The War with Algorithms: Why Your Next Security Strategy Includes A.I. and Machine Learning

The War with Algorithms: Why Your Next Securi...

Up next

How the Office of the CFO Is Becoming AI-Powered

Compliance and regulatory reporting used to mean endless spreadsheets, fragmented data sources, and teams drowning in manual work. Today, AI is transforming how the world's largest companies manage financial reporting, sustainability disclosures, and audit workflows—not by replac ...  Show more

How the Smartest Companies Build Infrastructure That Wins

Most companies don’t realize it yet, but the way they built their technology foundations is quietly becoming a liability.Cloud costs are rising. Platforms change underneath you. AI is reshaping infrastructure from hardware to data to governance. And the strategies that once felt ...  Show more

Recommended Episodes

2889: Inside the World of Hacktivist DDoS Attacks with NETSCOUT's Richard Hummel
Tech Talks Daily

<span data-preserver-spaces="true">In this Tech Talks Daily Podcast episode</span><span data-preserver-spaces="true">, I sit down with Richard Hummel from NETSCOUT to delve into the ever-evolving DDoS threat landscape.</span><span data-preserver-spaces="true"> Why has there be ...

  Show more

AI Is a Cybersecurity Tool and Threat
Gartner ThinkCast

When it comes to cybersecurity, artificial intelligence is proving to be both a formidable defensive tool and a potential threat. 

 

Today, Patrick Hevesi, VP Analyst with Gartner for Technical Professionals, discusses the con ...

  Show more

Preventing Cyber Attacks with John Davis, Federal Chief Security Officer of Palo Alto Networks
Mission Daily

From Senior Military Cyber Advisor at the Pentagon to VP and Federal Chief Security Officer at Palo Alto Networks, John Davis is an experienced cyber security professional focused on educating the public on cyber threats and preventing the next national and international cyber at ...  Show more

Criminal-on-criminal action in the dark web. The cyber phases of the hybrid war heat up. ICS vulnerabilities. Codespaces and malware servers. Blank-image attacks. Social engineering.
CyberWire Daily

A hostile takeover of the Solaris contraband market. Ukraine warns that Russian cyberattacks continue. An overview of 2H 2022 ICS vulnerabilities. Codespaces accounts can act as malware servers. Blank-image attacks. Campaigns leveraging HR policy themes. Dinah Davis from Arctic W ...  Show more