machine learning
![AI](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093901/ai1-400x200.jpg)
Mitigating the risks of artificial intelligence compromise
The number of cyberattacks directed at artificial intelligence (AI) continues to increase, and hackers are no longer planting malicious bugs within code – their …
![Christopher Sestito](https://img.helpnetsecurity.com/wp-content/uploads/2022/07/20110155/christopher_sestito-2-hidden_layer-400x200.jpg)
Machine learning creates a new attack surface requiring specialized defenses
Machine learning (ML) inputs and outputs are becoming more widely available to customers thanks to organizations in almost every sector integrating artificial intelligence …
![](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093801/cloud-drive2-400x200.jpg)
How to eliminate the weak link in public cloud-based multi-party computation
Secure multi-party computation (MPC) has seen steady evolution to tackle many scientific challenges. These include enabling the creation and tuning of AI or machine learning …
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094211/lock-400x200.jpg)
The role of streaming machine learning in encrypted traffic analysis
Organizations now create and move more data than at any time ever before in human history. Network traffic continues to increase, and global internet bandwidth grew by 29% in …
![robot](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110014/robot-1-400x200.jpg)
What is undermining ML initiatives?
Comet announced the results of its recent survey of machine learning professionals. Hundreds of enterprise ML practitioners were asked about their experiences and the factors …
![digital transformation](https://img.helpnetsecurity.com/wp-content/uploads/2020/04/14154123/digital_transformation-400x200.jpg)
Digital transformation market to reach $1,759.4 billion by 2028
The global digital transformation market size is estimated to reach $1,759.4 billion by 2028, registering a CAGR of 23.6% over the forecast period, according to Grand View …
![thief](https://img.helpnetsecurity.com/wp-content/uploads/2018/11/09095826/thief-400x200.jpg)
Soaring losses accelerate investments in anti-fraud tech
The pandemic has opened a Pandora’s box of global fraud. Faced with a seemingly endless onslaught of schemes and scams, anti-fraud pros have doubled down on analytics, …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2017/09/09103200/cloud-400x200.jpg)
Organizations and the cloud: How they use it and how they secure it
The Cloud Security Alliance (CSA) released the findings of its latest survey which offers insight into companies’ plans regarding cloud and security strategy, cloud services, …
![gears](https://img.helpnetsecurity.com/wp-content/uploads/2019/09/09093421/gears-400x200.jpg)
Preventing software security vulnerabilities with automation
A team of UTSA researchers is exploring how a new automated approach could prevent software security vulnerabilities. The team sought to develop a deep learning model that …
![lens](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09103919/lens-400x200.jpg)
AI technology is redefining surveillance
Surveillance today is narrowly defined as “continuous observation of a place, person, group, or ongoing activity in order to gather information,” especially when the subject …
![Scott Laliberte](https://img.helpnetsecurity.com/wp-content/uploads/2022/01/14090306/scott_laliberte_2_protiviti-400x200.jpg)
AI and ML implementation in cybersecurity programs pushes for a change in people’s mindset
In this interview with Help Net Security, Scott Laliberte, Managing Director at Protiviti, talks about the implementation of AI and ML in cybersecurity programs, why this is a …
![identity theft](https://img.helpnetsecurity.com/wp-content/uploads/2019/08/09093630/identity_theft2-400x200.jpg)
Preventing document fraud in a world built on digital trust
All digital markets are built on trust and that trust has been reduced to an algorithm driven by proof of identity, which currently remains heavily reliant on formal documents …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD