article thumbnail

MY TAKE: Why speedy innovation requires much improved cyber hygiene, cloud security

The Last Watchdog

I spoke with Greg Young, Cybersecurity Vice President at Trend Micro about this. Trend Micro has evolved from one of the earliest suppliers of antivirus suites to a provider of a broad platform of systems to help individuals and organizations reduce cyber exposures. We met at RSA 2020 in San Francisco. Here are a few key takeaways.

Cloud 226
article thumbnail

Catches of the Month: Phishing Scams for May 2023

IT Governance

There were stories of scammers using the AI language tool to create phishing lures , AI being used to fend off cyber attacks , Google and Microsoft incorporating machine learning in their security systems and the security risks that individuals bring to the party.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Episode 255: EDM, Meet CDM – Cyber Dance Music with Niels Provos

The Security Ledger

And yet, the awareness of cyber security risks – from phishing and social engineering attacks to software supply chain compromises – remains low. Software is now central to the operation of our economy – as digital transformation washes over every industry. Nobody knows that better than our guest this week.

article thumbnail

EUROPE: Data protection regulators publish myth-busting guidance on machine learning

DLA Piper Privacy Matters

For example, the ML system could be used to determine likely trends of categories of persons to default on loan agreements through the processing of financial default information. It is instead better to have a focused dataset that accurately reflects the trend being investigated.

article thumbnail

5 Best Bot Protection Solutions and Software for 2023

eSecurity Planet

By implementing bot protection, website owners and online service providers can reduce the risk of cyber attacks, protect sensitive data, and ensure a good experience for their users. The reports should be clear and easily understood, helping you to identify trends and potential vulnerabilities.

Analytics 107
article thumbnail

Network Security Architecture: Best Practices & Tools

eSecurity Planet

or specialized tools to deliver obfuscation defenses such as: Honeypots: Provide tempting targets for attackers that contain no valid information as one of several similar deception technologies to trigger alerts for early attack detection. These techniques can use built-in software features (for firewalls, operating systems, etc.)

Security 117
article thumbnail

What is Network Security? Definition, Threats & Protections

eSecurity Planet

Instead, multiple types of controls will need to be implemented that reinforce each other so that risks will be mitigated even if a single control fails. Deception technology using honeypots and similar subterfuge can trigger proactive alerts of both hackers and authorized users that might be attempting to perform malicious actions.