Artificial Intelligence August 31, 2017 Why Machine Learning Is an Essential Tool In the CISO’s Arsenal 4 min read - To protect their networks from malicious insiders, user negligence and other threats, CISOs need advanced machine learning capabilities such as UBA.
Intelligence & Analytics August 24, 2017 Using Phishing Intelligence to Reel In Advanced Threats and Protect Corporate Networks 3 min read - By integrating phishing intelligence with an SIEM solution, security analysts can proactively monitor APTs and manage risks related to phishing attacks.
Intelligence & Analytics August 21, 2017 Security Monitoring and Analytics: Moving Beyond the SIEM 2 min read - A platform approach to security monitoring empowers analysts to take their SIEM to the next level with advanced threat detection and response capabilities.
Fraud Protection August 17, 2017 Protecting Against Spam and Phishing Attacks With a Layered Approach to Email Security 3 min read - To protect their users from spam and phishing attacks, security professionals should adopt a basic, layered approach to email security.
Intelligence & Analytics August 16, 2017 Not Enough Hours in the Day? Respond Faster With Automated, Intelligent Security Analytics 3 min read - An automated security analytics platform can help understaffed security teams sift through threat data more efficiently and focus on more critical tasks.
Cloud Security August 15, 2017 Best Practices for Developing and Securing a Microservices Architecture 2 min read - When installing a microservices architecture, SecDevOps teams must understand the threat vectors and how they affect the company's compliance stature.
Artificial Intelligence August 14, 2017 Elementary, My Dear Watson: Identifying and Understanding Malware With Cognitive Security 3 min read - Cognitive security solutions such as IBM Watson for Cyber Security help analysts process overwhelming amounts of threat data during incident investigations
Intelligence & Analytics August 11, 2017 Advanced Approaches to ATM Network Protection 3 min read - Effective ATM network protection requires a combination of basic and advanced approaches and a strong SIEM solution to monitor anomalous activity.
Threat Hunting August 7, 2017 Threat Hunting Services Are Now a Basic Necessity 4 min read - EDR solutions enable threat hunting teams to fine-tune behavioral detection rules and determine the techniques by which malware spreads through a network.
July 19, 2017 Wimbledon 2017: Manicured Lawns, Ivy-Covered Buildings, Tennis Whites and Cyberattacks 3 min read - IBM's Watson for Cyber Security assisted in protecting the pinnacle of tennis achievement, Wimbledon, from cyberattacks.