Data science in service of detection vs. investigation

Data science in service of detection vs. investigation

Cybersecurity firms often tout the use of data science, machine learning and artificial intelligence in their products. But there are consequential distinctions when you apply these techniques to specific cybersecurity use cases.

6 takeaways (and 3 predictions) from CISO meetings at the RSA Conference

6 takeaways (and 3 predictions) from CISO meetings at the RSA Conference

The most effective way for divining the current state of enterprise cybersecurity practices is to talk to a number of CISOs representing different industries and to distill those conversations into an overall model.

Sometimes encryption can actually make you less secure

Sometimes encryption can actually make you less secure

In an age where advanced analytics to detect a sophisticated attack is often the only chance of heading off substantial harm, encrypting SMB is akin to taking one step forward and 50 steps back.

Anatomy of a well-run red-team exercise

Anatomy of a well-run red-team exercise

Red team exercises – and particularly “assume compromise” or “assume breach” exercises – generally provide the most insight into your blue-team’s readiness to face an attack.

How ready are you to stop an advanced attack?

How ready are you to stop an advanced attack?

How you perform in the face of well-run red team exercises is the closest you can come to knowing how you will deal with a real-world advanced attack.

Who wins in a world of 100% encrypted traffic?

Who wins in a world of 100% encrypted traffic?

With advances in artificial intelligence, security doesn’t have to come at the cost of privacy.

Load More
Top Blog Posts