ML
The global state of DevSecOps
December 16 by Seth AdlerHow DevOps teams are embracing new approaches of embedding application security testing into their development pipelines to truly achieve DevSecOps and application security status.
Fight Fraud and Financial Crimes With Analytics and Artificial Intelligence
October 19 by Seth AdlerHow is your organization keeping pace and staying ahead of fraud schemes and regulatory mandates to monitor for them? The goal should be to power more effective and efficient fraud and financial cri...
Taking Advantage Of AI In Cyber Security Strategies
May 22 by Alarice RajagopalThere is no shortage of new and modern technologies entering the market that display the potential to change cyber security as we know it. For example, artificial intelligence and machine learning hav...
2019 Security Predictions: A Look At What Happened So Far
April 03 by Alarice RajagopalChief Security Officer of Security Mentor Dan Lohrmann was the guest on Episode #78 of Task Force 7 Radio Monday night, joining Host George Rettas, president and CEO of Task Force 7 Radio and Task For...
Attitudes About Security Need To Change
April 02 by Esther SheinWhen bringing cyber security tools into your environment, don’t get lulled into thinking you’ve done your due diligence because that’s not enough. That was a message Albertsons-Safeway CISO John Kirkw...
From The CISO Exchange Floor: Q&A With 3 Experts
March 27 by Esther SheinCyber Security Hub talked with speakers and attendees during CISO Exchange West earlier this week. Here, we find out what’s on their minds, what initiatives are on their plates this year and their tak...
Albertsons CISO On Proactive Approaches To Security
March 27 by Esther SheinCyber Security Hub caught up with Albertsons CISO John Kirkwood to find out what's on his mind, what initiatives he's taking on this year and how to be more proactive with security.
Onfido CTO Discusses Identity Verification, Blockchain, ML
August 28 by Dan GundermanHost George Rettas was joined by Onfido Chief Product Officer and Interim CTO, Kevin Trilli, on the Aug. 27 episode of “Task Force 7 Radio.” Topics ranged from the history of identity verification, to...
Top 5 Security Initiatives Include IoT, ML & Extensive Research
August 23 by Dan GundermanMany CISOs are thinking about laborious shifts and resource-heavy decisions well in advance. Here, we aim to help light the path, providing security practitioners a look at some of the most sweeping i...
Black Hat Day 2 Coverage Centers Around Mobile Sec, AI & ML
August 09 by Dan GundermanBlack Hat Day 2 was loaded with pertinent content, interactive sessions, outreach creativity, booth demos and more, including a 50-minute presentation on AI/ML. Here's our Day 2 activity.
5 Takeaways From The Cyber Security Exchange – Financial Services
June 12 by Dan GundermanThe cyber security event held for those in financial services broached topics such as AI, ML, GRC, third parties and the talent crisis. Here are our takeaways.
Regulations, Motivations Are Top Concerns At Day 2 Of Cyber Security Exchange
June 11 by Dan GundermanDay 2 of the Cyber Security Exchange: Financial Services was filled with thought-leading sessions and topical discussions that ranged from AI and ML to the complex regulatory environment.