Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
|
2019-10-31 09:00:00 |
Leakproof by law: Previewing the 2020 data protection landscape (lien direct) |
To achieve compliance in 2020, human teams need artificial intelligence to make sense of their dynamic digital estates. |
|
|
|
|
2019-10-02 09:00:00 |
Big game hunting: How Ryuk ransomware takes down its imposing targets (lien direct) |
Catching sophisticated, long-haul attacks requires AI-powered tools that learn what's normal for each unique user and device. |
Ransomware
|
|
|
|
2019-09-06 09:00:00 |
Off the hook: How AI catches phishing emails even if we take the bait (lien direct) |
By uniting email security with enterprise security, we can autonomously fight back against phishing attacks - even those we fall for hook, line, and sinker. |
|
|
|
|
2019-08-13 09:00:00 |
Securing the cities of tomorrow: Three takeaways from Black Hat 2019 (lien direct) |
Black Hat demonstrated why, to safeguard the cities of tomorrow, we must go beyond looking for yesterday's threats. |
|
|
|
|
2019-08-05 09:00:00 |
Back to square one: The Capital One breach proved we must rethink cloud security (lien direct) |
The path forward is to use artificial intelligence to understand how users behave within a company's perimeter walls. |
|
|
|
|
2019-07-31 09:00:00 |
Digitizing the Dark: Cyber-attacks against power grids threaten modernity itself (lien direct) |
State-sponsored cyber-criminals are increasingly targeting energy grids, with the intention of causing outages that could bring victimized regions to a screeching halt. |
|
|
|
|
2019-07-10 09:00:00 |
Shining a light on Shamoon 3: What cyber AI revealed about the data-wiping malware (lien direct) |
During an extended trial in the network of a global company, Darktrace observed a Shamoon-powered cyber-attack. |
Malware
|
|
|