The War with Algorithms: Why Your Next Security Strategy Includes A.I. and Machine Learning

The War with Algorithms: Why Your Next Securi...

Up next

Your Company Is Sitting on a Data Goldmine (Here’s How to Unlock It)

Most organizations are sitting on mountains of documents, PDFs, emails, and images they still cannot fully search, organize, or understand.In this episode of IT Visionaries, host Chris Brandt sits down with Tim McIntire, CTO of Hyland, to unpack why unstructured data is still one ...  Show more

When AI Pretends to Be Your CEO: How Companies Stay Secure

If your business relies on video calls, messaging apps, or mobile devices, you are at risk for a new kind of attack.In this episode of IT Visionaries, host Chris Brandt sits down with Christine Gadsby, Chief Security Officer at BlackBerry, to explore how AI, deepfakes, and weaken ...  Show more

Recommended Episodes

2889: Inside the World of Hacktivist DDoS Attacks with NETSCOUT's Richard Hummel
Tech Talks Daily

<span data-preserver-spaces="true">In this Tech Talks Daily Podcast episode</span><span data-preserver-spaces="true">, I sit down with Richard Hummel from NETSCOUT to delve into the ever-evolving DDoS threat landscape.</span><span data-preserver-spaces="true"> Why has there be ...

  Show more

AI Is a Cybersecurity Tool and Threat
Gartner ThinkCast

When it comes to cybersecurity, artificial intelligence is proving to be both a formidable defensive tool and a potential threat. 

 

Today, Patrick Hevesi, VP Analyst with Gartner for Technical Professionals, discusses the con ...

  Show more

Preventing Cyber Attacks with John Davis, Federal Chief Security Officer of Palo Alto Networks
Mission Daily

From Senior Military Cyber Advisor at the Pentagon to VP and Federal Chief Security Officer at Palo Alto Networks, John Davis is an experienced cyber security professional focused on educating the public on cyber threats and preventing the next national and international cyber at ...  Show more

Criminal-on-criminal action in the dark web. The cyber phases of the hybrid war heat up. ICS vulnerabilities. Codespaces and malware servers. Blank-image attacks. Social engineering.
CyberWire Daily

A hostile takeover of the Solaris contraband market. Ukraine warns that Russian cyberattacks continue. An overview of 2H 2022 ICS vulnerabilities. Codespaces accounts can act as malware servers. Blank-image attacks. Campaigns leveraging HR policy themes. Dinah Davis from Arctic W ...  Show more