machine learning
![analysis](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101116/analysis-400x200.jpg)
Combating fraud and money laundering with graph analytics
Dirty money and money laundering have been around since the existence of currency itself. On a global level, as much as $2 trillion is washed annually, estimates the United …
![people](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101128/people-400x200.jpeg)
Do young people hold the key to closing the cybersecurity talent gap?
The cybersecurity talent shortage is a frequently talked about. Even with the attention, the future still holds more job openings than qualified employees available to fill …
![lights](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110827/lights-400x200.jpg)
Leveraging security analytics to investigate and hunt modern threats
In this interview, Gary Golomb, co-founder at Awake Security, talks about how machine learning help develop a scalable enterprise cybersecurity plan, what technologies can …
![](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09111153/future-400x200.jpg)
What if defenders could see the future? Many clues are out there
Malware sophistication is increasing as adversaries begin to weaponize cloud services and evade detection through encryption, used as a tool to conceal command-and-control …
![artificial intelligence](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09105950/artificial_intelligence-400x200.jpg)
Afraid of AI? We should be
Not (yet!) of a sentient digital entity that could turn rogue and cause the end of mankind, but the exploitation of artificial intelligence and machine learning for nefarious …
![artificial intelligence](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09105950/artificial_intelligence-400x200.jpg)
Polisis: AI-based framework for analyzing privacy policies in real time
It has been known for a while that the overwhelming majority of Internet users doesn’t read privacy policies and terms of service before agreeing to them. Those few that do …
![technology](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105415/technology-400x200.jpg)
Data and analytics maturity: Most organizations should be doing better
91 percent of organizations have not yet reached a transformational level of maturity in data and analytics, despite this area being a number one investment priority for CIOs …
![Seagate surveillance](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102807/seagate-surveillance-400x200.jpg)
Seagate launches SkyHawk AI, the first HDD for AI-enabled surveillance
Seagate announced its SkyHawk AI hard disk drive, the first drive created specifically for artificial intelligence enabled video surveillance solutions. SkyHawk AI provides …
![bulb](https://img.helpnetsecurity.com/wp-content/uploads/2017/09/09103134/bulb-400x200.jpg)
AI will change the face of security, but is it still the stuff of sci-fi?
The technology industry has always had a big problem with hype, with marketing teams, analysts and the media alike tending to fixate on the next big thing that will …
![mechanics](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110321/mechanics-400x200.jpg)
The untapped potential of machine learning for detecting fraud
E-commerce fraud protection company Signifyd has recently signed up behavioral analytics expert Long-Ji Lin to fill the position of Chief Scientist. “For advertisers, …
![architecture](https://img.helpnetsecurity.com/wp-content/uploads/2017/04/09104509/architecture-400x200.jpeg)
How enterprise IT security conversations have changed
Deutsche Telecom is one of the world’s largest telecom companies, and its corporate IT and cyber security arm T-Systems is one of the largest European IT services …
![chess](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104803/chess-400x200.jpg)
Weaponizing machine learning to improve cyber defenses
As defensive technologies based on machine learning become increasingly numerous, so will offensive ones – whether wielded by attackers or pentesters. The idea is the …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD