HackDig : Dig high-quality web security articles for hacker

Man With Machine: Harnessing the Potential of Artificial Intelligence

When we think of artificial intelligence (AI), we think of robots — machines that mimic human behavior or thought. This is partly the influence of comics, novels, movies and other pop culture tidbits, but the boundaries of AI have progressed far beyond this basic personification. Originally defined by Alan Turing, AI initially referred to any machine that co
Publish At:2017-08-28 12:55 | Read:2840 | Comments:0 | Tags:Cognitive Artificial Intelligence (AI) Cognitive Computing C

Security Monitoring and Analytics: Moving Beyond the SIEM

This is the final installment in a three-part series. Be sure to read Part 1 and Part 2 for more information. Improving integration, visibility and analytics with a platform approach to security information and event management (SIEM) is the means to the business value of security, compliance and operational efficiency. Security teams are operating in an
Publish At:2017-08-21 15:05 | Read:2492 | Comments:0 | Tags:Security Intelligence & Analytics Security Analytics Securit

Not Enough Hours in the Day? Respond Faster With Automated, Intelligent Security Analytics

When you work in the cybersecurity industry, the skills shortage isn’t just a news topic — it’s a serious business challenge. How can security teams defend against cybercriminals and their ever-evolving attack techniques when they’re significantly outnumbered? How can they successfully dig through millions of events across dozens of point s
Publish At:2017-08-16 09:00 | Read:2253 | Comments:0 | Tags:Cognitive Security Intelligence & Analytics Analytics Cognit

Security Monitoring and Analytics: Faster Time to Action

This is the second installment in a three-part series. Be sure to read the first installment for more information. In highlighting the difference between tools and platforms for security monitoring and analytics initiatives, one of the biggest benefits of a platform approach is that it lets your security analysts be analysts instead of researchers. Download
Publish At:2017-08-14 16:56 | Read:2122 | Comments:0 | Tags:Security Intelligence & Analytics IBM QRadar Security Intell

Security Monitoring and Analytics: From Tools to Platforms

Janus, the ancient Roman god of beginnings and endings — from which we get the name for January, the first month of the calendar year — was depicted as having two faces: one looking backward and one looking forward. In the context of time, it can be argued that security monitoring and analytics initiatives are the Janus of contemporary cybersecurity. LetR
Publish At:2017-08-07 21:55 | Read:2346 | Comments:0 | Tags:Security Intelligence & Analytics Incident Forensics Securit

Industry 4.0 Drives a New Era of Mainframe Security

During the World Economic Forum in Davos, Switzerland, last year, Industry 4.0 was the main topic of discussion. It was dubbed the fourth industrial revolution, a new technological vision for the entire IT world in which mainframe security plays a crucial role. In this world, the mainframe contains roughly 75 percent of enterprise data and 65 percent of act
Publish At:2017-05-31 16:50 | Read:3568 | Comments:0 | Tags:Mainframe Analytics Big Data Big Data Analytics Cognitive Co

Personalizing Energy Security With Robust Analytics

I’m both fascinated and excited by the rise of the prosumer — a proactive energy consumer who uses smart devices to manage consumption, add renewables to the mix and look for personalized services from his or her utility — especially within the context of energy security. Recent security concerns surrounding WannaCry ransomware are all the more relev
Publish At:2017-05-26 08:00 | Read:2967 | Comments:0 | Tags:Cognitive Energy & Utility Security Intelligence & Analytics

How IoT Data Analytics Will Give Businesses a Competitive Edge

According to McKinsey & Company, the potential economic impact of the IoT could reach $11 trillion per year in 2025, which is equivalent to around 11 percent of the world economy. Making that a reality will depend on the widespread use of Internet of Things (IoT) data analytics. Security analysts must ensure that devices are not just managed and monito
Publish At:2017-04-25 12:21 | Read:3666 | Comments:0 | Tags:Data Protection Endpoint Industries Analytics Big Data Big D

UEBA: Canary in a Coal Mine

As a chief information security officer (CISO), how do you detect a network attack, breach or a data loss scenario? For years, security teams have been using a variety of tools to examine what’s going on in their networks. Collecting and reviewing log data provides one perspective, netflow data analysis offers another, and packet transfer inspection ge
Publish At:2017-04-18 14:40 | Read:2483 | Comments:0 | Tags:Security Intelligence & Analytics Analytics Behavioral Analy

Intelligent Code Analytics: Increasing Application Security Testing Coverage With Cognitive Computing

In a previous post, we examined how cognitive computing can greatly reduce the false positives and noise that are inherent in static application security testing (SAST). We also showed how the reduction of false positives can be done without impacting language coverage — i.e., decreasing the rule set — which is the approach of most application security offer
Publish At:2017-03-20 15:15 | Read:2841 | Comments:0 | Tags:Application Security Cognitive Analytics Application Securit

QRadar Waves From the Leader Position in the Forrester 2017 Security Analytics Wave

Co-authored by Nicole Trager. Forrester just published its first ever Security Analytics Wave. IBM Security is proud to hold a top right position, with the highest scores in solution strength and vision of all the evaluated products. Forrester developed and applied a 36-criteria evaluation of security analytics (SA) providers and, as a result, identified the
Publish At:2017-03-14 11:25 | Read:2376 | Comments:0 | Tags:Cognitive Risk Management Security Intelligence & Analytics

RSA Wrap-Up: Top Stories From the 2017 RSA Conference

I think it’s safe to say that we’ve all learned, in some way or another, that talk is cheap. From an early age, and especially into adulthood, we’re presented with situations where we feel like we’re being sold something that benefits the seller more than it does us. This fundamental human challenge is front and center in the field of
Publish At:2017-02-22 02:00 | Read:2466 | Comments:0 | Tags:CISO Education Internet of Things (IoT) IoT Security Profess

Flying With the Wind: Reduce Drag on Your Data Protection Program With Automation and Visualization

People are at the heart of data protection programs. We all rely on their expertise to manage the systems, advise us on database hardening, interpret the incoming monitoring data and help the organization prepare for compliance audits. These tasks continue to challenge organizations that don’t have enough skilled people to manage them, all in the face
Publish At:2016-12-13 18:40 | Read:3613 | Comments:0 | Tags:Data Protection Analytics Automation Data Security General D

The Power of Network Insights: Nowhere for Threats to Hide

Picture this: You’re all set to go and have a big day ahead of you, but you can’t find the car keys. Frustrating, right? So is trying to find phishing attacks, lateral movement, embedded malware and advanced threats buried deep within normal traffic as they traverse your network. It’s hard to find what you can’t see. Network Insights
Publish At:2016-12-06 01:50 | Read:2966 | Comments:0 | Tags:Network & Endpoint Security Intelligence & Analytics IBM Sec

Big Data Solutions Make Big Targets

Big data has become a critical business tool and a transformative force for enterprises across multiple industries and geographies. Vast amounts of data are now organized, available and ready to be analyzed, leading to advanced tactics and strategies that were previously impossible. But prior to adopting a big data and analytics solution, business leaders sh
Publish At:2016-11-19 23:00 | Read:2975 | Comments:0 | Tags:Data Protection Analytics Big Data Big Data Analytics Big Da

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud