Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The EU's new AI Act-What We Can Learn From the GDPR

Artificial Intelligence (AI) is rapidly becoming ubiquitous in supporting key business decisions, and for many organisations it is critical for their digital transformation and new business models. With organisations quickly driving forward to identify new ways to extract competitive value from their data, the regulators are preparing to step in.

The role of AI in Cyber Security

As artificial intelligence (AI) becomes more and more prevalent in society, it is also making its way into the world of cyber security. AI can be used in a number of ways to help improve cyber security, including by automatically detecting and responding to threats, improving network efficiency, and helping to identify vulnerabilities. In this blog post, we will discuss some of the ways that AI is changing cyber security and how it can help your business stay safe online.

How your Digital Onboarding process can benefit from AI-based Liveness Detection?

The National Crime Record Bureau (NCRB), in its report, recorded 50,035 cybercrime cases in 2020, and it is alarming to see that the numbers have surged exponentially ever since the pandemic. This opened the gates to remote onboarding and the use of facial recognition algorithms to distinguish users’ unique features, enhancing their onboarding experience. On the flip side, this has also given scamsters and fraudsters ample opportunities to manipulate and employ technologies for wrongful gains.

How CrowdStrike Achieves Lightning-Fast Machine Learning Model Training with TensorFlow and Rust

Supercharging CrowdStrike’s artificial intelligence requires both human professionals and the right technologies to deliver blisteringly fast and accurate machine learning model training with a small footprint on the CrowdStrike Falcon® sensor. CrowdStrike data scientists continuously explore theoretical and applied machine learning research to advance and set the industry standard in protecting customers from sophisticated threats and adversaries.

AI based Data Extraction : Mastering the Art of Data Extraction

With the speed of technological advancements, one term is ubiquitous, Artificial Intelligence. Across various fields, AI is changing how we look at current technologies. One technology transformed with the implementation of AI is OCR, Optical Character Recognition. OCR can process images of text and convert them into a machine-readable format. It can take handwriting and printed documents and convert them into a digital format.

How Human Intelligence Is Supercharging CrowdStrike's Artificial Intelligence

There is a new trope in the security industry, and it goes something like this: To keep yourself safe, you need an AI-powered solution that can act on its own, and to do that, you need to keep those pesky humans away from it. As a practitioner with a track record of bringing AI to cybersecurity — not because marchitecture demands it these days but because of its actual utility to solve security problems — I find this characterization puzzling.

Five worthy reads: The emerging threat of weaponized artificial intelligence

Illustration by Dorathe Victor Five worthy reads is a regular column on five noteworthy items we discovered while researching trending and timeless topics. In this week’s edition, let’s explore how artificial intelligence and machine learning are weaponized by hackers to fuel cyberattacks. AI and ML are conquering the world at a rapid pace. AI has made life much easier. In many instances, it speeds up manual processes, reduces costs, and eliminates manual errors.

Introducing INETCO BullzAI Cybersecurity for Enterprise

The Russian invasion of Ukraine has triggered an escalation in the number of state-sponsored actors targeting critical infrastructure with DDoS attacks. Criminal syndicates and smaller players are also exploiting the crisis. From fake fundraising efforts for Ukraine to account takeovers and high-velocity bot-driven attacks such as DDoS, BIN attacks, and terminal attacks, cybercriminals are stepping up their own attacks in an effort to benefit from the turmoil.