Machine learning and AI

How Criminals Can Exploit AI

Introduction Because tools for developing artificial intelligence (AI) sources and tutorials for its use are widely available in the public domain, it is exp

Cooperation between Humans and Artificial Intelligence in the Name of Security

Artificial Intelligence (AI) - Machine Learning (ML) - Deep Learning (DL) Artificial intelligence as a term dates back to the 1950s, but only recently is com

Privacy Concerns About Emotional Chatbots

Introduction Artificial Intelligence (AI) is evolving at an enormous speed and takes an increasingly more substantial part of our everyday life (think of the

Is AI really the Future of Cyber Security

As we progressively get more dependent on technological innovation in our daily lives, we open ourselves up to cyber-attacks. Each device that we use today i

Big Data Discrimination

Introduced in 1997, the term "Big Data" has grown in popularity in the past years. [pkadzone zone="main_top"] Credit: IBM-Big-Data-Definitions by DigitalRalp

How is AI Addressing Cyber Security Challenges?

Cyber-attackers are moving towards automation to launch cyber-attacks more frequently, while many organizations are still using manual systems and strategies

Artificial Intelligence and Its Impact on Cyber Security

Understanding Artificial Intelligence Artificial Intelligence or AI is the intelligence shown by machines. Usually, the term Artificial Intelligence is used

Machine learning for malware detection

Machine Learning is a subfield of computer science that aims to give computers the ability to learn from data instead of being explicitly programmed, thus le

The Impact of Automation on the IT Security Job Market

The growing influence of automation on daily life is noticeable everywhere. The news is full of job-cut announcements, often justified by automation projects

Developments in Machine Learning vs. Traditional SIEM Solutions

For decades, Information security analysts have been scanning through security logs trying to find anomalies that could lead to security incidents. In the be