Goto

Collaborating Authors

Artificial Intelligence (AI) and Security: A Match Made in the SOC

#artificialintelligence

Change is constant in cybersecurity -- continual, rapid, dynamic change. It's impossible to maintain an effective defensive posture without constantly evolving. Security measures that worked in the past will not be effective today, and today's security controls will not be effective tomorrow. Many factors contribute to this rapid pace of change. Attacks are on the rise, and they are getting more advanced, persistent and stealthy each day, with some attackers even leveraging artificial intelligence (AI) to power their campaigns.


What Is AI and How Can It Improve an Organization's Security Posture?

#artificialintelligence

In the past few years, there's been a lot of buzz around artificial intelligence (AI) in cybersecurity. Can AI really help businesses improve their security posture? How can we determine which solutions actually use AI versus which ones make hyped-up claims? For solutions that can help, how do they help? Obtaining clarity around this subject will help us understand the areas in which AI can help and what value it can add, which will, in turn, help us make more informed decisions.


Cybersecurity: How to devise a winning strategy

ZDNet

In 2017, as in previous years, cybersecurity incidents made the news on a regular basis: Equifax, Verizon, Shadow Brokers, WannaCry, NotPetya, Bad Rabbit, Uber (a covered-up 2016 hack, admitted in 2017)...the list goes on. Already in 2018 we've seen the Meltdown/Spectre CPU vulnerabilities and a huge row over the governance and usage of Facebook data. Beneath these headlining cyber-incidents is a continuous background level of activity that is the inevitable result of organisations failing to monitor and protect their networks, and of users neglecting basic security hygiene. This ebook, based on the latest ZDNet/TechRepublic special feature, offers a detailed look at how to build risk management policies to protect your critical digital assets. How should businesses respond to the clear, present and ever-evolving threat of cyber-attack?


Cybersecurity: How to devise a winning strategy ZDNet

@machinelearnbot

In 2017, as in previous years, cybersecurity incidents made the news on a regular basis: Equifax, Verizon, Shadow Brokers, WannaCry, NotPetya, Bad Rabbit, Uber (a covered-up 2016 hack, admitted in 2017)...the list goes on. Already in 2018 we've seen the Meltdown/Spectre CPU vulnerabilities and a huge row over the governance and usage of Facebook data. Beneath these headlining cyber-incidents is a continuous background level of activity that is the inevitable result of organisations failing to monitor and protect their networks, and of users neglecting basic security hygiene. This ebook, based on the latest ZDNet/TechRepublic special feature, offers a detailed look at how to build risk management policies to protect your critical digital assets. How should businesses respond to the clear, present and ever-evolving threat of cyber-attack?


Building a network of trust: Don't let partners be your weakest link in cybersecurity

ZDNet

As technology and its implementation continue to grow in scale and complexity, organizations increasingly look to third-party vendors and partners to help accomplish their goals. In short, with the modern extended enterprise, "there's a lot more reliance on outsiders," said 451 Research security analyst Garrett Bekker. Vendors and partners can be useful in helping enterprises take full advantage of emerging tech tools; however, the extent to which businesses are bringing them into their environment can cause some problems in managing the organization. And this often goes beyond working with a handful of partners -- one large financial institution in New York once had around 20,000 external vendors that it dealt with, Bekker said. In addition to complexity of management, vendors also bring new vulnerabilities into an organization.