Mastering Machine Learning for Security Professionals: A Discussion

Mastering Machine Learning for Security Professionals: A Discussion

| | machine learning
Machine learning is well on its way to becoming the backbone of cybersecurity, as attackers increasingly discover new and more damaging ways to infiltrate networks. As a result, companies that don’t include ...
Machine Learning Algorithms for Zero Time to Mitigation

Machine Learning Algorithms for Zero Time to Mitigation

DDoS attacks are growing in complexity and volume and represent a major threat to any organization. Service providers and enterprises require expertise and knowledge to successfully deal with these threats. While large ...
Julie Conroy: Machine Learning and AI for Bank Security

4 Essential Things to Look for in a Fraud Detection Solution

Finding the best fraud detection and prevention solution for your organization can be challenging. Requirements from internal stakeholders and vendor fact sheets can give an overwhelming impression that your solution needs to ...
Levenshtein distance example

Clustering App Attacks with Machine Learning (Part 2): Calculating Distance

In our previous post in this series we discussed our motivation to cluster attacks on apps, the data we used and how we enriched it by extracting more meaningful features out of ...
Next-gen security with Windows Defender Antivirus

Machine learning vs. social engineering

Machine learning is a key driver in the constant evolution of security technologies at Microsoft. Machine learning allows Microsoft 365 to scale next-gen protection capabilities and enhance cloud-based, real-time blocking of new ...
CTO Chat: Making Sense of Tomorrow's Cybersecurity Trends

Making Sense of Tomorrow?s Cybersecurity Trends

RSA and Secureworks Chief Technology Officers, Dr. Zulfikar Ramzan and Jon Ramsey, discuss next-gen technologies and how taking a risk-based approach is critical as businesses face an evolving threat landscape ...
parts of a HTTP request

Clustering App Attacks with Machine Learning Part 1: A Walk Outside the Lab

A lot of research has been done on clustering attacks of different types using machine learning algorithms with high rates of success. Much of it from the comfort of a research lab, ...
Reverse Engineering the Analyst: Building Machine Learning Models for
the SOC

Reverse Engineering the Analyst: Building Machine Learning Models for the SOC

Many cyber incidents can be traced back to an original alert that was either missed or ignored by the Security Operations Center (SOC) or Incident Response (IR) team. While most analysts and ...
Fortinet Adds Machine Learning Algorithms to WAF

Fortinet Adds Machine Learning Algorithms to WAF

Fortinet today at the Gartner Security & Risk Management Summit 2018 announced it has infused machine learning algorithms and user-behavioral analytics in its web application firewall to identify nearly 100 percent of ...
Security Boulevard

Machine Learning Might Just Save Your Business from a Breach

Companies still struggle with ransomware, phishing, data breaches and other attacks that bypass their security and affect their budgets. Enterprises know they are in dire need of technology that will safeguard their ...
Loading...