Why Adversarial Examples Are Such a Dangerous Threat to Deep Learning

Adversarial examples can throw a wrench in deep learning processes and expose vulnerabilities. Organizations should take steps now to get ahead of these threats before they disrupt data processes.

The post Why Adversarial Examples Are Such a Dangerous Threat to Deep Learning appeared first on Security Intelligence.

Continue reading Why Adversarial Examples Are Such a Dangerous Threat to Deep Learning

Too many alarms and too few security analysts? Think SOAR

Security automation, orchestration and response (SOAR) speeds up the incident response process by replacing manual tasks with automated workflows. We sat down with Swimlane CEO Cody Cornell to learn more about the benefits for all organizations. What a… Continue reading Too many alarms and too few security analysts? Think SOAR

Contrast Security Advances DevSecOps

Contrast Security this week added a Route Intelligence module to a Contrast Assess vulnerability assessment that automates the code scanning process. Surag Patel, chief strategy officer for Contrast Security, said Route Intelligence employs sensors in… Continue reading Contrast Security Advances DevSecOps

Safeguarding Healthcare for the Future With Zero Trust Security

A Zero Trust security model can help healthcare organizations provision access in a more effective manner by focusing on data, workloads and identity.

The post Safeguarding Healthcare for the Future With Zero Trust Security appeared first on Security Intelligence.

Continue reading Safeguarding Healthcare for the Future With Zero Trust Security

Why Manual Verification Still Matters

In the last few years, we’ve continuously been hearing that we should automate, automate, automate. So it might be weird to hear that manual verification still matters. Jeroen Willemsen explains to us why we still need to perform manual chec… Continue reading Why Manual Verification Still Matters

How a More Connected Approach Can Help With Threat Management

Using capabilities that maximize and connect existing security solutions and data sources can help organizations advance their threat management initiatives in multiple ways.

The post How a More Connected Approach Can Help With Threat Management appeared first on Security Intelligence.

Continue reading How a More Connected Approach Can Help With Threat Management

Microsoft releases PowerShell 7 for Windows, macOS and Linux

Microsoft has released PowerShell 7, the latest major update to its popular task automation tool and configuration management framework that can be used on various operating systems. What is PowerShell? PowerShell was initially a Windows component, but… Continue reading Microsoft releases PowerShell 7 for Windows, macOS and Linux

Modernizing Threat Management for the Evolving Attack Surfaces of OT, IoT and IoMT

The combination of digital transformation and the “Internet of Everything” is reshaping the modern landscape of OT, IoT and IoMT, meaning threat management must evolve in response.

The post Modernizing Threat Management for the Evolving Attack Surfaces of OT, IoT and IoMT appeared first on Security Intelligence.

Continue reading Modernizing Threat Management for the Evolving Attack Surfaces of OT, IoT and IoMT

A Honeycomb Patching Robot Powered by Arduino

No, it’s not the kind of honeycomb you’re probably thinking of. We’re talking about the lightweight panels commonly used in aerospace applications. Apparently they’re rather prone to dents and other damage during handling, so Boeing teamed up with students from the California State University to come up with a way …read more

Continue reading A Honeycomb Patching Robot Powered by Arduino