Remove Artificial Intelligence Remove Cyber Risk Remove Cybersecurity Remove Firewall
article thumbnail

Spotlight Podcast: How AI Is Reshaping The Cyber Threat Landscape

The Security Ledger

Host Paul Roberts speaks with Jim Broome, the CTO and President of MSSP DirectDefense about the evolution of cybersecurity threats and how technologies like AI are reshaping the cybersecurity landscape and the work of defenders and Managed Security Service Providers (MSSP). Read the whole entry. »

article thumbnail

Inside the Complex Universe of Cybersecurity

SecureWorld News

In an interview with SecureWorld News , Arun DeSouza shares his insights on the challenges and emerging trends in the cybersecurity sector and modern ways to adapt to the changing business landscape. What developments in the security landscape have sparked your enthusiasm, and how does it impact the future of cybersecurity?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How Machine Learning Can Advance Cybersecurity Landscape

Spinone

Today’s high-tech infrastructure, including network and cybersecurity systems are gathering tremendous amounts of data and analytics on most key aspects of mission-critical systems. An ever-growing number of systems and infrastructure today are benefiting from advanced machine learning and artificial intelligence.

article thumbnail

Is Cisco’s Acquisition of Splunk a Shade of Brilliance or Madness?

Security Boulevard

In cybersecurity, Cisco invested early in IPS, Firewall, VPN, and endpoint security; they produced exceptional results. A significant component of this is the emergence of artificial intelligence and machine learning to become embedded across every aspect of the enterprise, service provider, and government systems.

article thumbnail

Time to Accept the Risk of Open Source?

Security Boulevard

Accepting Open Source Risk. Accepting cybersecurity risk has become the norm for organizations. Even with extensive firewalls, IDS, email security, zero-trust, ransomware, identity threat, and business email compromise protection, attacks still have a substantial financial impact on organizations. The source communities?

Risk 111
article thumbnail

How the CISO has adapted to protect the hybrid workforce

IT Security Guru

Given the connectivity needs of a remote workforce – and knowing a hybrid workforce is here to stay – many IT teams have had to make sudden changes in the way workers connect to corporate systems that could introduce new cyber risks and vulnerabilities. . Bindu Sundaresan , director at AT&T Cybersecurity .

CISO 97
article thumbnail

NEW TECH: Human operatives maintain personas, prowl the Dark Net for intel to help companies

The Last Watchdog

It seems like any discussion of cybersecurity these days invariably circles back to automation. Our growing fixation with leveraging artificial intelligence to extract profits from Big Data – for both constructive and criminal ends—is the order of the day. For a full drill down, please give a listen to the accompanying podcas t.