Machine learning: It’s all about the use cases [baby]!
Updated

Machine learning: It’s all about the use cases [baby]!

With so much hype around “machine learning,” how can practitioners better understand which IT security applications can actually benefit? Experts suggest: forget the buzz – it’s the outcomes that are the most important.

08/10/18

The missing act for user and entity behavior analytics
Q&A

The missing act for user and entity behavior analytics

What’s the real definition of winning? Is it when cyber criminals get inside or when they move sensitive data out? According to Symantec’s SVP of Information Protection, Nico Popp, it’s the latter, making data a vital Indicator of...

06/07/18

Short on security analysts? AI can help

Short on security analysts? AI can help

A new study shows just nine percent of millennials are interested in cyber security careers. That means the shortage of security analysts will increase. With the onslaught of threats, and mountain of data coming into organizations...

05/15/18

How can SOC analysts hunt more efficiently? By not hunting

How can SOC analysts hunt more efficiently? By not hunting

To win the battle against today’s sophisticated cyber threats, security analysts must disrupt a kill chain or lateral movement attack early in the process. Achieving success requires pinpointing the real threat amidst a never-ending...

04/12/18

Traditional cyber solutions are the answer when used in the right way

Traditional cyber solutions are the answer when used in the right way

When it comes to cybersecurity, every investment counts.

03/13/18

Detecting malicious insiders: a new use case for data loss prevention
Q&A

Detecting malicious insiders: a new use case for data loss prevention

A discussion with Symantec’s Nico Popp about how DLP has evolved over the years.

02/20/18

7 insider attacks behavior analytics detects

7 insider attacks behavior analytics detects

Frequent types of commonly executed insider attacks UEBA detects.

01/31/18

Of clouds and compliance: DLP + UEBA are back in the spotlight

Of clouds and compliance: DLP + UEBA are back in the spotlight

Like many technologies before them that have needed to ripen on the vine for many years before accomplishing what they initially set out to do, DLP and user and entity behavior analytics now find themselves on the cusp of doing just...

01/17/18

Building an insider threat program from the inside-out, not outside-in

Building an insider threat program from the inside-out, not outside-in

Including the 10 questions you should ask when building an insider threat program.

01/03/18

From buzz to the battleground, AI is everywhere

From buzz to the battleground, AI is everywhere

An open letter to artificial intelligence.

12/13/17

Multi-factor authentication needs a little Goldilocks

Multi-factor authentication needs a little Goldilocks

Companies cannot apply multi-factor authentication to everything a user does.

11/27/17

Load More