In order to fully assess a client website, it needs to be first fully mapped and scanned--with all links, forms, APIs, etc. discovered. Currently, a lot of human time and resources are dedicated to these tasks. Using ML, we could potentially speed up this process even more, further decreasing time to value for our clients.
There is no doubt that AI and ML offer major advantages for modern cybersecurity applications compared to older, automated versions. The ability for applications to learn based on experience and use the knowledge to inform their behavior when confronted with similar issues in the future delivers a significant benefit.
WhiteHat is positioned extremely well to capitalize on recent developments in ML. ML allows us to make sense of the data, train a set of expert networks on this data, and then use these networks to supplement our human element.
New Sentinel Dynamic enhancements enable highest level of accuracy in shortest timeframe, make real-time risk assessment a reality and empower developers to create secure web applications at the fast pace demanded by modern businesses
2018 Winter Olympic Games hit with destroyer malware during opening ceremony.
I’d like everyone to pause, and in their minds and hearts say thank you to the hundreds of engineers at various hardware, software, and security vendors who spent their holidays working on OS patches, browser patches, cloud roll-outs and distribution of patches for Meltdown and Spectre.
Dust off your Old Glory Insurance policy, ROBOT attack is now a real thing that can happen to you.
The news was just released that a massive breach hit Uber in October of 2016. The personal information of 57 million Uber users and 7 million Uber drivers were stolen, including names, email addresses and phone numbers.
It’s another day which means another round of Ransomware. This time it’s a ransomware that’s being called ‘Bad Rabbit’, and if the Bad Rabbit infections look familiar, they are.
As you’ve probably read, there is a serious vulnerability in the WPA2-PSK protocol that almost all WiFi traffic uses. This vulnerability is being called ‘KRACK’, which stands for Key Reinstallation Attack.