Video Interviews

Fighting Deep Fakes: Think Like the Attacker

Fighting Deep Fakes: Think Like the Attacker

|
Deepfakes have moved from novelty to a practical weapon — and Brian Long, CEO of Adaptive Security, says most organizations ...
AI

Why AI Changes the Risk Model for Application Security

|
As AI becomes embedded in everyday development workflows, the security model for applications is shifting fast — and not always ...
Click here for Industry spotlight inclusion guidelines
The Industry Spotlight Section of Security Boulevard is the place where tools and service providers in the security field contribute to the community discussion with original content. While there are vendor blogs in the Security Bloggers Network, original content from these vendors are featured here. The articles here must meet several criteria to be published:
  • * Must be original when published
  • * Must be vendor neutral
  • * Must be transparent as to authorship
  • * Must be of value to the community
Articles in the spotlight are authored by vendors. Some are even sponsored. If you want to take the information with a grain of salt, that is entirely up to you. When you think about it, who knows the use cases, product capabilities and markets better than vendors? If you would like to submit an article to this section, please write to [email protected].