Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Technology

Unlocking the Future: Brivo's AI-Driven Security Solutions

Dive into the world of AI-driven security with Brivo! In this video, we explore how Brivo is at the forefront of the AI evolution, tailoring cutting-edge security solutions to meet customer needs. 🛡️🔐 Discover how staying updated with AI trends like generative AI, machine learning, and cyber security enables Brivo to innovate and respond to feedback effectively. From IBM's cloud technology to the future of AI in security, learn how artificial intelligence is transforming the way we protect our spaces. 🤖🌐

Generative AI & Security - Cisco Research Summit Spotlights the Latest in GenAI

Cisco Research hosted a virtual summit to explore current research in the generative AI and cybersecurity space. The session includes presentations from University professors collaborating with the Cisco Research team, including Srini Devadas (MIT), Vijayalakshmi Atluri (Rutgers), Jie Ding (Minnesota), and Ravi Sandhu and Ram Krishnan (UT San Antonio). Listen in for unique and exciting perspectives on the possibilities of generative AI in security, including discussions on the trustworthiness of LLMs, training and maintenance of AI models, and more.

Retrieval Augmented Generation (RAG): Unlocking the Power of Hybrid AI Models

Language models have revolutionized natural language processing, enabling machines to generate human-like text with remarkable fluency and coherence. However, despite their impressive capabilities, traditional language models often need help with knowledge-intensive tasks that require factual accuracy, external knowledge integration, and contextual awareness.

Internet disruptions from cable failures in Africa to technical issues (and an RSA teaser)

"This Week in NET". Episode #59 Host João Tomé (based in Lisbon, Portugal) is joined by our Head of Data Insights, David Belson, based in Boston. We discuss our recent Q1 2024 Internet disruption summary blog post. There were submarine cable failures that impacted 13 countries in Africa. We also address technical issues with RPKI, DNS, and DNSSEC that disrupted connectivity for subscribers across multiple network providers.

Building Trust and Engagement: Mobile App Security for the Modern User

In today's fast-paced digital world, the focus is on creating secure and frictionless mobile applications that prioritize user privacy. This balance is particularly critical when dealing with in-app subscription management, a key revenue source and a hot spot for user data interaction. Proper management of these subscriptions is crucial for both securing continuous revenue and ensuring user trust alongside compliance with strict data protection standards.

Leveraging RAG for Domain-Specific Knowledge Retrieval and Generation

In the era of big data and information overload, efficiently retrieving and generating relevant knowledge has become increasingly crucial across various domains. While traditional language models have made significant strides in natural language processing tasks, they often need help with factual accuracy, context awareness, and integrating external knowledge sources.

Securing Copilot for Microsoft 365: New AISPM Capabilities from Zenity

In the realm of modern enterprise productivity suites, Copilot for Microsoft 365 stands as a huge driver for efficiency, offering business users the ability to aggregate, summarize, and process data within the M365 suite of tools. However, for organizations with diverse infrastructure and applications, and the need for real-time data interactions, the out-of-the-box functionality requires augmentation to reach its full potential, not to mention secure controls for Copilot for M365.