Rachel Allen – NVIDIA Technical Blog News and tutorials for developers, data scientists, and IT admins 2024-05-30T19:55:47Z http://www.open-lab.net/blog/feed/ Rachel Allen https://www.linkedin.com/in/rachel-kay-allen-913b5696/%20 <![CDATA[Applying Generative AI for CVE Analysis at an Enterprise Scale]]> http://www.open-lab.net/blog/?p=82796 2024-05-30T19:55:47Z 2024-05-23T16:00:00Z The software development and deployment process is complex. Modern enterprise applications have complex software dependencies, forming an interconnected web...]]>

The software development and deployment process is complex. Modern enterprise applications have complex software dependencies, forming an interconnected web that provides unprecedented functionality, but with the cost of exponentially increasing complexity. Patching software security issues is becoming progressively more challenging as the number of reported security flaws in the common…

Source

]]>
Rachel Allen https://www.linkedin.com/in/rachel-kay-allen-913b5696/%20 <![CDATA[From Neuroscience to Data Science: My Road Into Cybersecurity]]> http://www.open-lab.net/blog/?p=61604 2023-03-14T18:21:43Z 2023-03-14T16:00:00Z If you asked a group of cybersecurity professionals how they got into the field, you might be surprised by the answers that you receive. With military officers,...]]>

If you asked a group of cybersecurity professionals how they got into the field, you might be surprised by the answers that you receive. With military officers, program managers, technical writers, and IT practitioners, their backgrounds are varied. There is no single path into a cybersecurity career, let alone one that incorporates both cybersecurity and AI. I’ve always been…

Source

]]>
0
Rachel Allen https://www.linkedin.com/in/rachel-kay-allen-913b5696/%20 <![CDATA[Fingerprinting Every Network User and Asset with NVIDIA Morpheus]]> http://www.open-lab.net/blog/?p=41837 2022-09-29T17:15:26Z 2021-12-01T20:00:00Z Traditional approaches to finding and stopping threats have ceased to be appropriately effective. One reason is the scope of ways an attacker can enter a system...]]>

Traditional approaches to finding and stopping threats have ceased to be appropriately effective. One reason is the scope of ways an attacker can enter a system and do damage have proliferated as the interconnections between apps and systems have proliferated. Applying AI to the problem seems like a natural choice but this in some sense broadens the data problem. A typical user may interact…

Source

]]>
0
Rachel Allen https://www.linkedin.com/in/rachel-kay-allen-913b5696/%20 <![CDATA[Cybersecurity Framework: An Introduction to NVIDIA Morpheus]]> http://www.open-lab.net/blog/?p=30294 2023-03-22T01:11:56Z 2021-04-12T19:13:00Z NVIDIA recently announced Morpheus, an AI application framework that provides cybersecurity developers with a highly optimized AI pipeline and pre-trained AI...]]>

NVIDIA recently announced Morpheus, an AI application framework that provides cybersecurity developers with a highly optimized AI pipeline and pre-trained AI capabilities. Morpheus allows developers for the first time to instantaneously inspect all IP network communications through their data center fabric. Attacks are becoming more and more frequent and dangerous despite the advancements in…

Source

]]>
1
���˳���97caoporen����