machine learning
Tendencias TI para el 2021: así será la nueva normalidad
El 2020 en definitiva obligó a organizaciones a dar un giro de 180 grados a la forma en que estaban establecidas las rutinas de trabajo y reafirmó lo fundamental que es ...
Moving from Threat Hunting to Threat Catching
The goal of a Threat Hunter is to find an attacker in the middle of an attack before they can cause damage. This entails hunting through thousands of requests trying to pick ...
FireEye Acquires Respond Software to Advance Cybersecurity AI
FireEye Inc., a provider of managed security services augmented by machine learning algorithms, has acquired Respond Software, a provider of a platform that automates security incident investigations, for $186 million. Peter Bailey, ...
5 padrões de comportamento do usuário que devemos prestar atenção em um espaço de trabalho descentralizado
Problema: Se você possui milhares de funcionários espalhados por vários de lugares, como pode manter a rede da sua organização segura? Solução: Você deve monitorar seus funcionários onde quer que estejam e desenvolver uma ...
Efficient audits with machine learning and Slither-simil
by Sina Pilehchiha, Concordia University Trail of Bits has manually curated a wealth of data—years of security assessment reports—and now we’re exploring how to use this data to make the smart contract ...
Split-Second Phantom Images Fool Autopilots
Researchers are tricking autopilots by inserting split-second images into roadside billboards. Researchers at Israel’s Ben Gurion University of the Negev … previously revealed that they could use split-second light projections on roads ...
HashiCorp Launches Open Source Identity Framework
HashiCorp, at its HashiConf Digital conference today, announced an open source Boundary project that will enable users to remotely access systems regardless of location based on their specific identity. At the same ...
PrivacyRaven Has Left the Nest
By Suha S. Hussain, Georgia Tech If you work on deep learning systems, check out our new tool, PrivacyRaven—it’s a Python library that equips engineers and researchers with a comprehensive testing suite ...
Strategies for Insider Threat Mitigation
In Part II of this blog series, we examine strategies for insider threat risk mitigation including key tenants of data visibility and advanced analytics to provide organizations a road map for addressing ...
Strategies for Insider Threat Mitigation
In Part II of this blog series, we examine strategies for insider threat risk mitigation including key tenants of data visibility and advanced analytics to provide organizations a road map for addressing ...

