HackDig : Dig high-quality web security articles for hacker

The Cognitive Security Glide Path

Over the past year, our industry has seen an explosion in artificial intelligence and cognitive solutions to assist with some of the most challenging cybersecurity problems. In some cases, cognitive solutions can increase analytical capability by 50 percent. With cognitive technology providing such high efficiencies for security teams, people often ask me wh
Publish At:2017-10-02 14:15 | Read:140 | Comments:0 | Tags:Cognitive Artificial Intelligence (AI) Cognitive Computing C

False Positives Are a True Negative: Using Machine Learning to Improve Accuracy

Machine learning has grown to be one of the most popular and powerful tools in the quest to secure systems. Some approaches to machine learning have yielded overly aggressive models that demonstrate remarkable predictive accuracy, yet give way to false positives. False positives create negative user experiences that prevent new protection from deploying. IT
Publish At:2017-09-29 11:52 | Read:164 | Comments:0 | Tags:Cognitive Security Intelligence & Analytics Artificial Intel

Green Security Technology: The New Corporate Color?

From carbon-neutral clouds to net-zero data centers to completely renewable power, green technology is rapidly becoming a viable option for global corporations hoping to both improve long-term outlooks and align operations with changing consumer sentiment. Consider current projects by companies such as Salesforce, Apple and Toyota. According to Greentech Med
Publish At:2017-09-15 15:35 | Read:308 | Comments:0 | Tags:CISO Cloud Security Cognitive Artificial Intelligence (AI) C

From Suspicious Activity to Suspended Account in Less Than a Minute: Stopping Insider Threats With Automation

Co-authored by Lauren Horaist. You read the headlines and understand industry trends. There are plenty of horror stories to reference. Organizations have had their reputations destroyed and entire corporations have gone out of business due to insider attacks. How can you avoid being the next victim? First, you need to understand what insider threats really a
Publish At:2017-09-13 08:20 | Read:253 | Comments:0 | Tags:Cognitive Identity & Access Security Intelligence & Analytic

Seven Steps to Improve Your Security Operations and Response

It’s hard to escape the reality that every day, cyberthreats morph and expand, escalating the need to improve and tighten security operations and response practices. While it may feel overwhelming, there are ways to help level the playing field. Cognitive computing and machine learning are new technologies that can empower security practitioners to foc
Publish At:2017-09-05 09:35 | Read:250 | Comments:0 | Tags:CISO Cognitive Endpoint Incident Response Security Intellige

Analyze Attack Patterns to Make Your Environment Secure by Design

A great way to mitigate the effects of a cyber incident is to analyze attack patterns. This requires analysts to build a pattern up from a single security event, such as a command execution or malicious file download, into a collection of data that can help them trace and defend against an attack. To accomplish this level of analysis, security professionals
Publish At:2017-09-01 10:00 | Read:269 | Comments:0 | Tags:Cognitive Security Intelligence & Analytics Cognitive Securi

Weighing the Benefits and Challenges of Cognitive Adoption

The data mountain is growing at an unimaginable rate, and making sense of it requires a lot of effort and patience. Unorganized information, or dark data, is difficult to interpret, which results in valuable information passing right by marketers unnoticed and unused. Cognitive technology can help make sense of this data, better align it to business goals an
Publish At:2017-08-31 15:15 | Read:309 | Comments:0 | Tags:Cognitive Artificial Intelligence (AI) Cognitive Computing C

Why Machine Learning Is an Essential Tool In the CISO’s Arsenal

The chief information security officer (CISO) faces threats such as compromised users, negligent employees and malicious insiders. For this reason, one of the most important tools in the CISO’s arsenal is user behavior analytics (UBA), a solution that scans data from a security information and event management (SIEM) system, correlates it by user and b
Publish At:2017-08-31 15:15 | Read:333 | Comments:0 | Tags:CISO Cognitive Security Intelligence & Analytics Artificial

Man With Machine: Harnessing the Potential of Artificial Intelligence

When we think of artificial intelligence (AI), we think of robots — machines that mimic human behavior or thought. This is partly the influence of comics, novels, movies and other pop culture tidbits, but the boundaries of AI have progressed far beyond this basic personification. Originally defined by Alan Turing, AI initially referred to any machine that co
Publish At:2017-08-28 12:55 | Read:238 | Comments:0 | Tags:Cognitive Artificial Intelligence (AI) Cognitive Computing C

Not Enough Hours in the Day? Respond Faster With Automated, Intelligent Security Analytics

When you work in the cybersecurity industry, the skills shortage isn’t just a news topic — it’s a serious business challenge. How can security teams defend against cybercriminals and their ever-evolving attack techniques when they’re significantly outnumbered? How can they successfully dig through millions of events across dozens of point s
Publish At:2017-08-16 09:00 | Read:228 | Comments:0 | Tags:Cognitive Security Intelligence & Analytics Analytics Cognit

Elementary, My Dear Watson: Identifying and Understanding Malware With Cognitive Security

Malware is a major cause of cyberattacks today, with fraudsters using targeted spear phishing emails and social engineering to distribute malicious files to unsuspecting employees at various organizations. To make matters worse, malware has evolved to avoid detection by traditional security tools and systems. Take the CozyDuke malware campaign as an example.
Publish At:2017-08-14 16:57 | Read:235 | Comments:0 | Tags:Cognitive Security Intelligence & Analytics Cognitive Securi

Multipronged IoT Security to Help Realize the Value of IoT Solutions

The Internet of Things (IoT) is an exciting and innovative technology that can help businesses discover new growth areas and income streams. With all this innovation to differentiate in industry verticals and challenge traditional operating models, it’s easy to overlook IoT security, both in terms of its uniqueness and its importance. What Is Different
Publish At:2017-07-24 17:25 | Read:319 | Comments:0 | Tags:Application Security CISO Cognitive Industries X-Force Resea

Responsive Machine Learning: The Necessary Evolution of Endpoint Security

Machine learning is changing the way industries address critical challenges by using the combined power of automation, cloud-based scalability and specialized programming to surface unexpected relationships and insights. With thousands of new malicious programs emerging every day, security solutions that integrate responsive machine learning can identify an
Publish At:2017-07-18 13:40 | Read:372 | Comments:0 | Tags:Cognitive Endpoint Cognitive Computing Cognitive Security En

The Cybersecurity Skills Gap Is No Match for Cognitive Security

Picture this: You are the leader of a security operations center (SOC) and yet another major ransomware attack is making headlines. Within minutes of the news breaking, you receive questions about your company’s exposure to this ransomware. You’ve implemented your incident response plan and you’ve woken your team members from their beds.
Publish At:2017-07-07 19:55 | Read:417 | Comments:0 | Tags:Cognitive Cognitive Computing Cognitive Security IBM Watson

Can AI and Machine Learning Help Fill the Cybersecurity Skills Gap?

Think about an industry that has had a huge labor problem for decades. Hiring managers can’t find enough skilled people, and it takes way too long to train someone to an effective level. With all of the advances in technology, why hasn’t there been a complete automation of procedures? The truth is that new technologies such as artificial intell
Publish At:2017-06-19 09:55 | Read:265 | Comments:0 | Tags:Cognitive Artificial Intelligence (AI) Cognitive Computing C

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud