Third-wave AI has Proven More Effective than Traditional Cybersecurity Platforms and Methodologies

Unfortunately, the majority of cybersecurity solutions available today rely on outdated applications for AI. So-called first- and second-wave AI solutions don’t cut it, but few vendors have the technical capabilities and know-how to apply cutting edge, third-wave AI to their platforms ... Read More

Cybersecurity Spend for Data Retention and Analysis is Out of Control and Largely Unnecessary

Managing a relatively small, stable data store is one thing, but dynamic companies face immense challenges when those circumstances change. Data growth can become unwieldy to safeguard when it has to be carefully prepared through a series of time-consuming, manual processes before the security software can evaluate it ... Read More

Log Data is Not Effective as a Foundation for Prevention, Detection, Remediation or Analytics

In the imperfect, real world, where SOC teams actually live, the SIEM log-based approach is fundamentally flawed. In fact, it tends to add more challenge to the workday for SOC teams, not less ... Read More

Incremental Stacking of Correlative Analysis Platforms Will Ultimately Prove Ineffective and Costly

On the surface, an “incremental stacking” approach to correlative analysis platforms like SIEM, XDR and UEBA is logical. Organizations can overcome some of the inherent limitations present in their security solutions by adding a network traffic analysis (NTA), for example. Industry analysts have been touting this approach for some time ... Read More

Incremental Stacking of Correlative Analysis Platforms Will Ultimately Prove Ineffective and Costly

On the surface, an “incremental stacking” approach to correlative analysis platforms like SIEM, XDR and UEBA is logical. Organizations can overcome some of the inherent limitations present in their security solutions by adding a network traffic analysis (NTA), for example. Industry analysts have been touting this approach for some time ... Read More

A Modern SOC Should Not Be Entirely Dependent On Human Operators and Their Personal Experience

A modern SOC should not be entirely dependent on human operators and their personal experience. The issue has been a foundational problem with not only the methodologies used by SOCs for the past 15 to 20 years, but it should be questioned whether the problem is actually compounded by the ... Read More

A Modern SOC Should Not Be Entirely Dependent On Human Operators and Their Personal Experience

A modern SOC should not be entirely dependent on human operators and their personal experience. The issue has been a foundational problem with not only the methodologies used by SOCs for the past 15 to 20 years, but it should be questioned whether the problem is actually compounded by the ... Read More

How Self-Supervised AI Tackles Ambiguity in Network Security

Cybersecurity vendors promise the moon when it comes to AI. As the recent TechRepublic article, “Why cybersecurity tools fail when it comes to ambiguity,” makes clear, often, these promises fail short in real world network environments ... Read More

How Self-Supervised AI Tackles Ambiguity in Network Security

Cybersecurity vendors promise the moon when it comes to AI. As the recent TechRepublic article, “Why cybersecurity tools fail when it comes to ambiguity,” makes clear, often, these promises fail short in real world network environments ... Read More

The Fourth Industrial Revolution – AI, Quantum, and IoT Impacts on Cybersecurity

The next cybersecurity challenge lies with the advances in quantum computing that are set to revolutionize tech while simultaneously equipping threat actors with a new arsenal of cyberweapons ... Read More