machine learning
Kasada Embraces Machine Learning to Reduce Bot Traffic
Kasada has updated its bot defense platform to add sensors and ML algorithms that detect, in real-time, machine-generated traffic ...
Security Boulevard
What the Future Holds for Data Security
Gilad David Maayan | | AI, blockchain, data protection, Data Security, DLP, machine learning, Privacy
With the proliferation of data in all aspects of life, from personal information to business operations, its protection becomes more critical than ever ...
Security Boulevard
Discovering MLflow Framework Zero-day Vulnerability | Machine Language Model Security | Contrast Security
Joseph Beeton, Senior Application Security Researcher, Contrast Security | | APIs, CVE, machine learning, MLflow
Most Machine Language (ML) tools — including the development frameworks used for managing ML life cycles — are relatively new, which means they could well have security vulnerabilities. ...
Safeguarding Against Security Misconfigurations with the Power of Machine Learning
Naimisha | | Cyber Security, cyber threat, machine learning, Network Security, security configurations, vulnerability assessment
Security misconfiguration is a critical vulnerability that can lead to unauthorized access, data breaches, service disruptions, and reputation damage. In today’s digital landscape, where cyber threats are constantly evolving, it is essential ...
The Machine Learning Cybersecurity Revolution
Nik Hewitt | | advice, Best Practices, Cybersecurity, machine learning, next gen security, Platform News, security, Security Research, TrueFort, zero trust
Balancing the promise and pitfalls of machine learning cybersecurity The integration of machine learning (ML) has opened up new frontiers for defending against complex and evolving cyber threats. However, machine learning cybersecurity ...
Securing Human Identities in the Digital Age
Deepak Gupta - Tech Entrepreneur, Cybersecurity Author | | Access control, api, Authentication, CIAM, Digital Identity, iam, machine learning
In the fast-paced world of the internet, where every click, every search, and every interaction leaves a digital footprint, the security of human identities has become paramount. Let's delve into the complexities ...
Assessing the security posture of a widely used vision model: YOLOv7
By Alvin Crighton, Anusha Ghosh, Suha Hussain, Heidy Khlaaf, and Jim Miller TL;DR: We identified 11 security vulnerabilities in YOLOv7, a popular computer vision framework, that could enable attacks including remote code ...
Nosey Parker’s Ongoing Machine Learning Development
Nosey Parker is Praetorian’s secret detection tool, used regularly in our offensive security engagements. It combines regular expression-based detection with machine learning (ML) to find misplaced secrets in source code and web ...
How AI and Automation Can Secure Enterprises and Startups
Dr. May Wang | | AI, Automation, Cybersecurity, machine learning, SOC, Threat Detection and Response
Today’s developers face myriad challenges. On the one hand, today’s threat landscape continues to evolve, with new threats becoming more targeted and sophisticated. On the other hand, the speed of innovation has ...
Security Boulevard
A10 Expands AI-Driven Security Strategy to Battle DDoS Attacks
A10 Networks is building out a security strategy that leverages AI and machine-learning techniques to help enterprises protect themselves against the growing threat of increasingly sophisticated distributed denial-of-service (DDoS) attacks. The company ...
Security Boulevard