machine learning

Tendencias TI para el 2021: así será la nueva normalidad

El 2020 en definitiva obligó a organizaciones a dar un giro de 180 grados a la forma en que…

2 days ago

Moving from Threat Hunting to Threat Catching

The goal of a Threat Hunter is to find an attacker in the middle of an attack before they can…

4 days ago

FireEye Acquires Respond Software to Advance Cybersecurity AI

FireEye Inc., a provider of managed security services augmented by machine learning algorithms, has acquired Respond Software, a provider of…

2 weeks ago

5 padrões de comportamento do usuário que devemos prestar atenção em um espaço de trabalho descentralizado

Problema: Se você possui milhares de funcionários espalhados por vários de lugares, como pode manter a rede da sua organização segura?…

2 weeks ago

Efficient audits with machine learning and Slither-simil

by Sina Pilehchiha, Concordia University Trail of Bits has manually curated a wealth of data—years of security assessment reports—and now…

1 month ago

Split-Second Phantom Images Fool Autopilots

Researchers are tricking autopilots by inserting split-second images into roadside billboards. Researchers at Israel’s Ben Gurion University of the Negev…

2 months ago

HashiCorp Launches Open Source Identity Framework

HashiCorp, at its HashiConf Digital conference today, announced an open source Boundary project that will enable users to remotely access…

2 months ago

PrivacyRaven Has Left the Nest

By Suha S. Hussain, Georgia Tech If you work on deep learning systems, check out our new tool, PrivacyRaven—it’s a…

2 months ago

Strategies for Insider Threat Mitigation

In Part II of this blog series, we examine strategies for insider threat risk mitigation including key tenants of data…

3 months ago

Strategies for Insider Threat Mitigation

In Part II of this blog series, we examine strategies for insider threat risk mitigation including key tenants of data…

3 months ago