alerts machine identity management insider threats security phishing Cybersecurity Threats on the Rise

Anomaly Detection Using Alert Groups and Bayesian Networks

Metrics or alerts or dashboards? In the Kubernetes observability market, many solution companies are competing fiercely with commercial products and open source-based solutions for dominance. In addition, companies that want to introduce ...
Security Boulevard

Human vs. Artificial Intelligence in Autonomous Systems

A common goal, as we see in many articles on AI (artificial intelligence) and ML (machine learning), is to make AI/ML systems more like humans. Some claim that humans are much better ...
What is Machine Learning ? A.I., Models, Algorithm and Learning Explained

What is Machine Learning ? A.I., Models, Algorithm and Learning Explained

What is Machine Learning? Machine learning has been referred to as “the science of getting computers to act without being explicitly programmed.” What is machine… The post What is Machine Learning ? ...
edge Using AI and ML to Win Against Fraud

Securing AI and ML at the Edge

| | AI, AI/ML, edge, edge computing, ML
Organizations are increasingly turning to AI and ML to enhance their cybersecurity operations. Having algorithms to do some of the most tedious but necessary tasks has taken a lot of stress off ...
Security Boulevard
deep fakes social engineering What Does Fake News Have to Do With Cybersecurity

AI-Fueled Deep Fakes Signal New Era of Cybercrime

Information manipulation has been around since Chinese general Sun Tzu wrote “The Art of War” in 550 BC. The Russians routinely use disinformation tactics to destabilize democracies. Events like the 2020 U.S ...
Security Boulevard

Cybersecurity and AI/ML Biases

Cyberattackers and cyberdefenders appear to be utilizing AI (artificial intelligence) and ML (machine learning) to a rapidly increasing degree, if you are to believe the press, vendors’ claims and blogs. So, it ...
Cybereason Enhances XDR Offering with empow Acquisition

Cybereason Enhances XDR Offering with empow Acquisition

Today’s targeted attacks increasingly take aim at multiple devices and users simultaneously while employing a range of tactics, techniques and procedures (TTPs). To further complicate the work of the defender, traditional security ...

Don’t Count on Cybersecurity Data

It is a common theme of mine, but one which bears repeating. We collect and disseminate all manner of data, but not so much of data which count. In an article by ...

Cybersecurity Lessons from the Pandemic: Getting Lucky

Antonio Regalado’s February 5, 2021 article in the MIT Technology Review, “The next act for messenger RNA could be bigger than covid vaccines,” which is available at The next act for messenger ...
Data Loss Prevention: Artificial Intelligence vs. Human Insight

Data Loss Prevention: Artificial Intelligence vs. Human Insight

The cybersecurity landscape continues to evolve as cybercriminals become ever more sophisticated, and digital security tools accelerate to mitigate the risks as much as possible. 2020 presented even more opportunities for hackers ...