The worlds of CyberSecurity and AI are colliding. That’s the good news. The bad news is that the world of Cybersecurity and AI are colliding. Bad things could happen when bad actors get their hands on ML.
Artificial intelligence won’t revolutionize anything if hackers can mess with it. That’s the warning from Dawn Song , a professor at UC Berkeley who specializes in studying the security risks involved with AI and machine learning. Speaking at EmTech Digital, an event in San Francisco produced by […]
NB: this article is behind a registration wall. Usually, I avoid posting content from such sites, but this time I made an exception since the content is relevant and worth the hassle.
Here’s an enlightening look at the state of applying AI to security applications.
Artificial intelligence (AI) holds a great deal of promise for helpingcybersecurity professionals deal with more sophisticated and dangerous threats. But the technology faces several key obstacles before it is widely adopted in this field, according to a Tuesday survey conducted by SANS Institute and sponsored by Cylance. Among […]
This episode of BBC Click explores how some popular third-party alarms have made cars easier to steal. Also in this episode covers how tech can help with rugby injuries and a preview of action game Days Gone.
Armon Dadgar (@armon), HashiCorp CTO and co-founder, and Aaron Schlesinger (@arschles) talk about how and why HashiCorp Vault is a security and open source product: two things traditionally considered at odds. Learn how to avoid secret sprawl and protect your apps’ data, ways for contributors and maintainers to enhance the security of any project, and why you should trust no one (including yourself).
Create a Free Azure Account
HashiCorp Vault on Azure
Using HashiCorp Vault with Azure Kubernetes Service
Learn more about HashiCorp Vault
Check out HashiCorp Learn
Read HashiCorp Blog
Learn more about secret sprawl
As we rush headlong into an internet connected world, have we really thought through all of the risks? The next episode of Data Driven will take a deeper look at the global security risks our connected world exposes us to.
Here’s a sobering video from Motherboard on why we need to think very carefully about what kind of future we want.
As the adoption of Kubernetes grows, secret management tools must integrate well with Kubernetes so that the sensitive data can be protected in the containerized world. On this episode, Yoko Hakuna demonstrates the HashiCorp Vault’s Kubernetes auth method for identifying the validity of containers requesting access to the secrets.
Tom Scott and Computerphile team up to explain the worst ways to store passwords in your apps.
Did you ever notice that the chip on your credit card looks an awful lot like a SIM card? I never really gave it much thought until my son asked why credit cards with chips are more secure than those with just the magnetic strips. It turns out that there’s a lot of high tech encryption and security going on and this video by LiveOverflow explores it all.
Kelly Anderson joins Scott Hanselman to discuss Azure Security Center, which offers built-in security management and threat protection for your cloud workloads.
Azure Security Center helps you find & fix vulnerabilities, aids in blocking malicious access and alerts you when your resources are under attack.