Why Adversarial Examples Are Such a Dangerous Threat to Deep Learning

Adversarial examples can throw a wrench in deep learning processes and expose vulnerabilities. Organizations should take steps now to get ahead of these threats before they disrupt data processes.

The post Why Adversarial Examples Are Such a Dangerous Threat to Deep Learning appeared first on Security Intelligence.

Continue reading Why Adversarial Examples Are Such a Dangerous Threat to Deep Learning

Safeguarding Healthcare for the Future With Zero Trust Security

A Zero Trust security model can help healthcare organizations provision access in a more effective manner by focusing on data, workloads and identity.

The post Safeguarding Healthcare for the Future With Zero Trust Security appeared first on Security Intelligence.

Continue reading Safeguarding Healthcare for the Future With Zero Trust Security

Beyond IT: Assessing the Human Impact of Healthcare Cybersecurity

Great healthcare cybersecurity goes beyond IT best practices. Assessing the human element is essential to developing and deploying a holistic approach to security.

The post Beyond IT: Assessing the Human Impact of Healthcare Cybersecurity appeared first on Security Intelligence.

Continue reading Beyond IT: Assessing the Human Impact of Healthcare Cybersecurity

Modernizing Threat Management for the Evolving Attack Surfaces of OT, IoT and IoMT

The combination of digital transformation and the “Internet of Everything” is reshaping the modern landscape of OT, IoT and IoMT, meaning threat management must evolve in response.

The post Modernizing Threat Management for the Evolving Attack Surfaces of OT, IoT and IoMT appeared first on Security Intelligence.

Continue reading Modernizing Threat Management for the Evolving Attack Surfaces of OT, IoT and IoMT

How Human Security Investments Created a Global Culture of Accountability at ADP

Human security is what matters during a cybersecurity crisis, where skills and muscle memory can make the difference in make-or-break moments.

The post How Human Security Investments Created a Global Culture of Accountability at ADP appeared first on Security Intelligence.

Continue reading How Human Security Investments Created a Global Culture of Accountability at ADP

What Is Rich Communication Services? Breaking Down the Benefits and Security Risks

Texting has been available since the 1990s, and it has served us well. Now, Rich Communication Services is here. What kinds of security vulnerabilities are associated with this new tech?

The post What Is Rich Communication Services? Breaking Down the Benefits and Security Risks appeared first on Security Intelligence.

Continue reading What Is Rich Communication Services? Breaking Down the Benefits and Security Risks

A Road Map for Better Government Cybersecurity From North Dakota

Imagine the impact on the government cybersecurity landscape if the mantra for every U.S. state were something like, “Every student, every school, cyber-educated.”

The post A Road Map for Better Government Cybersecurity From North Dakota appeared first on Security Intelligence.

Continue reading A Road Map for Better Government Cybersecurity From North Dakota

The Past, Present and Future of Security Information and Event Management (SIEM)

Security information and event management (SIEM) was originally designed to help organizations achieve and maintain compliance, but over the years, it’s evolved to become so much more.

The post The Past, Present and Future of Security Information and Event Management (SIEM) appeared first on Security Intelligence.

Continue reading The Past, Present and Future of Security Information and Event Management (SIEM)

What Is a DDoS Attack?

After 20 years, distributed denial-of-service (DDoS) attacks can still result in critical damage to businesses. Learn more about how to mitigate a DDoS attack on your corporate network.

The post What Is a DDoS Attack? appeared first on Security Intelligence.

Continue reading What Is a DDoS Attack?

Biased AI Is Another Sign We Need to Solve the Cybersecurity Diversity Problem

Biased AI can be trained to reflect narrow human perspectives on risk. It’s time to solve our diversity problem and create teams with varied perspectives to minimize AI bias.

The post Biased AI Is Another Sign We Need to Solve the Cybersecurity Diversity Problem appeared first on Security Intelligence.

Continue reading Biased AI Is Another Sign We Need to Solve the Cybersecurity Diversity Problem