Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

The Importance of a Machine Learning-Based Source Code Classifier

This is the fifth in a series of articles focused on AI/ML. Source code is a critical part of an organization’s intellectual property and digital assets. As more and more centralized source code repositories are moving to the cloud, it is imperative for organizations to use the right security tools to safeguard their source code.

How intelligent are AI tea-making robots?

When it comes to how truly intelligent Artificial Intelligence (AI) is, it’s a polarizing debate. Either AI will solve the world’s woes or robots will rule us all – Matrix-style. But it’s all a little more complicated than Hollywood makes it seem… For a deep dive, do listen to our Beyond the Data podcast hosted by Sophie Chase-Borthwick (Calligo’s Global Data & Governance Lead) and Tessa Jones (VP of Data Science Research & Development).

The EU's new AI Act-What We Can Learn From the GDPR

Artificial Intelligence (AI) is rapidly becoming ubiquitous in supporting key business decisions, and for many organisations it is critical for their digital transformation and new business models. With organisations quickly driving forward to identify new ways to extract competitive value from their data, the regulators are preparing to step in.

The role of AI in Cyber Security

As artificial intelligence (AI) becomes more and more prevalent in society, it is also making its way into the world of cyber security. AI can be used in a number of ways to help improve cyber security, including by automatically detecting and responding to threats, improving network efficiency, and helping to identify vulnerabilities. In this blog post, we will discuss some of the ways that AI is changing cyber security and how it can help your business stay safe online.

How your Digital Onboarding process can benefit from AI-based Liveness Detection?

The National Crime Record Bureau (NCRB), in its report, recorded 50,035 cybercrime cases in 2020, and it is alarming to see that the numbers have surged exponentially ever since the pandemic. This opened the gates to remote onboarding and the use of facial recognition algorithms to distinguish users’ unique features, enhancing their onboarding experience. On the flip side, this has also given scamsters and fraudsters ample opportunities to manipulate and employ technologies for wrongful gains.

How CrowdStrike Achieves Lightning-Fast Machine Learning Model Training with TensorFlow and Rust

Supercharging CrowdStrike’s artificial intelligence requires both human professionals and the right technologies to deliver blisteringly fast and accurate machine learning model training with a small footprint on the CrowdStrike Falcon® sensor. CrowdStrike data scientists continuously explore theoretical and applied machine learning research to advance and set the industry standard in protecting customers from sophisticated threats and adversaries.

AI based Data Extraction : Mastering the Art of Data Extraction

With the speed of technological advancements, one term is ubiquitous, Artificial Intelligence. Across various fields, AI is changing how we look at current technologies. One technology transformed with the implementation of AI is OCR, Optical Character Recognition. OCR can process images of text and convert them into a machine-readable format. It can take handwriting and printed documents and convert them into a digital format.

How Human Intelligence Is Supercharging CrowdStrike's Artificial Intelligence

There is a new trope in the security industry, and it goes something like this: To keep yourself safe, you need an AI-powered solution that can act on its own, and to do that, you need to keep those pesky humans away from it. As a practitioner with a track record of bringing AI to cybersecurity — not because marchitecture demands it these days but because of its actual utility to solve security problems — I find this characterization puzzling.

Five worthy reads: The emerging threat of weaponized artificial intelligence

Illustration by Dorathe Victor Five worthy reads is a regular column on five noteworthy items we discovered while researching trending and timeless topics. In this week’s edition, let’s explore how artificial intelligence and machine learning are weaponized by hackers to fuel cyberattacks. AI and ML are conquering the world at a rapid pace. AI has made life much easier. In many instances, it speeds up manual processes, reduces costs, and eliminates manual errors.