Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Technology

Demystifying Deep Learning: Unraveling the Brain-Inspired Evolution of AI || Razorthorn Security

Dive deep into the world of artificial intelligence with our latest video, "Unlocking the Power of Deep Learning: Exploring the Brain-Inspired Revolution in Machine Learning." In this comprehensive exploration, we'll unravel the fascinating concept of deep learning, a subset of machine learning, and understand how it's attempting to simulate the complexity of the human brain.

Level Up - SASE Accreditation and Practical Path to SASE

In an ever-evolving landscape of cybersecurity and network architecture, staying ahead is imperative. Watch this webinar to hear how Netskope SASE Accreditation can help you elevate your expertise and fortify your network security acumen. You'll learn the value, process and what you get when you complete the program.

Email Routing subdomain support, new APIs and security protocols

It's been two years since we announced Email Routing, our solution to create custom email addresses for your domains and route incoming emails to your preferred mailbox. Since then, the team has worked hard to evolve the product and add more powerful features to meet our users' expectations. Examples include Route to Workers, which allows you to process your Emails programmatically using Workers scripts, Public APIs, Audit Logs, or DMARC Management.

DDoS threat report for 2023 Q3

Welcome to the third DDoS threat report of 2023. DDoS attacks, or distributed denial-of-service attacks, are a type of cyber attack that aims to disrupt websites (and other types of Internet properties) to make them unavailable for legitimate users by overwhelming them with more traffic than they can handle — similar to a driver stuck in a traffic jam on the way to the grocery store.

A Deep Dive Into Cloud Security Assessments

Cloud platforms offer unparalleled scalability, flexibility, and cost-efficiency. However, the convenience and advantages of the cloud are accompanied by significant security challenges. Hackers are constantly trying to exploit weak cloud configuration settings, which is why it’s important to have visibility into the security of your organization’s cloud infrastructure.

Protecting Users from Malicious Sites with Falcon for Mobile

Today, mobile devices are ubiquitous within enterprise environments. But with their proliferation, it provides adversaries with yet another attack surface with which they can target users and cause a breach. From phishing attacks to malicious apps, mobile users tend to let their guard down and potentially click on obfuscated links to malicious sites. Falcon for Mobile protects users by preventing connections to malicious sites on both iOS and Android devices.

The Use Of AI In Cybersecurity - Consultants Roundtable || Razorthorn Security

Hello, and welcome to Razorwire. This week, I've had a great time discussing the fascinating topic of artificial intelligence (AI) and its potential impact on our industry, with my esteemed Razorthorn consultants, Tom, Jamie and Michael. We explore the different types of AI, including machine learning and chatbots, and discuss the challenges of achieving a low false positive rate and high general application. You'll gain valuable insights into the evolution of AI and why we MUST take seriously the very real potential for malicious actors to use it for nefarious purposes.

Why you need a security companion for AI-generated code

Everyone is talking about generative artificial intelligence (GenAI) and a massive wave of developers already incorporate this life-changing technology in their work. However, GenAI coding assistants should only ever be used in tandem with AI security tools. Let's take a look at why this is and what we're seeing in the data. Thanks to AI assistance, developers are building faster than ever.