machine learning
![brain](https://img.helpnetsecurity.com/wp-content/uploads/2023/05/24165921/brain-3d-2-400x200.png)
AI: Interpreting regulation and implementing good practice
Businesses have been using artificial intelligence for years, and while machine learning (ML) models have often been taken from open-source repositories and built into …
![phishing](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102741/phishing-400x200.jpg)
Threat actors exploit new channels for advanced phishing attacks
Perception Point’s team has identified a 356% increase in the number of advanced phishing attacks attempted by threat actors in 2022. Overall, the total number of …
![Eva Maler](https://img.helpnetsecurity.com/wp-content/uploads/2023/04/13164239/eve_maler-2-forgerock-400x200.jpg)
Overcoming industry obstacles for decentralized digital identities
In this Help Net Security interview, Eve Maler, CTO at ForgeRock, talks about how digital identities continue to play a critical role in how we access online services …
![artificial intelligence](https://img.helpnetsecurity.com/wp-content/uploads/2023/02/17094314/artificial-intelligence-ai-hns-400x200.jpg)
Assessing AI’s acquired knowledge from an organization’s database
Researchers at the University of Surrey have developed software that can assess the amount of data that an artificial intelligence (AI) system has acquired from a digital …
![Nicole Hofmann](https://img.helpnetsecurity.com/wp-content/uploads/2023/04/04105911/nicole_hofmann-2-sentryc-400x200.jpg)
Stop online counterfeiters dead in their tracks
During this Help Net Security interview, Nicole Hofmann, CEO at Sentryc, delves into the critical issue of counterfeiting and the detrimental impact it has on industries and …
![brain](https://img.helpnetsecurity.com/wp-content/uploads/2020/08/19093544/fighter-brain-tech-400x200.jpg)
Malware and machine learning: A match made in hell
We’ve been developing machine learning-based cybersecurity systems for many years and began developing automation for analysis in our labs in 2005. These early …
![fraud detection](https://img.helpnetsecurity.com/wp-content/uploads/2021/01/14134048/fraud_detection-400x200.jpg)
Fighting financial fraud through fusion centers
Keeping up with financial fraud is incredibly difficult because accurate fraud detection requires a deep, real-time analysis of all the events surrounding a transaction. …
![artificial intelligence](https://img.helpnetsecurity.com/wp-content/uploads/2023/02/17094314/artificial-intelligence-ai-hns-400x200.jpg)
The role of human insight in AI-based cybersecurity
To unleash the power of AI, it’s essential to integrate some human input. The technical term is Reinforcement Learning from Human Feedback (RLHF): a machine-learning technique …
![AI](https://img.helpnetsecurity.com/wp-content/uploads/2021/04/23122821/ai-brain-bkg-400x200.jpg)
ML practitioners push for mandatory AI Bill of Rights
The AI Bill of Rights, bias, and operational challenges amid tightening budgets are pressing issues affecting the adoption of ML as well as project and initiative success, …
![Hand](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103603/hand-code-400x200.jpg)
Moving target defense must keep cyber attackers guessing
A cybersecurity technique that shuffles network addresses like a blackjack dealer shuffles playing cards could effectively befuddle hackers gambling for control of a military …
![identity](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09100001/identity-400x200.jpg)
3 important changes in how data will be used and treated
Regula has presented their vision of the developments that will shape the industry’s landscape in 2023. Deepfakes, new cyber-hygiene norms, and demand for mature ID …
![Kangas](https://img.helpnetsecurity.com/wp-content/uploads/2022/11/13135814/kangas-datagrid-400x200.png)
Open-source tool puts machine learning dataset analysis at data scientists’ fingertips
Comet released Kangas, an open-source smart data exploration, analysis and model debugging tool for machine learning. Kangas, available on GitHub, helps users understand and …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD