Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
    • Security Blog
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • More
  • PHYSICAL
    • Access Management
    • Video Surveillance
    • Identity Management
    • More
  • CYBER
    • Cybersecurity News
    • More
  • SECTORS
    • Education: University
    • Hospitals & Medical Centers
    • Critical Infrastructure
    • More
  • EXCLUSIVES
    • Top Cybersecurity Leaders
    • The Security Benchmark Report
    • Most Influential People in Security
    • Top Guard and Security Officer Companies
    • Annual Guarding Report
    • The Security Leadership Issue
    • Women in Security
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MORE
    • Newsletter
    • Podcasts
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Store
    • White Papers
    • Continuing Education
    • Classifieds & Job Listings
    • Call for Entries
    • Sponsor Insights
    • Photo Galleries
    • Polls
  • EMAG
    • eMagazine
    • This Month's Content
    • Contact Us
      • Editorial Guidelines
    • Advertise
  • SIGN UP!
Home » Keywords: » machine learning

Items Tagged with 'machine learning'

ARTICLES

Locked vault

Fortifying the software supply chain: A crucial security practice

David Close
David Close
June 27, 2024

The software supply chain is the backbone of software development. However, the very interconnectedness that makes it efficient also renders it vulnerable to escalating cyber threats.


Read More
Person in front of monitor

Humans in AI: The necessity for human-in-the-loop (HILT)

Bentley headshot
Rick Bentley
Sarkar headshot
Abhik Sarkar
June 18, 2024

A deliberate approach is essential for AI to be net positive, and human-in-the-loop is an essential component of this.


Read More
Glasses on a laptop

Harnessing AI to bolster public sector cybersecurity

Carver headshot
Kynan Carver
April 22, 2024

AI can become the foundation for a future where agencies can proactively identify, understand and address cyber threats before it’s too late.


Read More
Two people writing on whiteboard

AI security for CISOs: A dynamic and practical framework

Omar Khawaja Headshot
Omar Khawaja
April 17, 2024

Without the proper foundation or understanding of how to secure their AI systems and address key security concerns, innovation slows or gets stuck. 


Read More
Tornado touching down on farm

The evolving disaster preparedness landscape: AI, ML and data modeling

Richard Danforth
February 9, 2024

Fueled by the boom of ML, AI and advanced data modeling, local agencies and private enterprises are empowered to proactively model critical events.


Read More
Chloe Messdaghi headshot

Chloé Messdaghi appointed Head of Threat Intelligence at HiddenLayer

Security Staff
January 30, 2024

Chloé Messdaghi has been appointed Head of Threat Intelligence at HiddenLayer. Messdaghi is focused on sharing the latest security for AI research.


Read More
cyber brain
Cyber Tactics

The intersection of cybersecurity and artificial intelligence

AI has proven to be a valuable asset in the cybersecurity arsenal, but it is not a silver bullet.
Pam Nigro headshot
Pam Nigro
January 15, 2024

Artificial intelligence (AI) is a valuable cybersecurity asset, but it's not a silver bullet. To best leverage AI, we must consider the security teams of the future.


Read More
green code on computer screen

Why context matters in the future of enterprise security

Guy Guzner
December 27, 2023

Enterprises often see employees as their greatest vulnerability and as being victims of outside threats, but sometimes the latter is not true.


Read More
SEC_Top-Cybersecurity-Predictions-for-2023.jpg

Top cybersecurity predictions of 2024

Rachelle BlairFrasier
Rachelle Blair-Frasier
December 20, 2023

As another year comes to a close, cybersecurity leaders are not only looking back and reviewing the top trends of 2023, but considering what the future holds for 2024.


Read More
Laptop on table

Combatting the next wave of AI fraud

kathleen peters
Kathleen Peters
November 1, 2023

Generative AI can create efficiencies that will increase productivity, improve internal operations and enhance creativity.
Yet, the evolution of large language models and the use of generative AI can open doors for fraudsters.


Read More
More Articles Tagged with 'machine learning'
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • Online Registration
  • Mobile App
  • Subscription Customer Service
  • eMagazine Subscriptions
  • Manage My Preferences

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Lowes
    Sponsored byAxis

    Modernizing Retail Technology Operations to Improve Business Efficiency

  • Threat management
    Sponsored bySeerist

    Polycrises are Exhausting Your Security Team: Tips to Navigate the Challenges

  • image of electric security gate by AMAROK
    Sponsored byAMAROK

    Redefining Security: Proactive Measures Transform Industrial Protection

Popular Stories

Coding on monitor

Windows users targeted with zero-day attacks via Internet Explorer

Empty hospital room

McLaren Health Care experienced a criminal cyber attack

Person in hoodie on laptop

North Korean hacker tries to access KnowBe4, security leaders react

Two cellphones

Security leaders respond to the AT&T data breach

Doctor holding stethoscope

Security leaders respond to HealthEquity data breach

Profiles In Excellence

Security Magazine is looking to feature individuals that are showcasing excellence within the security industry!

Events

March 14, 2024

Balancing Act: Navigating Security Tech in Nonprofit Entertainment Sectors

ON DEMAND: In this webinar, Regina Lester, Vice President of Security & Safety Operations at Toledo Zoo, will share her insights on implementing security technologies in the entertainment sector and the challenges all organizations face — large and small — when it comes to balancing budget and security. 

March 19, 2024

Enhance Digital Forensics with Streamlined Analysis and In-Depth Investigations

ON DEMAND: Explore the latest developments in digital forensics with an in-depth look at FTK 8.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
Secutiy Podcasts

Where security and risk professionals stay up to date on the latest issues affecting the enterprise.

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Directories
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey And Sample
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2024. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing