Analytics

Analytics news, information, and how-to advice

1 tracking hunting dogs horse
rx drugs thinkstock

behavior facial expressions emotions

You can steal my identity, but not my behavior

The compromise and misuse of identity is at the core of modern threats and data breaches. This has been documented for years and continues to escalate. As a result, we are rapidly approaching the end of life for password-based...

binoculars desert

Cybersecurity companies to watch

CBInsights created a list of startups that its metrics showed has early-to mid-stage high-momentum companies pioneering technology with the potential to transform cybersecurity. 

crystal ball business prediction data woman

Predictive analytics can stop ransomware dead in its tracks

Predictive analytics is a necessity because the malware of tomorrow is unknown and will surely evolve to our detriment. Find out how it finds traces of ransomware before the network goes down.

pollution smoke energy

How CISOs can overcome cybersecurity pollution

How to assess a cybersecurity vendor in simple, unbiased and efficient manner?

fbi dhs

Feds to battle cybersecurity with analytics

With more real-time information sharing, officials envision cyber defenses moving from 'vaccine' to 'immune system,' a big analytics project that could achieve something like automatic security.

video

Choosing technologies to drive digital transformation

Computerworld's Premier 100 tech leaders reveal the tech that is transforming their organizations -- including cloud, A.I., big data, analytics, and blockchain.

money

RSAC 2017: The end of easy cash bounties

Industry evolution eliminates chances of bug hunters to get easy cash for trivial vulnerabilities.

IOT Toothbrushes
video

Adding data to toothbrushes, MRI machines

From toothbrushes to high-end medical imaging equipment, Philips is offering its consumer and business customers access to more data through Internet of Things-type sensors.

choice key security

Better evaluations are the key for security leaders to get better tools

Mike D. Kail explains how security leaders can better evaluate security tools and avoid buying things they don’t need

ibm watson

IBM brings cognitive to SOCs with Watson for cybersecurity

After one year of research and the ingestion of more than one million cyber security documents, IBM has launched its cognitive computing service, Watson, for security operations centres.

measurements

Promoting efficiencies through security metrics

Creating metrics for a security program can be a challenge for many organizations. Troy Leach, CTO of Payment Card Industry Security Standards Council, discusses best practices for creating meaningful security metrics.

green illustration of man and cybersecurity icons

CIOs will thwart cybersecurity threats with behavioral analytics in 2017

Software that detects and alerts companies to anomalous behavior are on CIOs' purchase lists for the New Year, when spending on cybersecurity tools is expected to increase.

outlook 2017 5 tech primary

AAA security among 5 enterprise technologies that will shake things up in 2017

You think you have your hands full as an IT pro now? Just wait until blockchain, IoT, augmented and virtual reality, and these other technologies really start to take hold in 2017.

ibm watson

IBM amps-up Watson cybersecurity experiences

IBM Watson goes to the enterprise with 40 companies now adding smarts to the cognitive system.

human analytics

Behavior analytics tools for cybersecurity move into enterprises

Behavior analytics is one of the more recent buzzwords in enterprise cybersecurity, with more than 35 vendors competing for customers. One vendor, Darktrace, is using machine learning to detect network threats.

manometer measure pressure

Measuring what matters in cybersecurity

We have more data than we need and we actually need far less than we think. We could begin by simply making better bets, says Richard Seiersen. It's time to awaken the statistical ninja inside our security teams.

07 insider

Unwitting attacks from the inside

Employee involvement top causes of most expensive breaches

zero days poster

Shall we care about zero-day?

Gartner says that 99% of exploited vulnerabilities are publicly known. Does it mean we can ignore zero-days?

Load More
You Might Also Like