Defending Your Future with Machine Learning

In a new report by the Security for Business Innovation Council (SBIC), leading global CISOs identify machine learning as an imperative to stay ahead of the growing volume and complexity of cybersecurity ...
Ransomware Strains: The Stealthy Cyberthreat

Ryuk Ransomware That Hit U.S. Newspapers Not State-Sponsored

According to reports from several cybersecurity firms, the Ryuk ransomware that reportedly recently disrupted operations at several U.S.-based newspapers is run by cybercriminals, not state-sponsored actors. Some online sources have attributed the ...
Security Boulevard
Is NTA Another Kind of IDS

Is NTA Just Another Kind of IDS?

Earlier last year, Anton Chuvakin of Gartner posted a question I’ve spent the past few years focused on. Actually, I’ve focused on it since working in the Network Security Wizards office on ...
Security Boulevard

Detect Merchant Fraud with “Outlier Categorical Model”

It can’t be over yet! Or can it? Our final model in the #MachineLearningMadness blog series is up next and it’s a whopper! Gurucul Machine Learning Model: Outlier Categorical Model How does ...
You Won’t Believe What Obama Says In This Video! 😉

2019 Predictions for AI | Avast

In our first segment, we discussed IoT in 2019. In our second segment, we focused on mobile threats in the new year. And now, in the final segment of our three-part series ...
AI in Media: Just how smart is it?

#OTTuesday: AI Destined for Big Role in Entertainment

After years of hype, AI is finally making headway in industries like manufacturing, medicine and transportation -- and it's beginning to play a supporting role in media & entertainment. AkamaiTV's Paul Jackson ...

Protect Classified Information with “Identity Classification”

Gurucul offers machine learning models to address many cyber security scenarios. Up next is… Gurucul Machine Learning Model: Identity Classification How does the Identity Classification machine learning model work, what does it ...
What is Physical Security?

What is Physical Security?

What’s Physical Security? Ok, I’m just going to say it, I’m a physical security guy in a IT security world. So why physical security for IT? Easy, you can not have a ...
Software Security Predictions: What to Watch for in 2019

Software Security Predictions: What to Watch for in 2019

Security breaches regularly made headlines this year, while advancements in DevOps, application security testing tools, artificial intelligence, machine learning, cloud adoption, and the Internet of Things race forward. 2019 promises to be ...
‘How,’ not ‘Who,’ of Cyberattacks

Why We Should Focus on ‘How,’ not ‘Who,’ of Cyberattacks

Organizations often don’t understand what they need to be protecting themselves from when it comes to costly cyberattacks. The threat landscape is becoming ever more evolved and it’s now rare for a ...
Security Boulevard
Loading...