Analytics

Analytics news, information, and how-to advice

data breach predictions
artificial intelligence / machine learning / network

mobile tablet statistics analytics stocks

Why we need more shades of gray

A model-driven security analytics system that is thoughtfully designed and built would generate virtually no black-and-white answers. And that's a good thing, because the security challenges we face now and in the future will rely on...

1 tracking hunting dogs horse

The Knights Fork: Hunting the hunter

The true ROI of cybersecurity investment is the delta in dwell time. There is direct correlation between cybersecurity investment and brand protection. Hunting gives an organization the opportunity to turn the tables on an adversary....

blockchain ecosystem

Double assurance: Biometric transaction signing on the blockchain

Together with biometric transaction signing, blockchain solutions provide strong tamper-evident protections for transaction logging

rx drugs thinkstock

Need a fix? Steal patient data

Trusted insiders within the healthcare sector with access to patients, patient data and dispensaries, have unencumbered access to sensitive data and drugs. William Osler Health System (Canada) had one of their insiders break trust and...

behavior facial expressions emotions

You can steal my identity, but not my behavior

The compromise and misuse of identity is at the core of modern threats and data breaches. This has been documented for years and continues to escalate. As a result, we are rapidly approaching the end of life for password-based...

binoculars desert

Cybersecurity companies to watch

CBInsights created a list of startups that its metrics showed has early-to mid-stage high-momentum companies pioneering technology with the potential to transform cybersecurity. 

Predictive analytics can stop ransomware dead in its tracks

Predictive analytics is a necessity because the malware of tomorrow is unknown and will surely evolve to our detriment. Find out how it finds traces of ransomware before the network goes down.

eliminate insider threats 1

Knowing when a trusted insider becomes a threat

The time has come to pay serious attention to new ways of identifying and preventing such insider threats early on.

pollution smoke energy

How CISOs can overcome cybersecurity pollution

How to assess a cybersecurity vendor in simple, unbiased and efficient manner?

fbi dhs

Feds to battle cybersecurity with analytics

With more real-time information sharing, officials envision cyber defenses moving from 'vaccine' to 'immune system,' a big analytics project that could achieve something like automatic security.

employees technology planning data [Computerworld, January-February 2017 - HR IT]

Protect your unstructured data with user behavior analytics

Coupled with solid perimeter defenses, user behavior analytics is a powerful asset in the fight against data theft.

video

Choosing technologies to drive digital transformation

Computerworld's Premier 100 tech leaders reveal the tech that is transforming their organizations -- including cloud, A.I., big data, analytics, and blockchain.

analytics dish

3 security analytics approaches that don’t work (but could) — Part 2

Security analytics approaches using the strengths of Bayesian networks, machine learning and rules-based systems can be vital if they are thoughtfully built, combined and applied.

money

RSAC 2017: The end of easy cash bounties

Industry evolution eliminates chances of bug hunters to get easy cash for trivial vulnerabilities.

security automation robot

Build your security defense on data, not guesswork

Stop obsessing about the latest overhyped security threats. Delve into your own data about successful attacks on your organization first—and defend accordingly

IOT Toothbrushes
video

Adding data to toothbrushes, MRI machines

From toothbrushes to high-end medical imaging equipment, Philips is offering its consumer and business customers access to more data through Internet of Things-type sensors.

choice key security

Better evaluations are the key for security leaders to get better tools

Mike D. Kail explains how security leaders can better evaluate security tools and avoid buying things they don’t need

ibm watson

IBM brings cognitive to SOCs with Watson for cybersecurity

After one year of research and the ingestion of more than one million cyber security documents, IBM has launched its cognitive computing service, Watson, for security operations centres.

Load More
You Might Also Like