The War with Algorithms: Why Your Next Security Strategy Includes A.I. and Machine Learning

The War with Algorithms: Why Your Next Securi...

Up next

The End of Handwritten Network Configs?

Network automation has been "coming soon" for over a decade. So what's actually different this time? John Capobianco, Head of AI & Developer Relations at Itential, built NetClaw — a CCIE-level AI agent that manages network infrastructure through Slack and WhatsApp. It hit 300 Git ...  Show more

What Agentic Search Means for Normal Humans

Your basic search is missing a massive section of the internet. In this IT Visionaries Spotlight, Chris Brandt talks with Sudheesh Nair, Co-Founder and CEO of TinyFish, about the hidden layer of the internet - the data, pricing, and real-world context that never shows up in searc ...  Show more

Recommended Episodes

2889: Inside the World of Hacktivist DDoS Attacks with NETSCOUT's Richard Hummel
Tech Talks Daily

<span data-preserver-spaces="true">In this Tech Talks Daily Podcast episode</span><span data-preserver-spaces="true">, I sit down with Richard Hummel from NETSCOUT to delve into the ever-evolving DDoS threat landscape.</span><span data-preserver-spaces="true"> Why has there be ...

  Show more

AI Is a Cybersecurity Tool and Threat
Gartner ThinkCast

When it comes to cybersecurity, artificial intelligence is proving to be both a formidable defensive tool and a potential threat. 

 

Today, Patrick Hevesi, VP Analyst with Gartner for Technical Professionals, discusses the con ...

  Show more

Preventing Cyber Attacks with John Davis, Federal Chief Security Officer of Palo Alto Networks
Mission Daily

From Senior Military Cyber Advisor at the Pentagon to VP and Federal Chief Security Officer at Palo Alto Networks, John Davis is an experienced cyber security professional focused on educating the public on cyber threats and preventing the next national and international cyber at ...  Show more

Criminal-on-criminal action in the dark web. The cyber phases of the hybrid war heat up. ICS vulnerabilities. Codespaces and malware servers. Blank-image attacks. Social engineering.
CyberWire Daily

A hostile takeover of the Solaris contraband market. Ukraine warns that Russian cyberattacks continue. An overview of 2H 2022 ICS vulnerabilities. Codespaces accounts can act as malware servers. Blank-image attacks. Campaigns leveraging HR policy themes. Dinah Davis from Arctic W ...  Show more