Security Analytics

Analytics and Intelligence

Researchers Use Machine Learning, Cybersecurity Practices to Secure US Power Grid

/
In 2015, Russian hackers shut down Ukraine’s electrical grid after infecting the infrastructure with malware. It was only a matter of time until they would target the US power system. As of ...
Outsourcing Cybersecurity to Foreign-Based Firms

The Danger in Outsourcing Cybersecurity to Foreign-Based Firms

/
Sending cybersecurity work offshore isn’t just a bad idea for individual organizations; it can be a security issue. Facing a severe shortage of qualified cybersecurity workers—the InfoSec unemployment rate is expected to ...

Securing financial data of the future: behavioral biometrics explained

/
Sophisticated social engineering. Fileless malware. Specialized Trojans. These are the threats that keep the financial sector on its toes—making way for a new mode of authentication called behavioral biometrics. And its primary ...
Joscha Bach, Ph.D., 'The Lebowski Theorem of Machine Superintelligence'

Joscha Bach, Ph.D., ‘The Lebowski Theorem of Machine Superintelligence’

/
via Jason Kottke, comes a Lebowski Cogitation with sterling credentials, in which, the Dude wades in with his take on machine learning (in reality {if you like that sort of thing} via ...
Security Patches Move Faster

Security Patches: Move Faster to Keep Up With the Bad Guys

/
You’re tired of hearing it. Most security pundits are tired of saying it. Applying and testing security patches with alacrity is one of the keys to avoiding data breaches. And it looks ...

The DOD AI Mineshaft Gap

/
Interestingly written reportage - crafted by Matt Stroud (Matt is a reporter employed by The Center for Public Integrity) for The Verge, divulges little of the loathing of AI at the United ...
Predictably Evil

Predictably Evil

/
A common criticism of computer security products is that they can only protect against known threats. When new attacks are detected and analysed security companies produce updates based on this new knowledge ...

How RSA?s Acquisition of Fortscale Acts as a Force Multiplier for the SOC and IAM Teams

For years, the industry has thought of the SOC and IAM as separate teams and capabilities, but they?re really two sides of the same coin. RSA?s acquisition of Fortscale enables customers to ...

Intelligent SOC Series: The Role of Your SOC in Managing Digital Risk

/
No one inside your enterprise knows better than the analysts working inside your security operations center (SOC) the threats your organization faces. For this reason, your SOC is poised to serve as ...
Loading...