HackDig : Dig high-quality web security articles for hacker

The Cognitive Security Glide Path

Over the past year, our industry has seen an explosion in artificial intelligence and cognitive solutions to assist with some of the most challenging cybersecurity problems. In some cases, cognitive solutions can increase analytical capability by 50 percent. With cognitive technology providing such high efficiencies for security teams, people often ask me wh
Publish At:2017-10-02 14:15 | Read:2598 | Comments:0 | Tags:Cognitive Artificial Intelligence (AI) Cognitive Computing C

False Positives Are a True Negative: Using Machine Learning to Improve Accuracy

Machine learning has grown to be one of the most popular and powerful tools in the quest to secure systems. Some approaches to machine learning have yielded overly aggressive models that demonstrate remarkable predictive accuracy, yet give way to false positives. False positives create negative user experiences that prevent new protection from deploying. IT
Publish At:2017-09-29 11:52 | Read:2751 | Comments:0 | Tags:Cognitive Security Intelligence & Analytics Artificial Intel

Weighing the Benefits and Challenges of Cognitive Adoption

The data mountain is growing at an unimaginable rate, and making sense of it requires a lot of effort and patience. Unorganized information, or dark data, is difficult to interpret, which results in valuable information passing right by marketers unnoticed and unused. Cognitive technology can help make sense of this data, better align it to business goals an
Publish At:2017-08-31 15:15 | Read:2167 | Comments:0 | Tags:Cognitive Artificial Intelligence (AI) Cognitive Computing C

Why Machine Learning Is an Essential Tool In the CISO’s Arsenal

The chief information security officer (CISO) faces threats such as compromised users, negligent employees and malicious insiders. For this reason, one of the most important tools in the CISO’s arsenal is user behavior analytics (UBA), a solution that scans data from a security information and event management (SIEM) system, correlates it by user and b
Publish At:2017-08-31 15:15 | Read:2629 | Comments:0 | Tags:CISO Cognitive Security Intelligence & Analytics Artificial

Man With Machine: Harnessing the Potential of Artificial Intelligence

When we think of artificial intelligence (AI), we think of robots — machines that mimic human behavior or thought. This is partly the influence of comics, novels, movies and other pop culture tidbits, but the boundaries of AI have progressed far beyond this basic personification. Originally defined by Alan Turing, AI initially referred to any machine that co
Publish At:2017-08-28 12:55 | Read:2857 | Comments:0 | Tags:Cognitive Artificial Intelligence (AI) Cognitive Computing C

Responsive Machine Learning: The Necessary Evolution of Endpoint Security

Machine learning is changing the way industries address critical challenges by using the combined power of automation, cloud-based scalability and specialized programming to surface unexpected relationships and insights. With thousands of new malicious programs emerging every day, security solutions that integrate responsive machine learning can identify an
Publish At:2017-07-18 13:40 | Read:2697 | Comments:0 | Tags:Cognitive Endpoint Cognitive Computing Cognitive Security En

The Cybersecurity Skills Gap Is No Match for Cognitive Security

Picture this: You are the leader of a security operations center (SOC) and yet another major ransomware attack is making headlines. Within minutes of the news breaking, you receive questions about your company’s exposure to this ransomware. You’ve implemented your incident response plan and you’ve woken your team members from their beds.
Publish At:2017-07-07 19:55 | Read:2671 | Comments:0 | Tags:Cognitive Cognitive Computing Cognitive Security IBM Watson

Can AI and Machine Learning Help Fill the Cybersecurity Skills Gap?

Think about an industry that has had a huge labor problem for decades. Hiring managers can’t find enough skilled people, and it takes way too long to train someone to an effective level. With all of the advances in technology, why hasn’t there been a complete automation of procedures? The truth is that new technologies such as artificial intell
Publish At:2017-06-19 09:55 | Read:2335 | Comments:0 | Tags:Cognitive Artificial Intelligence (AI) Cognitive Computing C

Industry 4.0 Drives a New Era of Mainframe Security

During the World Economic Forum in Davos, Switzerland, last year, Industry 4.0 was the main topic of discussion. It was dubbed the fourth industrial revolution, a new technological vision for the entire IT world in which mainframe security plays a crucial role. In this world, the mainframe contains roughly 75 percent of enterprise data and 65 percent of act
Publish At:2017-05-31 16:50 | Read:3568 | Comments:0 | Tags:Mainframe Analytics Big Data Big Data Analytics Cognitive Co

The Road to 2020, Part III: Transforming Your Enterprise With Cognitive UEM

This is the final installment in a three-part series. Be sure to read part 1 for the more information on unified endpoint management (UEM) and part 2 for additional details surrounding the Internet of Things (IoT). Whether you read about it in a news article, saw it on a TV commercial or demoed it at a technology conference, you’ve probably had at leas
Publish At:2017-05-18 15:40 | Read:3548 | Comments:0 | Tags:Cognitive Mobile Security Artificial Intelligence (AI) Cogni

A Dream of Cognitive Security? How Watson Can Help Small and Midsized Businesses Save Money

The is the second article in a three-part series on how IBM Watson for Cyber Security can help analysts win the arms race against the increasingly sophisticated cybercrime landscape. Be sure to read part 1 for the full story. Many large enterprises with significant investment in cybersecurity are excited at the prospect of cognitive security. But what abou
Publish At:2017-04-25 12:21 | Read:2944 | Comments:0 | Tags:Cognitive Security Intelligence & Analytics Security Service

QRadar Advisor With Watson Makes Cybersecurity More Human

Because of the vast amount of data available and the fact that more is generated every day, the British scientist Thomas Young, who died in 1829, was known as “The Last Man Who Knew Everything.” Since that time, knowledge and available data has increased exponentially. The Man Who Knew Everything In 2010, former Google CEO Eric Schmidt noted that
Publish At:2017-04-21 16:20 | Read:3023 | Comments:0 | Tags:Cognitive Security Intelligence & Analytics Artificial Intel

Surfing the Tsunami of Threat Data With Cognitive Security

Given today’s booming cybercrime landscape, there is a general feeling among IT professionals that no organization is safe. In fact, it’s probably safe to assume that everyone is under almost continuous attack. A data breach can result in stolen passwords, compromised personal information or even physical consequences such as hotel patrons being
Publish At:2017-04-19 09:05 | Read:2884 | Comments:0 | Tags:Cognitive Security Intelligence & Analytics Cognitive Comput

Will Watson Save the Security World?

This is the first article in a three-part series on how IBM Watson for Cyber Security can help analysts win the arms race against the increasingly sophisticated cybercrime landscape. IBM’s latest and most glamorous offering in the security space is QRadar Advisor with Watson. This technology is designed to reduce the time taken to identify, classify an
Publish At:2017-04-17 01:45 | Read:2639 | Comments:0 | Tags:Cognitive Artificial Intelligence (AI) Cognitive Computing C

IoT: The Internet of Trouble

It might be surprising to note that the number of connected devices outgrew the world population back in 2008. By 2020, on average, each person on the planet will have about six devices. It’s fair to say that the Internet of Things (IoT) has already arrived, but what does this mean, and should you be concerned? Surfing the Tsunami of IoT Challenges Org
Publish At:2017-04-17 01:45 | Read:3321 | Comments:0 | Tags:Cognitive Network & Endpoint Cognitive Computing Cognitive S

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud