Remove tags machine-learning
article thumbnail

How Machine Learning Can Accelerate and Improve the Accuracy of Sensitive Data Classification

Thales Cloud Protection & Licensing

How Machine Learning Can Accelerate and Improve the Accuracy of Sensitive Data Classification madhav Tue, 12/12/2023 - 05:21 Given the pace of data growth and the complexity of hybrid IT environments, the discovery and classification of sensitive data is no simple task.

article thumbnail

Maintaining Cybersecurity During Rapid Digital Transformation

Security Boulevard

<a href='/blog?tag=Cybersecurity'>Cybersecurity</a> tag=Cybersecurity'>Cybersecurity</a> <a href='/blog?tag=Ransomware'>Ransomware</a> tag=Ransomware'>Ransomware</a> <a href='/blog?tag=Cyber-attacks'>Cyber-attacks</a> Additional Resources.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

HYAS Product Enhancements – Part 1 – February 2024

Security Boulevard

Part 1 of this 2-part blog highlights some of the latest improvements with HYAS Insight. HYAS verdicts compress the outputs of over 50 proprietary rules, machine learning algorithms, and processes into a single Benign, Suspicious, or Malicious verdict. You can group by malware family, malware tags, and C2 ASNs.

DNS 49
article thumbnail

A Pandora's Box: Unpacking 5 Risks in Generative AI

Thales Cloud Protection & Licensing

Stealing the Model: AI models are the crown jewels of organizations leveraging machine learning algorithms. Data poisoning involves injecting malicious inputs into training datasets, corrupting the learning process, and compromising the model's performance. This should help them stay a step ahead of adversaries.

Risk 71
article thumbnail

A Pandora’s Box: Unpacking 5 Risks in Generative AI

Security Boulevard

Stealing the Model: AI models are the crown jewels of organizations leveraging machine learning algorithms. Data poisoning involves injecting malicious inputs into training datasets, corrupting the learning process, and compromising the model's performance. This should help them stay a step ahead of adversaries.

Risk 69
article thumbnail

GUEST ESSAY: The drivers behind persistent ransomware — and defense tactics to deploy

The Last Watchdog

An unsuspecting employee will open a legitimate-looking message and click a link or download a file that releases embedded malware onto their machine or the broader company network. The price tag of the ransom is just one of the many costs of these attacks, and remediation can often exceed this fee many times over. Incident response.

article thumbnail

GUEST ESSAY: The privacy implications of facial recognition systems rising to the fore

The Last Watchdog

Many of these photos are tagged with the identity of the people in them. We are also seeing tremendous progress in the science and machine learning required for the recognition of faces in those photos, in part powered by the huge amount of training material available. This kind of technology would have many applications.