mobile cybersecurity

Threat of Side-Channel Attacks Increases with Deep-Learning Model

The rapid innovations in deep learning, expanding use of laptops, and growing number of smartphones with microphones are creating an environment that makes it easier for bad actors to compromise the laptops ...
Security Boulevard
DeepPass — Finding Passwords With Deep Learning

DeepPass — Finding Passwords With Deep Learning

DeepPass — Finding Passwords With Deep LearningOne of the routine tasks operators regularly encounter on most engagements is data mining. While exactly what operators are after varies from environment to environment, there is one common ...
process automation Palo Alto Networks developer security AI felony mdr cybersecurity

Palo Alto Networks Adds Deep Learning Algorithms to Security Platforms

Palo Alto Networks today released an update to its firewall’s core operating system, PAN-OS, that expands the depth of the artificial intelligence (AI) capabilities that can be used to thwart cybersecurity threats ...
Security Boulevard
Deep Instinct Report Highlights Need to Rethink Approach to Cybersecurity

Deep Instinct Report Highlights Need to Rethink Approach to Cybersecurity

What keeps security managers and analysts up at night? According to the bi-annual Voice of SecOps Report–a survey from Deep Instinct–there are a variety of persistent challenges that cybersecurity professionals worry about ...
Tom Cruise, TikTok and Fraud: How to combat DeepFakes

Tom Cruise, TikTok and Fraud: How to combat DeepFakes

In this blog, we look into how the TikTok videos of Tom Cruise were created and the malicious implications of the technology ...

Project STAMINA Uses Deep Learning for Innovative Malware Detection

You’re familiar with the phrase, “A picture is worth 1,000 words.” Well, Microsoft and Intel are applying this philosophy to malware detection—using deep learning and a neural network to turn malware into ...
Logo detection using Yolo v5 and Pytorch

Logo detection using Yolo v5 and Pytorch

YoloV5 This post's goal is to go to the step-by-step guide of using YOLOv5 with your custom dataset and pytorch ...

Machine Learning, Deep Learning and Neural Networks, Oh My!

Deep learning makes decisions based upon the data it sees and the data that it doesn’t see but infers from what it does see. This became useful in the AV industry when ...
Badge identity Teleport auth AI Adoption Lags cloud bias AI identity verification Open Raven

Concentric Applies Deep Learning Algorithms to Data Security

Fresh off raising an additional $7 million in funding, Concentric has launched a tool that employs deep learning algorithms to enable cybersecurity teams to identify documents and repositories where sensitive data has ...
Security Boulevard
ACM Presents 2018 ACM A.M. Turing Award to Deep Learning Pioneers

ACM Presents 2018 ACM A.M. Turing Award to Deep Learning Pioneers

The Association for Computing Machinery has announced the presentation of the 2018 ACM Turing Award to a trio of Deep Learning pioneers Geoffrey Hinton, Yann LeCun & Yoshua Bengio. Congratulations! "ACM named ...