I had a great time chatting with the amazing Shira Rubinoff and Rinki Sethi on the Clarity podcast, discussing what people need to know about Cybersecurity and Artificial Intelligence!
I had a great time chatting with the amazing Shira Rubinoff and Rinki Sethi on the Clarity podcast, discussing what people need to know about Cybersecurity and Artificial Intelligence!
I had a tremendous time at the InCyber Montreal forum. The speakers, panels, fellow practitioners, and events were outstanding!
I bumped into Dan Lohrmann and Nancy Rainosek before their panel with Sue McCauley on CISO challenges. We had some very int
Fireside Chat On "The Future Of AI In Cybersecurity"
With Bruce Schneier (Cyptographer, author & security guru) and Bikash Barai (Co-founder, CISOPlatform & FireCompass)
>> Click Here To Read The Executive Summary.
Featured Blogs To R
YouTube has announced that it will facilitate requests to remove AI generated content that is created to look or sound like you.
It is a nice gesture on behalf of YouTube, but the process to protect from deepfakes is not scalable. The attackers will
The White House just released an Executive Order intended to lay down some standards intended to manage the risks of Artificial Intelligence. I absolutely like the idea of establishing guardrails to make AI safe, secure, and trustworthy, but I am uns
Performance testing examines an app’s capability, speed, scalability, and responsiveness under a particular quantity of workload. Indeed though it's an important aspect of icing that the software’s quality is over to the mark, numerous businesses giv
AI tech is a powerful tool. The original photo (left) was cleaned-up with an AI deep learning algorithm (Image source: from Murilo Gustineli) and restoring tremendous clarity.
The AI researchers outline their progress in their white paper Towards Real
Artificial intelligence – more specifically, the machine learning (ML) subset of AI - has a number of privacy problems.
Not only does ML require vast amounts of data for the training process, but the derived system is also provided with access to even
The boundaries of cybersecurity will be manipulated by the advances in Artificial Intelligence, the evolution of digital threats, and on ever-adapting leadership.
I had a great time being interviewed by Vaishali Lambe [Lisha] in her podcast SoLeadSa
How will AI change the strategies of cybersecurity? Where will we see the first big impacts of attackers using AI?
Watch the Cyber Risk Leaders podcast...
Shamane Tan and Carmen Marsh were wonderful hosts. I had a fantastic time talking about AI and
Turkey may be the first customer for the Kargu series of weaponized suicide drones specifically developed for military use. These semi-autonomous devices have been in development since 2017 and will eventually be upgraded to operate collectively as
An Artificial Intelligence (AI) system is only as good as its training. For AI Machine Learning (ML) and Deep Learning (DL) frameworks, the training data sets are a crucial element that defines how the system will operate. Feed it skewed or biased in
There has been a good deal of publicized chatter about impending cyberattacks at an unprecedented scale and how Artificial Intelligence (AI) could help stop them. Not surprisingly much of the discussion is led by AI vendors in the cybersecurity spac
My recent interview with Mark Byrne, from Cybx Security, covered a great range of cybersecurity questions, including new threats and solutions, Artificial Intelligence, DevSecOps, cybercrime, security impacts of Coronavirus, and the future of cybers