article thumbnail

Security Ledger Podcast: Security Automation Is (And Isn't) The Future Of InfoSec

ForAllSecure

How exactly will artificial intelligence help bridge the infosec skills gap and what kinds of security work are still best left to humans? For example, they may think, "Hey, the user's going to give me an input and it's only going to be as long as maybe a DNS record." but they never actually checked that.

InfoSec 52
article thumbnail

Security Ledger Podcast: Security Automation Is (And Isn't) The Future Of InfoSec

ForAllSecure

How exactly will artificial intelligence help bridge the infosec skills gap and what kinds of security work are still best left to humans? For example, they may think, "Hey, the user's going to give me an input and it's only going to be as long as maybe a DNS record." but they never actually checked that.

InfoSec 40
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

SECURITY LEDGER PODCAST: SECURITY AUTOMATION IS (AND ISN'T) THE FUTURE OF INFOSEC

ForAllSecure

How exactly will artificial intelligence help bridge the infosec skills gap and what kinds of security work are still best left to humans? For example, they may think, "Hey, the user's going to give me an input and it's only going to be as long as maybe a DNS record." but they never actually checked that.

InfoSec 40
article thumbnail

Quantum Computing: A Looming Threat to Organizations and Nation States

SecureWorld News

Glenn Kapetansky, Senior Principal & Chief Security Officer, Trexin: "For those who predict that quantum computing will break InfoSec, I want to point out that very smart people have been working equally long on next-gen cyber techniques that work in a post-quantum computing world.

article thumbnail

SANS Outlines Critical Infrastructure Security Steps as Russia, U.S. Trade Cyberthreats

eSecurity Planet

trading cyber threats – and one disputed NBC News report that outlined possible options presented to U.S. “If my boutique infosec consultancy has these resources…what does a state sponsored one have?” “Many logs age like milk,” he said, adding, “looking at you DNS logs.”

B2B 125