Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Data AI Summit | Expanding Log Analytics and Threat Hunting Natively in Databricks

ChaosSearch + Databricks Deliver on the best of Databricks (open Spark-based data lakehouse) and ELK (efficient search, flexible live ingestion, API/UI) via ChaosSearch on Databricks. Log analytics for observability / security with unlimited retention at a fraction of the cost now with Databricks’ AI/ML. Watch as ChaosSearch CEO, Ed Walsh, shares the power of ChaosSearch in your Databricks environment.

The AI Revolution: Balancing Innovation and Ethics in the Age of Intelligent Technology

Artificial intelligence (AI) is revolutionizing most, if not all, industries worldwide. AI systems use complex algorithms and large datasets to analyze information, make predictions and adjust to new scenarios through machine learning – enabling them to improve over time without being explicitly programmed for every task.

Data Security Posture Management (DSPM) Solution | DSPM vs. CSPM

What is DSPM? Data Security Posture Management, or DSPM refers to the practice of assessing and managing an organization’s overall data security posture. It involves monitoring, evaluating, and continuously improving the effectiveness of data security controls and measures in place to protect sensitive information. What is Data Security Posture Management? It provides a holistic view of an organization’s data security status and helps identify vulnerabilities, gaps, and areas for improvement.

Cybersecurity Awareness Month 2024 - Erich Kron | AI and Deepfakes

AI and AI-generated deepfakes are proving to be the most intriguing, and in some ways troubling, recent advances in technology. No wonder one of my favorite characters from “The Inside Man” series, AJ, is so enthralled by them.AJ is a friendly, funny, unstoppable security dynamo with a deep love of all things tech. But as AJ learns through his journey in the events of “The Inside Man,” AI can have a dark side.

De-identification under HIPAA: 5 Frequently Asked Questions about De-identified Healthcare Data

The Health Insurance Portability and Accountability Act (HIPAA) safeguards patient data. Hospitals, clinics, insurance providers, and other healthcare facilities must adhere to these stringent rules. De-identification enables healthcare data to be used in meaningful research. It enables data to be analyzed to provide improved healthcare. It does this without violating personal privacy. This balance is critical to fuel innovation and ethically manage data.

Zenity Researchers Discover Over-Permissions in Salesforce Copilot Topics

The Zenity Labs team has discovered that non-administrator users can modify existing flows that were connected to Einstein by an administrator, influencing Einstein without having the necessary permissions to edit it directly. In doing so, bad actors can easily insert malicious actions into flows that are triggered by business users throughout the enterprise, including phishing attacks, data exfiltration, and more.

Deep Learning Explained: Structured vs Unstructured Data | Razorthorn Security

Josh Neil explains the concept of deep learning and how it was designed to discover structure in unstructured data, such as images and text. Learn why this technology is key to advancements in cybersecurity. #DeepLearning #StructuredData #CyberSecurity.