Types of Machine Learning exemplified by spam analysis: Part 2

Part 1 of the article introduced the topic of machine learning based on the example of spam analysis and described the first three types of machine learning - supervised, reinforcement and unsupervised learning. The remaining two types of machine learning – semi-supervised and active, are discussed in the [...]

Types of Machine Learning exemplified by spam analysis: Part 1

The first two articles in our series on AI recognition, Human or machine? Distinguishing between real and AI-generated content and GBS tests the most popular tools for AI content detection, already presented methods and tools that can be used to analyze whether a (text) content was created by [...]

GBS tests the most popular tools for AI content detection

In our previous blog article, we dived into the topic of identifying AI-generated texts. Dr. Rolf Kremer, R&D Manager at GBS, presented methods for analyzing the content of documents or emails to determine whether they were written by a human or an artificial intelligence (AI). In this blog post, [...]

Human or machine? Distinguishing between real and AI-generated content

More and more frequently, we hear about AI-generated phishing attacks that are indistinguishable from real emails and deepfake content that looks like written by professional journalists. In recent years, AI-based systems are continuously improving so that they can now independently generate content such as text, graphics, images and [...]

The Achilles Heel of Security Awareness Trainings: Reasons Why They Often Fail

In the dynamic landscape of cybersecurity, organizations invest significant resources in fortifying their digital defenses against an ever-evolving array of threats. The statistics that 85% of successful attacks are due to human error has lead organisations across the globe to finally realise the importance of training their employees [...]

Managed Endpoint Detection and Response (MEDR) – active reaction to critical malware incidents

Cyber security threats are growing in sophistication and precision by the minute, and it's becoming increasingly frequent for targeted attacks to bypass the obligatory preventative mechanisms such as antivirus, firewalls and endpoint protection. Although more and more companies are planning security awareness training aimed at enabling their employees [...]

By |2023-12-06T14:31:17+00:00December 6, 2023|blog, Email Security, Malware Protection|0 Comments

New and more treacherous methods of ransomware attacks: intermittent encryption and how you can reliably protect yourself from it

The most frequently used gateway for cyber-attacks is still e-mail. That is where a never-ending technological battle between attackers and defenders is taking place. But despite big efforts by experts and ever greater investments by companies, the cyber criminals always seem to stay one step ahead. And they succeed [...]

By |2022-11-30T11:56:21+00:00November 30, 2022|blog, Email Security, Malware Protection|0 Comments
Go to Top