The War with Algorithms: Why Your Next Security Strategy Includes A.I. and Machine Learning

The War with Algorithms: Why Your Next Securi...

Up next

Why Companies Are Already Abandoning LLMs

Think AI is about automating what you already do? That's the same mistake companies made moving to cloud, and FICO's Mike Trkay says you're about to waste millions proving it. Mike is Chief Information Officer (CIO) and Chief Customer Officer (CCO) at FICO, an analytics software ...  Show more

AI Is Reshaping Your Entire Stack, Not Just Applications

AI is forcing enterprises to rethink everything from hardware to governance, and most organizations are attacking it in silos. Mano Bhattacharyya (CTO, Nutanix) breaks down why AI isn't just an application layer problem, but an end-to-end transformation that spans compute (GPUs, ...  Show more

Recommended Episodes

2889: Inside the World of Hacktivist DDoS Attacks with NETSCOUT's Richard Hummel
Tech Talks Daily

<span data-preserver-spaces="true">In this Tech Talks Daily Podcast episode</span><span data-preserver-spaces="true">, I sit down with Richard Hummel from NETSCOUT to delve into the ever-evolving DDoS threat landscape.</span><span data-preserver-spaces="true"> Why has there be ...

  Show more

AI Is a Cybersecurity Tool and Threat
Gartner ThinkCast

When it comes to cybersecurity, artificial intelligence is proving to be both a formidable defensive tool and a potential threat. 

 

Today, Patrick Hevesi, VP Analyst with Gartner for Technical Professionals, discusses the con ...

  Show more

Preventing Cyber Attacks with John Davis, Federal Chief Security Officer of Palo Alto Networks
Mission Daily

From Senior Military Cyber Advisor at the Pentagon to VP and Federal Chief Security Officer at Palo Alto Networks, John Davis is an experienced cyber security professional focused on educating the public on cyber threats and preventing the next national and international cyber at ...  Show more

Criminal-on-criminal action in the dark web. The cyber phases of the hybrid war heat up. ICS vulnerabilities. Codespaces and malware servers. Blank-image attacks. Social engineering.
CyberWire Daily

A hostile takeover of the Solaris contraband market. Ukraine warns that Russian cyberattacks continue. An overview of 2H 2022 ICS vulnerabilities. Codespaces accounts can act as malware servers. Blank-image attacks. Campaigns leveraging HR policy themes. Dinah Davis from Arctic W ...  Show more