Tendencias TI para el 2021: así será la nueva normalidad

Tendencias TI para el 2021: así será la nueva normalidad

  El 2020 en definitiva obligó a organizaciones a dar un giro de 180 grados a la forma en que estaban establecidas las rutinas de trabajo y reafirmó lo fundamental que es ...

Moving from Threat Hunting to Threat Catching

The goal of a Threat Hunter is to find an attacker in the middle of an attack before they can cause damage. This entails hunting through thousands of requests trying to pick ...
FireEye

FireEye Acquires Respond Software to Advance Cybersecurity AI

FireEye Inc., a provider of managed security services augmented by machine learning algorithms, has acquired Respond Software, a provider of a platform that automates security incident investigations, for $186 million. Peter Bailey, ...
Security Boulevard
5 padrões de comportamento do usuário que devemos prestar atenção em um espaço de trabalho descentralizado

5 padrões de comportamento do usuário que devemos prestar atenção em um espaço de trabalho descentralizado

Problema: Se você possui milhares de funcionários espalhados por vários de lugares, como pode manter a rede da sua organização segura? Solução: Você deve monitorar seus funcionários onde quer que estejam e desenvolver uma ...
Efficient auditing with machine learning and Slither-simil

Efficient audits with machine learning and Slither-simil

by Sina Pilehchiha, Concordia University Trail of Bits has manually curated a wealth of data—years of security assessment reports—and now we’re exploring how to use this data to make the smart contract ...

Split-Second Phantom Images Fool Autopilots

Researchers are tricking autopilots by inserting split-second images into roadside billboards. Researchers at Israel’s Ben Gurion University of the Negev … previously revealed that they could use split-second light projections on roads ...
HashiCorp

HashiCorp Launches Open Source Identity Framework

HashiCorp, at its HashiConf Digital conference today, announced an open source Boundary project that will enable users to remotely access systems regardless of location based on their specific identity. At the same ...
Security Boulevard
OpenMined Privacy Conference - Day 1 - Part 2 Livestream

PrivacyRaven Has Left the Nest

By Suha S. Hussain, Georgia Tech If you work on deep learning systems, check out our new tool, PrivacyRaven—it’s a Python library that equips engineers and researchers with a comprehensive testing suite ...

Strategies for Insider Threat Mitigation

In Part II of this blog series, we examine strategies for insider threat risk mitigation including key tenants of data visibility and advanced analytics to provide organizations a road map for addressing ...

Strategies for Insider Threat Mitigation

In Part II of this blog series, we examine strategies for insider threat risk mitigation including key tenants of data visibility and advanced analytics to provide organizations a road map for addressing ...