Logo

    darktrace

    Explore " darktrace" with insightful episodes like "Inside the Cyber AI Loop: How Darktrace Protects Enterprises from Cyber Disruption (Guest: Scott Bennett)", "Tech News: Is ChatGPT Talking About You Behind Your Back?", "Equity Monday: Microsoft buys Nuance, Uber isn't dead, and Austin has a new unicorn" and "The War with Algorithms: Why Your Next Security Strategy Includes A.I. and Machine Learning" from podcasts like ""Tech Deep Dive", "TechStuff", "Equity" and "IT Visionaries"" and more!

    Episodes (4)

    Inside the Cyber AI Loop: How Darktrace Protects Enterprises from Cyber Disruption (Guest: Scott Bennett)

    Inside the Cyber AI Loop: How Darktrace Protects Enterprises from Cyber Disruption (Guest: Scott Bennett)

    How does Darktrace protect enterprises from cyber disruption? 

    Join us on Tech Deep Dive as Max Clark, founder of ITBroker.com, sits down with Scott Bennett, Strategic Channel Manager at Darktrace. Scott will share how Darktrace addresses generative AI concerns with the introduction of AI Models that help protect Data Privacy🛡️💻

    Tune in to learn about Darktrace's powerful self-learning AI, its ability to identify what's not normal, and how it protects against sophisticated cyber-attacks. 

    Time Stamp:
    0:00 - Introduction: Scott Bennet and Darktrace.
    6:00 - Customer interaction and collaboration with Darktrace
    12:44 - Identifying the primary beneficiaries of Darktrace
    19:20 - Cyber insurance
    20:00 - Darktrace's impact on the premium insurance landscape
    23:13 - Maximizing value: Making informed investments in cybersecurity with a limited budget
    25:50 - Differentiating between IT and OT and providing illustrative examples
    31:08 - Darktrace EDR (Endpoint Detection and Response)
    41:56 - To SIM or not to SIM
    50:00 - Rolling out DarkTrace 
    56:51 - Final thoughts and insights from Scott Bennet

    ****

    🔍 Find the best IT suppliers without boring sales calls.

    ITBroker.com checks out hundreds of suppliers each year for our clients. Tech Deep Dive lets you follow along without the pain.
    Join us as we explore each supplier, what problems they fix, how they do it, and if they match your needs.


    ****

    👋 P.S. Did you like the show? New episodes will be released weekly, so please subscribe and stay up-to-date!


    ****

    🌐 Let’s connect:

    Website: www.itbroker.com

    LinkedIn: Linkedin.com/in/maxclark

    Twitter: twitter.com/maxclark


    Business Pages

    LinkedIn: www.linkedin.com/company/itbrokerdotcom

    Instagram: www.instagram.com/itbrokerdotcom

    Facebook: www.facebook.com/ITBrokerdotcom


    #cyberattack #cybercrime #cyberdefense #Cybersecurity #technology #tech #techindustry #techcommunity   #informationtechnology #ceo #cfo #businessgrowth #darktrace #TechDeepDive #Podcast 

    Equity Monday: Microsoft buys Nuance, Uber isn't dead, and Austin has a new unicorn

    Equity Monday: Microsoft buys Nuance, Uber isn't dead, and Austin has a new unicorn

    Hello and welcome back to Equity, TechCrunch’s venture capital-focused podcast where we unpack the numbers behind the headlines.

    This is Equity Monday, our weekly kickoff that tracks the latest private market news, talks about the coming week, digs into some recent funding rounds and mulls over a larger theme or narrative from the private markets. You can follow the show on Twitter here and myself here. It is good to be back!

    There was a lot to get through, so, in order that we discussed the topics on the show, here's our rundown:

    Don't forget that Coinbase is listing this week, yeah? Chat soon!

    Credits: Equity is hosted by TechCrunch's Alex Wilhelm and Mary Ann Azevedo. We are produced by Theresa Loconsolo with editing by Kell. Bryce Durbin is our Illustrator. We'd also like to thank the audience development team and Henry Pickavet, who manages TechCrunch audio products.

    The War with Algorithms: Why Your Next Security Strategy Includes A.I. and Machine Learning

    The War with Algorithms: Why Your Next Security Strategy Includes A.I. and Machine Learning

    The image of a hooded individual illuminated by the glare of a computer screen hacking into a company’s network is the classic picture of what a cyber attack looks like. The reality, though, is these attackers are almost never a one-man band, but rather a sophisticated team armed with the same technology companies often deploy against them. But what makes these threats from these attackers so devious is not the technology they use, but rather that they never use the same approach twice.

    “Cyber is big business and unfortunately it's causing a tremendous amount of business disruption. They continue to increase in sophistication and they have new and novel approaches. There are constantly unknown threats and new threat actors and that's part of the reason it gets very challenging. In some ways, a lot of the focus is people love to hear about all these cool techniques they use, but it's the fact that they're constantly evolving and changing the techniques that make it so difficult for security teams and for what I think of as static security tools to stay current against this range of threats.”

    Nicole Eagan is the Chief A.I. Officer at Darktrace, a leader in autonomous cybersecurity A.I. On this episode of IT Visionaries, Nicole dives into why A.I. is a good tool, but not one powerful enough to prevalent today’s cybercriminals. Plus, she explains how security systems must constantly be learning, the impact IoT devices have had on security threats,  and why algorithms are at a war with one another.

    Main Takeaways

    • Update Available: Companies are utilizing A.I. to predict and prevent attacks, but there is one major issue: the data sets they are using to prevent attackers from entering their networks are often filled with old datasets. By using old data, your artificial intelligence cannot understand how to protect you from new attacks.
    • The War of Algorithms: Future cyber attacks are no longer going to simply come from hackers infiltrating a network. Instead, these attackers are becoming more sophisticated and will use machine learning techniques to understand the type of behaviors the user is using in order to build a sophisticated attack. The only way to combat these types of attacks, is to use real-time self-learning A.I. systems that can detect abnormalities within a system.
    • Stop Acting in Silos: Security prevention needs to stop operating in silos when it comes to preventing attacks. Cyber criminals are no long attacking users through email or through loca networks, so security teams need to stop focusing on a niche area. Instead, develop an all encompassing self-learning platform that is constantly monitoring all aspects of your business and your employees.

    IT Visionaries is brought to you by the Salesforce Platform - the #1 cloud platform for digital transformation of every experience. Build connected experiences, empower every employee, and deliver continuous innovation - with the customer at the center of everything you do. Learn more at salesforce.com/platform

     

     

    Logo

    © 2024 Podcastworld. All rights reserved

    Stay up to date

    For any inquiries, please email us at hello@podcastworld.io