per + security   62

How to successfully harness AI to combat fraud and abuse - RSA 2018
While machine learning is integral to innumerable anti-abuse systems including spam and phishing detection, the road to reap its benefits is paved with numerous abuse-specific challenges. Drawing from concrete examples this session will discuss how these challenges are addressed at Google and providea roadmap to anyone interested in applying machine learning to fraud and abuse problems. Watching this talk will allow you to:

Learn how machine learning helps combat fraud and abuse.
Discover how to overcome challenges faced when using machine learning to anti-abuse.
Understand what the unsolved challenges are in the space.
ai  abuse  security 
may 2018 by per
Challenges faced while training an AI to combat abuse
This post looks at the main challenges that arise when training a classifier to combat fraud and abuse.
ai  abuse  security 
may 2018 by per
Why AI is the key to robust anti-abuse defenses
This post explains why artificial intelligence (AI) is the key to building anti-abuse defenses that keep up with user expectations and combat increasingly sophisticated attacks. This is the first post of a series of four posts dedicated to provide a concise overview of how to harness AI to build robust anti-abuse protections.
ai  abuse  security 
may 2018 by per
Devops Security Checklist | Sqreen
This security checklist aims to give DevOps professionals a list of DevOps security best practices they can follow to implement DevSecOps.
security  checklist 
may 2018 by per
shieldfy/API-Security-Checklist: Checklist of the most important security countermeasures when designing, testing, and releasing your API
Checklist of the most important security countermeasures when designing, testing, and releasing your API
security  checklist  api 
july 2017 by per
WhoHasAccess.com: User management for Google Drive
Find out who can access your Google Drive. You'll be surprised.
google  security  tools 
september 2014 by per
The Matasano Crypto Challenges (Pinboard Blog)
I recently took some time to work through the Matasano crypto challenges, a set of 48 practical programming exercises that Thomas Ptacek and his team at Matasano Security have developed as a kind of teaching tool (and baited hook).
programming  security  learning 
may 2013 by per
arc90 lab : experiments : HalfMask - an Experiment in Password Masking
HalfMask is an experimental approach to masking on password fields. Currently the standard shows bullets or asterisks to hide a user's password completely as they type. Halfmask avoids this by obscuring the password with semi-visible random characters in the background. The intent is to only allow the user who typed the password to easily read it.
webdev  security  jquery  usability  password 
july 2009 by per
Anti-Email Spam (email bot obsfucator) | Urban Giraffe
This is a very simple plugin that attempts to hide email addresses from 'bots (computer email harvesting programs). HTML Entity or JavaScript.
wordpress  plugins  email  security  spam 
december 2007 by per
Watch out for Web 2.0 security risks: Gartner - News - Builder AU
Adopting Web 2.0 to increase collaboration within organisations opens the door to significant security risks which need to be addressed, according to Gartner.
web2.0  enterprise2.0  security  business 
august 2007 by per

Copy this bookmark:



description:


tags: