SIEM Alternatives? What Are They? Do They Exist?

As we are preparing for a project to update our famed SIEM and SOC guidance documents, let’s have a quick discussion of so-called “SIEM alternatives.” If you recall my funny post “Is ...
The Kill Chain Model

The Kill Chain Model Works When Analysts See the Full Picture

Just about every cybersecurity professional is familiar with the cyber kill chain, a set of steps bad actors typically go through with the end goal of stealing valuable data. Reconnaissance. Weaponization. Delivery ...
Security Boulevard
Levenshtein distance example

Clustering App Attacks with Machine Learning (Part 2): Calculating Distance

In our previous post in this series we discussed our motivation to cluster attacks on apps, the data we used and how we enriched it by extracting more meaningful features out of ...
Artificial Intelligence, The Facial Recognition Debacle

Artificial Intelligence, The Facial Recognition Debacle

via Ben Coxworth, writing at NewAtlas, comes a fascinating discussion of an AI duel, of sorts. Squarely ensconced in the facial recognition arena, this is a story you won't want to miss ...
Next-gen security with Windows Defender Antivirus

Machine learning vs. social engineering

Machine learning is a key driver in the constant evolution of security technologies at Microsoft. Machine learning allows Microsoft 365 to scale next-gen protection capabilities and enhance cloud-based, real-time blocking of new ...
CTO Chat: Making Sense of Tomorrow's Cybersecurity Trends

Making Sense of Tomorrow?s Cybersecurity Trends

RSA and Secureworks Chief Technology Officers, Dr. Zulfikar Ramzan and Jon Ramsey, discuss next-gen technologies and how taking a risk-based approach is critical as businesses face an evolving threat landscape ...
parts of a HTTP request

Clustering App Attacks with Machine Learning Part 1: A Walk Outside the Lab

A lot of research has been done on clustering attacks of different types using machine learning algorithms with high rates of success. Much of it from the comfort of a research lab, ...
Fortinet Adds Machine Learning Algorithms to WAF

Fortinet Adds Machine Learning Algorithms to WAF

Fortinet today at the Gartner Security & Risk Management Summit 2018 announced it has infused machine learning algorithms and user-behavioral analytics in its web application firewall to identify nearly 100 percent of ...
Security Boulevard

What Are My Options? Session Encryption Protocols Looking Forward

TLSv1.3 is a game changer for some enterprises and data centers, what if I can?t switch to end-to-end and need a transition phase or alternate solution? This provides some options as well ...
They Are Looking At WHAT? Service Provider Monitoring

They Are Looking At WHAT? Service Provider Monitoring

At the start of an adoption curve there is much apprehension. This is true of TLSv1.3 and those managing enterprise networks and data centers. The IETF working group spent much time listening ...
Loading...