HackDig : Dig high-quality web security articles for hacker

The Cognitive Security Glide Path

Over the past year, our industry has seen an explosion in artificial intelligence and cognitive solutions to assist with some of the most challenging cybersecurity problems. In some cases, cognitive solutions can increase analytical capability by 50 percent. With cognitive technology providing such high efficiencies for security teams, people often ask me wh
Publish At:2017-10-02 14:15 | Read:549 | Comments:0 | Tags:Cognitive Artificial Intelligence (AI) Cognitive Computing C

False Positives Are a True Negative: Using Machine Learning to Improve Accuracy

Machine learning has grown to be one of the most popular and powerful tools in the quest to secure systems. Some approaches to machine learning have yielded overly aggressive models that demonstrate remarkable predictive accuracy, yet give way to false positives. False positives create negative user experiences that prevent new protection from deploying. IT
Publish At:2017-09-29 11:52 | Read:870 | Comments:0 | Tags:Cognitive Security Intelligence & Analytics Artificial Intel

Frost & Sullivan Report Highlights Rise in Phishing Attacks

Have you ever unknowingly opened and responded to a phishing email or fallen victim to a phishing attack? A recent report by Frost & Sullivan titled “You’ve Been Phished, Again! Solution: Eliminate the Click-It Temptation,” discussed just how susceptible we all are to these fraudulent attacks and what can be done to avoid them. How Do P
Publish At:2017-09-12 13:50 | Read:690 | Comments:0 | Tags:Banking & Financial Services Fraud Protection Cognitive Secu

Weighing the Benefits and Challenges of Cognitive Adoption

The data mountain is growing at an unimaginable rate, and making sense of it requires a lot of effort and patience. Unorganized information, or dark data, is difficult to interpret, which results in valuable information passing right by marketers unnoticed and unused. Cognitive technology can help make sense of this data, better align it to business goals an
Publish At:2017-08-31 15:15 | Read:711 | Comments:0 | Tags:Cognitive Artificial Intelligence (AI) Cognitive Computing C

Why Machine Learning Is an Essential Tool In the CISO’s Arsenal

The chief information security officer (CISO) faces threats such as compromised users, negligent employees and malicious insiders. For this reason, one of the most important tools in the CISO’s arsenal is user behavior analytics (UBA), a solution that scans data from a security information and event management (SIEM) system, correlates it by user and b
Publish At:2017-08-31 15:15 | Read:1045 | Comments:0 | Tags:CISO Cognitive Security Intelligence & Analytics Artificial

Man With Machine: Harnessing the Potential of Artificial Intelligence

When we think of artificial intelligence (AI), we think of robots — machines that mimic human behavior or thought. This is partly the influence of comics, novels, movies and other pop culture tidbits, but the boundaries of AI have progressed far beyond this basic personification. Originally defined by Alan Turing, AI initially referred to any machine that co
Publish At:2017-08-28 12:55 | Read:860 | Comments:0 | Tags:Cognitive Artificial Intelligence (AI) Cognitive Computing C

Responsive Machine Learning: The Necessary Evolution of Endpoint Security

Machine learning is changing the way industries address critical challenges by using the combined power of automation, cloud-based scalability and specialized programming to surface unexpected relationships and insights. With thousands of new malicious programs emerging every day, security solutions that integrate responsive machine learning can identify an
Publish At:2017-07-18 13:40 | Read:870 | Comments:0 | Tags:Cognitive Endpoint Cognitive Computing Cognitive Security En

Connecting Fintech Security Perceptions to Reality

The fintech industry is changing due to both internal forces and external demands. Both financial institutions and their customers are wary of changes that can affect security and, therefore, the state of their money. Financial industry chief information security officers (CISOs) need to be aware of these key trends and understand how they affect their busi
Publish At:2017-07-18 13:40 | Read:948 | Comments:0 | Tags:Banking & Financial Services CISO Blockchain Chief Informati

Top Cybersecurity Trends for the First Half of 2017

Depending on how you look at it, security has thus far had another stellar year in terms of visibility across industry and society, criticality to business, and busyness for IT and security professionals. Still, we’re constantly behind the eight ball when it comes to visibility and control, the two pillars of security that no one seems to have mastere
Publish At:2017-07-17 19:15 | Read:821 | Comments:0 | Tags:CISO Best Practices Cybersecurity Machine Learning Malware S

Zero Packet Inspection

Introduction In this blogpost I describe the history of z9, our detection engine. I will show its performance over reference data sets commonly used in the machine learning community. I’ll then describe how we apply it to detect networks attacks without any type of packet inspection. Eventually, we encourage you to participate by helping us gather and
Publish At:2017-07-11 22:35 | Read:1694 | Comments:0 | Tags:0-Packet Android iOS Machine Learning Mobile Malware Mobile

New Threats? No Problem! Identify Emerging Cybercrime Trends Early to Fight Financial Fraud

Every year, cyberattacks become more sophisticated, new malware emerges and fraud losses rise. Have you ever looked at your banking information to see a transaction that you didn’t make? Have you ever checked your credit report to find cards you never signed up for or high balances you didn’t create? Unfortunately, financial fraud is an issue ma
Publish At:2017-06-27 02:05 | Read:1021 | Comments:0 | Tags:Fraud Protection Risk Management Bank Fraud Banking Security

Can AI and Machine Learning Help Fill the Cybersecurity Skills Gap?

Think about an industry that has had a huge labor problem for decades. Hiring managers can’t find enough skilled people, and it takes way too long to train someone to an effective level. With all of the advances in technology, why hasn’t there been a complete automation of procedures? The truth is that new technologies such as artificial intell
Publish At:2017-06-19 09:55 | Read:681 | Comments:0 | Tags:Cognitive Artificial Intelligence (AI) Cognitive Computing C

QRadar Advisor With Watson Makes Cybersecurity More Human

Because of the vast amount of data available and the fact that more is generated every day, the British scientist Thomas Young, who died in 1829, was known as “The Last Man Who Knew Everything.” Since that time, knowledge and available data has increased exponentially. The Man Who Knew Everything In 2010, former Google CEO Eric Schmidt noted that
Publish At:2017-04-21 16:20 | Read:1076 | Comments:0 | Tags:Cognitive Security Intelligence & Analytics Artificial Intel

Surfing the Tsunami of Threat Data With Cognitive Security

Given today’s booming cybercrime landscape, there is a general feeling among IT professionals that no organization is safe. In fact, it’s probably safe to assume that everyone is under almost continuous attack. A data breach can result in stolen passwords, compromised personal information or even physical consequences such as hotel patrons being
Publish At:2017-04-19 09:05 | Read:1025 | Comments:0 | Tags:Cognitive Security Intelligence & Analytics Cognitive Comput

Watson and Cybersecurity: Bringing AI to the Battle

“To function effectively in this knowledge economy, you need to read through trillions of data points. You basically need to go back to school every day to answer the questions that hit your desk. That is the challenge of the knowledge economy. And that is where I believe we can do something different in security with AI and cognitive.” — Marc va
Publish At:2017-03-31 09:20 | Read:1691 | Comments:0 | Tags:Cognitive Security Intelligence & Analytics Artificial Intel

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud