The Battlefield What started off as excitement around the capabilities of Generative AI has quickly turned to concern. Generative AI tools such as ChatGPT, Google Bard,...
Natural language processing and advanced translation capabilities make generative AI an invaluable tool for hackers. AI-generated phishing emails may not be any more dangerous than human-generated...
As cybercrime has grown, the cybersecurity industry has had to embrace cutting-edge technology to keep up. Artificial intelligence (AI) has quickly become one of the most...
The SecOps framework bridges the gap between an organization's security and operation teams to improve infrastructure and information security. The new wave of cyberattacks in this...
Conversations around AI often include its role in cybersecurity prevention. AI is a powerful, indispensable tool in fighting cyber threats, but it can also comb through...
Data sets are the foundation for AI. Data allows AI to make decisions and analyze trends because they have numerous data points to reference for deductive...
Virtually every industry in the business environment is investing in or at least considering making investments in artificial intelligence (AI), including machine learning (ML), one of...
A lot of people say threat intelligence (TI) tastes good, but few understand how to cook it. There are even fewer of those who know which...
AI has proven itself to be a value-adding technology across the global economy. As businesses found themselves scrambling to adapt to current events over the last...
New research from Canada offers a possible method by which attackers could steal the fruits of expensive machine learning frameworks, even when the only access to...
Researchers from France have devised a method for identifying newly-registered domains that are likely to be used in a ‘hit and run' fashion by high-volume email...
Two recent research papers from the US and China have proposed a novel solution for teeth-based authentication: just grind or bite your teeth a bit, and...
A new paper from Israel has proposed an authentication scheme based on a user's aesthetic preferences, wherein the user calibrates the system one time by rating...
by David Ryan, Vice President of Sales, Cynamics Massive amounts of data are being generated daily; by some accounts, a staggering 2.5 quintillion bytes of data...
A joint academic research project from the United States has developed a method to foil CAPTCHA* tests, reportedly outperforming similar state-of-the-art machine learning solutions by using...