What does the GDPR and the "right to explanation" mean for AI?

Email not displaying correctly? View it in your browser.

CSO

CSO Salted Hash

Feb 09, 2018
Featured Image
INSIDER

11 tips for prioritizing security spending

How to keep things locked down when you can't afford new locks. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

What does the GDPR and the "right to explanation" mean for AI?
Get 3 Years of NordVPN Service for Just $2.75 Per Month
What is cryptojacking? How to prevent, detect, and recover from it
The two most important ways to defend against security threats
6 use cases for blockchain in security
Ask me anything: Insight Engines lets you talk your network into revealing threats

Video/Webcast: KnowBe4

Are You Protected Against the Weakest Link in Network Security?

The bad guys are just one gullible user click away from staging an all-out invasion. Watch this 2-minute video and learn how you can keep your users on their toes with security top of mind. Read More

Thumbnail Image

What does the GDPR and the "right to explanation" mean for AI?

Security teams increasingly rely on machine learning and artificial intelligence to protect assets. Will a requirement to explain how they make decisions make them less effective? Read More

Thumbnail Image
DealPost

Get 3 Years of NordVPN Service for Just $2.75 Per Month

Safeguard yourself against snoops, and access blocked content with this no-log VPN service. NordVPN is just $2.75 per month for 3 years, if you sign up right now. Read More

Thumbnail Image

What is cryptojacking? How to prevent, detect, and recover from it

Criminals are using ransomware-like tactics and poisoned websites to get your employees’ computers to mine cryptocurrencies. Here’s what you can do to stop it. Read More

Thumbnail Image

The two most important ways to defend against security threats

Patching and security training programs will thwart attacks more effectively than anything else. You're already doing them. Here's how to do them better. Read More

Thumbnail Image
INSIDER

6 use cases for blockchain in security

Blockchain has the potential to improve encryption and authentication, and that could be good news for IoT security and DDoS protection. Read More

Thumbnail Image
INSIDER

Ask me anything: Insight Engines lets you talk your network into revealing threats

Think of the Insight Engines tool as Google for network security, allowing natural language searches and returning honed information to answer each query. This comparison doesn't do the program justice, but is a good starting point for understanding how it works. Read More

White Paper: KnowBe4

Best Practices for Dealing with Phishing and Next-Gen Malware

Phishing and malware threats are skyrocketing. To combat these attacks, read this new Osterman Research white paper that gives you a list of high-priority actionable items, all related to IT security. Read More

CSO Insider

1. 10 old-school security principles that (still) rule
2. Top security certifications: Who they're for, what they cost, and which you need
3. 5 top machine learning use cases for security
4. What are the GDPR requirements?
5. How hackers crack passwords and why you can't stop them

Editor's Picks

1. Best security software: How cutting-edge tools tackle today's threats
2. Spectre and Meltdown explained: What they are, how they work, what's at risk
3. What is two-factor authentication (2FA)? How to enable it and why you should
4. The best antivirus? Kaspersky leads in latest tests, but that's only part of the story
5. What is CVE, its definition and purpose?
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Salted Hash as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright © 2018 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.