The worlds of CyberSecurity and AI are colliding. That’s the good news. The bad news is that the world of Cybersecurity and AI are colliding. Bad things could happen when bad actors get their hands on ML.

Artificial intelligence won’t revolutionize anything if hackers can mess with it. That’s the warning from Dawn Song , a professor at UC Berkeley who specializes in studying the security risks involved with AI and machine learning. Speaking at EmTech Digital, an event in San Francisco produced by […]

NB: this article is behind a registration wall. Usually, I avoid posting content from such sites, but this time I made an exception since the content is relevant and worth the hassle.

Here’s an enlightening look at the state of applying AI to security applications.

Top 5 barriers to AI security adoption

From this article in TechRepublic:

Artificial intelligence (AI) holds a great deal of promise for helpingcybersecurity professionals deal with more sophisticated and dangerous threats. But the technology faces several key obstacles before it is widely adopted in this field, according to a Tuesday survey conducted by SANS Institute and sponsored by Cylance. Among […]

Armon Dadgar (@armon), HashiCorp CTO and co-founder, and Aaron Schlesinger (@arschles) talk about how and why HashiCorp Vault is a security and open source product: two things traditionally considered at odds. Learn how to avoid secret sprawl and protect your apps’ data, ways for contributors and maintainers to enhance the security of any project, and why you should trust no one (including yourself).

Learn More

Create a Free Azure Account

HashiCorp Vault on Azure

Using HashiCorp Vault with Azure Kubernetes Service

Learn more about HashiCorp Vault

Check out HashiCorp Learn 

Read HashiCorp Blog

Learn more about secret sprawl

As the adoption of Kubernetes grows, secret management tools must integrate well with Kubernetes so that the sensitive data can be protected in the containerized world. On this episode, Yoko Hakuna demonstrates the HashiCorp Vault’s Kubernetes auth method for identifying the validity of containers requesting access to the secrets.

Did you ever notice that the chip on your credit card looks an awful lot like a SIM card? I never really gave it much thought until my son asked why credit cards with chips are more secure than those with just the magnetic strips. It turns out that there’s a lot of high tech encryption and security going on and this video by LiveOverflow explores it all.

Kelly Anderson joins Scott Hanselman to discuss Azure Security Center, which offers built-in security management and threat protection for your cloud workloads.

Azure Security Center helps you find & fix vulnerabilities, aids in blocking malicious access and alerts you when your resources are under attack.