Phishing Detection – NVIDIA Technical Blog News and tutorials for developers, data scientists, and IT admins 2025-07-11T15:00:00Z http://www.open-lab.net/blog/feed/ Tianna Nguy <![CDATA[NVIDIA GTC Training Labs On Demand Available Now]]> http://www.open-lab.net/blog/?p=82157 2024-05-07T17:47:17Z 2024-05-07T17:02:57Z Missed GTC or want to replay your favorite training labs? Find it on demand with the NVIDIA GTC Training Labs playlist.]]> Missed GTC or want to replay your favorite training labs? Find it on demand with the NVIDIA GTC Training Labs playlist.nearly 100 training labs from GTC available on demand

Missed GTC or want to replay your favorite training labs? Find it on demand with the NVIDIA GTC Training Labs playlist.

Source

]]>
0
Nicola Sessions <![CDATA[Webinar: Improve Spear Phishing Detection with AI]]> http://www.open-lab.net/blog/?p=77126 2024-02-08T18:51:58Z 2024-01-24T18:00:00Z Learn how generative AI can help defend against spear phishing in this January 30 webinar.]]> Learn how generative AI can help defend against spear phishing in this January 30 webinar.

Learn how generative AI can help defend against spear phishing in this January 30 webinar.

Source

]]>
0
Shawn Davis <![CDATA[Generative AI and Accelerated Computing for Spear Phishing Detection]]> http://www.open-lab.net/blog/?p=70728 2023-10-05T18:18:13Z 2023-09-12T18:00:00Z Spear phishing is the largest and most costly form of cyber threat, with an estimated 300,000 reported victims in 2021 representing $44 million in reported...]]> Spear phishing is the largest and most costly form of cyber threat, with an estimated 300,000 reported victims in 2021 representing $44 million in reported...

Spear phishing is the largest and most costly form of cyber threat, with an estimated 300,000 reported victims in 2021 representing $44 million in reported losses in the United States alone. Business e-mail compromises led to $2.4 billion in costs in 2021, according to the FBI Internet Crime Report. In the period from June 2016 to December 2021, costs related to phishing and spear phishing totaled��

Source

]]>
0
Nicola Sessions <![CDATA[NVIDIA Morpheus Helps Defend Against Spear Phishing with Generative AI]]> http://www.open-lab.net/blog/?p=62189 2023-03-23T17:12:11Z 2023-03-21T16:50:53Z Using generative AI and the NVIDIA Morpheus cybersecurity AI framework, developers can build solutions that detect spear phishing attempts more effectively and...]]> Using generative AI and the NVIDIA Morpheus cybersecurity AI framework, developers can build solutions that detect spear phishing attempts more effectively and...Mail icon GIF

Using generative AI and the NVIDIA Morpheus cybersecurity AI framework, developers can build solutions that detect spear phishing attempts more effectively and with extremely short training times. In fact, using NVIDIA Morpheus and a generative AI training technique, we were able to detect 90% of targeted spear phishing emails��a 20% improvement compared to a typical phishing detection solution��

Source

]]>
2
Bartley Richardson https://www.linkedin.com/in/bartleyrichardson/%20 <![CDATA[Changing Cybersecurity with Natural Language Processing]]> http://www.open-lab.net/blog/?p=55796 2023-03-14T19:01:41Z 2022-10-19T17:51:00Z If you��ve used a chatbot, predictive text to finish a thought in an email, or pressed ��0�� to speak to an operator, you��ve come across natural language...]]> If you��ve used a chatbot, predictive text to finish a thought in an email, or pressed ��0�� to speak to an operator, you��ve come across natural language...

If you��ve used a chatbot, predictive text to finish a thought in an email, or pressed ��0�� to speak to an operator, you��ve come across natural language processing (NLP). As more enterprises adopt NLP, the sub-field is developing beyond those popular use cases of machine-human communication to machines interpreting both human and non-human language. This creates an exciting opportunity for��

Source

]]>
0
Nicola Sessions <![CDATA[Safeguarding Networks and Assets with Digital Fingerprinting]]> http://www.open-lab.net/blog/?p=55803 2023-06-12T08:52:56Z 2022-10-05T16:00:00Z Use of stolen or compromised credentials remains at the top of the list as the most common cause of a data breach. Because an attacker is using credentials or...]]> Use of stolen or compromised credentials remains at the top of the list as the most common cause of a data breach. Because an attacker is using credentials or...

Use of stolen or compromised credentials remains at the top of the list as the most common cause of a data breach. Because an attacker is using credentials or passwords to compromise an organization��s network, they can bypass traditional security measures designed to keep adversaries out. When they��re inside the network, attackers can move laterally and gain access to sensitive data��

Source

]]>
0
Nicola Sessions <![CDATA[Detecting Threats Faster with AI-Based Cybersecurity]]> http://www.open-lab.net/blog/?p=55006 2023-07-11T23:10:17Z 2022-09-22T18:40:00Z Network traffic continues to increase, with the number of Internet users across the globe reaching 5 billion in 2022. As the number of users expands, so does...]]> Network traffic continues to increase, with the number of Internet users across the globe reaching 5 billion in 2022. As the number of users expands, so does...

Network traffic continues to increase, with the number of Internet users across the globe reaching 5 billion in 2022. As the number of users expands, so does the number of connected devices, which is expected to grow into the trillions. The ever-increasing number of connected users and devices leads to an overwhelming amount of data generated across the network. According to IDC��

Source

]]>
0
Nicola Sessions <![CDATA[Addressing Cybersecurity in the Enterprise with AI]]> http://www.open-lab.net/blog/?p=51115 2023-07-11T23:10:27Z 2022-08-18T16:00:00Z Cybersecurity-related risk remains one of the top sources of risk in the enterprise. This has been exacerbated by the global pandemic, which has forced...]]> Cybersecurity-related risk remains one of the top sources of risk in the enterprise. This has been exacerbated by the global pandemic, which has forced...

Cybersecurity-related risk remains one of the top sources of risk in the enterprise. This has been exacerbated by the global pandemic, which has forced companies to accelerate digitization initiatives to better support a remote workforce. This includes not only the infrastructure to support a distributed workforce but also automation through robotics, data analytics, and new applications.

Source

]]>
0
Gorkem Batmaz https://twitter.com/gorkembatmaz <![CDATA[Designing a New Net for Phishing Detection with NVIDIA Morpheus]]> http://www.open-lab.net/blog/?p=48165 2022-06-02T17:19:25Z 2022-05-16T17:36:19Z Email became one of the most pervasive, powerful communication tools during the digital revolution. Attempts to defraud users by deceptively posing as...]]> Email became one of the most pervasive, powerful communication tools during the digital revolution. Attempts to defraud users by deceptively posing as...

Email became one of the most pervasive, powerful communication tools during the digital revolution. Attempts to defraud users by deceptively posing as legitimate people or institutions through email became so widespread that it got its own name: phishing. Today, with the digital world deeply interwoven in our work and personal lives, phishing remains one of the top three initial infection��

Source

]]>
0
Nicola Sessions <![CDATA[Supercharging AI-Accelerated Cybersecurity Threat Detection]]> http://www.open-lab.net/blog/?p=45716 2023-12-05T19:01:29Z 2022-03-23T15:01:00Z Cybercrime worldwide is costing as much as the gross domestic product of countries like Mexico or Spain, hitting more than $1 trillion annually. And global...]]> Cybercrime worldwide is costing as much as the gross domestic product of countries like Mexico or Spain, hitting more than $1 trillion annually. And global...

Cybercrime worldwide is costing as much as the gross domestic product of countries like Mexico or Spain, hitting more than $1 trillion annually. And global trends point to it only getting worse. Data centers face staggering increases in users, data, devices, and apps increasing the threat surface amid ever more sophisticated attack vectors. NVIDIA Morpheus enables cybersecurity��

Source

]]>
1
Nicola Sessions <![CDATA[Accelerating Next-Generation Cybersecurity with NVIDIA Morpheus, Now with Expanded Early Access]]> http://www.open-lab.net/blog/?p=39555 2023-07-11T23:11:23Z 2021-11-09T09:30:00Z Traditional cybersecurity methods include creating barriers around your infrastructure to protect it from intruders with ill intentions. However, as enterprises...]]> Traditional cybersecurity methods include creating barriers around your infrastructure to protect it from intruders with ill intentions. However, as enterprises...

Traditional cybersecurity methods include creating barriers around your infrastructure to protect it from intruders with ill intentions. However, as enterprises continue along the path of digital transformation, faced with a proliferation of devices, more sophisticated cybersecurity attacks, and an incredibly vast network of data to protect, new cybersecurity methodologies must be explored.

Source

]]>
0
Tom Drabas <![CDATA[Cybersecurity Analysis �C Beginner��s Guide to Processing Security Logs in Python]]> http://www.open-lab.net/blog/?p=25367 2024-05-07T19:27:35Z 2021-05-26T17:00:00Z This is the last installment of the series of articles on the RAPIDS ecosystem. The series explores and discusses various aspects of RAPIDS that allow its users...]]> This is the last installment of the series of articles on the RAPIDS ecosystem. The series explores and discusses various aspects of RAPIDS that allow its users...

This is the last installment of the series of articles on the RAPIDS ecosystem. The series explores and discusses various aspects of RAPIDS that allow its users solve ETL (Extract, Transform, Load) problems, build ML (Machine Learning) and DL (Deep Learning) models, explore expansive graphs, process signal and system log, or use SQL language via BlazingSQL to process data.

Source

]]>
0
Bartley Richardson https://www.linkedin.com/in/bartleyrichardson/%20 <![CDATA[Cybersecurity Framework: An Introduction to NVIDIA Morpheus]]> http://www.open-lab.net/blog/?p=30294 2023-03-22T01:11:56Z 2021-04-12T19:13:00Z NVIDIA recently announced Morpheus, an AI application framework that provides cybersecurity developers with a highly optimized AI pipeline and pre-trained AI...]]> NVIDIA recently announced Morpheus, an AI application framework that provides cybersecurity developers with a highly optimized AI pipeline and pre-trained AI...

NVIDIA recently announced Morpheus, an AI application framework that provides cybersecurity developers with a highly optimized AI pipeline and pre-trained AI capabilities. Morpheus allows developers for the first time to instantaneously inspect all IP network communications through their data center fabric. Attacks are becoming more and more frequent and dangerous despite the advancements in��

Source

]]>
1
���˳���97caoporen����