Analytics | News, how-tos, features, reviews, and videos

eliminate insider threats 1

7 insider attacks behavior analytics detects

Frequent types of commonly executed insider attacks UEBA detects.

European Union, EU

Is the 'right to explanation' in Europe’s GDPR a game-changer for security analytics?

Making major adjustments in the types of software solutions they use to analyze personal data in the wake of the General Data Protection Regulation (GDPR).

ai machine learning endpoint security big data

Artificial intelligence and cybersecurity: The real deal

AI will have a growing impact on cybersecurity technology as a helper app, not as a new product category.

analyze / inspect / examine / find / research / data / magnifying glass

Of clouds and compliance: DLP + UEBA are back in the spotlight

Like many technologies before them that have needed to ripen on the vine for many years before accomplishing what they initially set out to do, DLP and user and entity behavior analytics now find themselves on the cusp of doing just...

Big data analytics hand touchscreen user man

Risk management is all about the data; security should be, too

Bay Dynamics takes a data-driven approach to helping companies identify and address the real security threats based on asset value.

CIO Leadership live with Bernie Gracy of Agero

CIO Leadership Live with Bernie Gracy, Chief Digital Officer of Agero | Ep 1

In this lively hourlong discussion, Maryfran Johnson, executive director of CIO programs for CIO Events and the CIO Executive Council, talks with Bernie Gracy, Chief Digital Officer of Agero, the largest provider of roadside...

security automation robot protects defends from attack intrusion breach

AI will not solve your security analytics issues

Implementing new AI based analytical solution for your SOC is tempting, but it would address the symptoms, rather than the root cause of the issues your organization faces.

cybersecurity boards

To rule or not to rule: SIEMs and their false positives

What’s the best approach to using rules in SIEMs? Do security-focused SMBs and enterprises need more rules or fewer? What role are rules likely to play in future solutions for threat detection?

internet security privacy

Cybersecurity technology: Everything is transforming and in play

Changing requirements and constant innovations are making security technology options more confusing.

Data analytics dashboard on a laptop

User behavior analytics: separating hype from reality

UBA has already produced successes against some of the security community’s toughest challenges and will continue to evolve as time goes by.

statistics stats big data analytics

How to handle the huge amount of security data we're generating

Security telemetry is on the rise, but gaining insight and operationalizing the data remains challenging and many organizations are falling behind.

cybersecurity boards

Cyber risk systems – how to get them to get it

A cyberrisk system should align employees with your effort to secure the company.

Doctor in holding tablet with medical images floating out of it

How data analytics can boost health IT security

As interactive devices and the internet of things become more entrenched in military health, the health information of our military can easily become compromised. We don’t need systems to tell us what already happened, but to predict...

intro cyber attack maps

8 top cyber attack maps and how to use them

Cyber attack maps can be fun to look at, but are they useful? As usual, when it comes to security context is key, so CSO looked at eight of the web's most popular cyber-attack maps. While the maps themselves are mostly eye candy with...

data breach predictions

Chances are good ... that you’re already infected

Businesses in certain industries need to accept the fact that they are high-priority targets...and may have already been breached.

artificial intelligence / machine learning / network

What can machine learning tell us?

Real-world use cases illustrate the power of analytics for detecting stealth threats.

mobile tablet statistics analytics stocks

Why we need more shades of gray

A model-driven security analytics system that is thoughtfully designed and built would generate virtually no black-and-white answers. And that's a good thing, because the security challenges we face now and in the future will rely on...

1 tracking hunting dogs horse

The Knights Fork: Hunting the hunter

The true ROI of cybersecurity investment is the delta in dwell time. There is direct correlation between cybersecurity investment and brand protection. Hunting gives an organization the opportunity to turn the tables on an adversary....

blockchain ecosystem

Double assurance: Biometric transaction signing on the blockchain

Together with biometric transaction signing, blockchain solutions provide strong tamper-evident protections for transaction logging

rx drugs thinkstock

Need a fix? Steal patient data

Trusted insiders within the healthcare sector with access to patients, patient data and dispensaries, have unencumbered access to sensitive data and drugs. William Osler Health System (Canada) had one of their insiders break trust and...

Load More