facing an even more challenging year ahead, digital defense experts don’t have visions of sugar plums dancing in their heads. Instead, they dream of cybersecurity tools and other resources to help them cope with a wild threat landscape.
Here’s our ultimate holiday wish list.
Deep learning is one of the most advanced forms of machine learning, and is showing new developments in many industries. In this article, we’ll explain the concept and give some examples of the latest and greatest ways it’s being used.
What is deep learning?
There have been many attempts at creating a definition of deep learning.
As we
Words for health and the human body often make their way into the language we use to describe IT. Computers get viruses; companies manage their security hygiene; incident response teams train on their cyber fitness. Framing IT concepts in terms of health can also be useful when looking at security operations centers (SOCs) and jobs in cybersecurity.
For man
While many countries are beginning to ease up on their respective pandemic lock downs—which, in turn, also means that everyone will soon ease into a life that is not quite post-COVID-19—we find ourselves once more on the cusp of change, an outlook that makes some feel anxious and others hopeful.
But for forward-looking security experts, there are some fut
Zero-day vulnerabilities enable threat actors to take advantage of security blindspots. Typically, a zero-day attack involves the identification of zero-day vulnerabilities, creating relevant exploits, identifying vulnerable systems, and planning the attack. The next steps are infiltration and launch.
This article examines three recent zero-day atta
During a brainstorming discussion with a colleague on the value of entropy in machine learning models, specifically the models used in threat intelligence work, I mentioned that many of the threat intelligence models in use today seem to overemphasize the pattern recognition aspect of threat intelligence through the egregious use of algorithms. By contrast,
Last week, a few major tech companies informed the public that they will not provide facial recognition software to law enforcement. These companies are concerned about the way in which their technology might be used.
What happens when software that threatens our privacy falls into the hands of organization which we no longer trust? In general, being awar
Reading Time: ~ 3 min.
As these times stress the bottom lines of businesses and
SMBs alike, many are looking to cut costs wherever possible. The problem for
business owners and MSPs is that cybercriminals are not reducing their budgets
apace. On the contrary, the rise in COVID-related scams has
been noticeable.
It’s simply no time to cut corners in
A quick web search for “chatbots and security” brings up results warning you about the security risks of using these virtual agents. Dig a little deeper, however, and you’ll find that this artificial intelligence (AI) technology could actually help address many work-from-home cybersecurity challenges — such as secure end-to-end encryption a
In a previous blog post, I covered some of the challenges encountered by security operations centers (SOCs) and how leveraging artificial intelligence (AI) can help alleviate these challenges, including the cybersecurity skills shortage, unaddressed security risks and long dwell times. According to ISACA’s State of Cybersecurity Report, 78 percent of r
Reading Time: ~ 3 min.
If you’ve
been working in the technology space for any length of time, you’ve undoubtedly
heard about the rising importance of artificial intelligence (AI) and machine
learning (ML). But what can these tools really do for you? More
specifically, what kinds of benefits do they offer for cybersecurity and
business operations?
If you’r
Technologies like artificial intelligence (AI) and neural networks are driven by deep learning — machine learning algorithms that get “smarter” with more data. The deepfake, a severe cybersecurity threat, wouldn’t be possible without deep learning.
Deepfakes aside, we need to be aware that several machine learning models, including state-of
byLisa VaasClearview AI, the controversial facial recognition startup that’s gobbled up more than three billion of our photos by scraping social media sites and any other publicly accessible nook and cranny it can find, has lost its entire list of clients to hackers – including details about its many law enforcement clients.In a notification that
Artificial intelligence is an immensely helpful tool for businesses and consumers alike, how to use artificial intelligence to secure sensitive Information
Artificial intelligence (AI) is an immensely helpful tool for businesses and consumers alike. By processing data quickly and predicting analytics, AI can do everything from automating systems to prote
byLisa VaasA popular self-driving car dataset for training machine-learning systems – one that’s used by thousands of students to build an open-source self-driving car – contains critical errors and omissions, including missing labels for hundreds of images of bicyclists and pedestrians.Machine learning models are only as good as the data o