
Data science in service of detection vs. investigation
Cybersecurity firms often tout the use of data science, machine learning and artificial intelligence in their products. But there are consequential distinctions when you apply these techniques to specific cybersecurity use cases.

6 takeaways (and 3 predictions) from CISO meetings at the RSA Conference
The most effective way for divining the current state of enterprise cybersecurity practices is to talk to a number of CISOs representing different industries and to distill those conversations into an overall model.

Sometimes encryption can actually make you less secure
In an age where advanced analytics to detect a sophisticated attack is often the only chance of heading off substantial harm, encrypting SMB is akin to taking one step forward and 50 steps back.

Anatomy of a well-run red-team exercise
Red team exercises – and particularly “assume compromise” or “assume breach” exercises – generally provide the most insight into your blue-team’s readiness to face an attack.

How ready are you to stop an advanced attack?
How you perform in the face of well-run red team exercises is the closest you can come to knowing how you will deal with a real-world advanced attack.

Who wins in a world of 100% encrypted traffic?
With advances in artificial intelligence, security doesn’t have to come at the cost of privacy.