Hacking the Hackers: Adversarial AI and How to Fight It

Advances in Artificial Intelligence (AI) have led to smarter, more robust network security platforms that are quickly replacing legacy security solutions.
The post Hacking the Hackers: Adversarial AI and How to Fight It appeared first on Security Boule… Continue reading Hacking the Hackers: Adversarial AI and How to Fight It

Generative Unsupervised Learning vs. Discriminative Clustering Technology: Which Prevents Zero-Day Attacks?

Knowing the difference between Discriminative and Generative Unsupervised Learning can tell you a lot about the effectiveness of a cybersecurity solution’s artificial intelligence, for example, whether or not that security solution can perform ac… Continue reading Generative Unsupervised Learning vs. Discriminative Clustering Technology: Which Prevents Zero-Day Attacks?

How to Use Your Baseline for Network Security

This is the final article in a three-part series on Network Baselining. Read the first two articles in the series here:
1) An Introduction to Baselining Technology
2) How to Create a Baseline for Your Network
The post How to Use Your Baseline for Netwo… Continue reading How to Use Your Baseline for Network Security

An Introduction to Baselining Technology

This is the first installment of the three part blog series on creating baselines of network behavior to improve your security stance. Here we will walk you through the basics of baselining technology.
The post An Introduction to Baselining Technology … Continue reading An Introduction to Baselining Technology

Multi-Stream Cybersecurity and How it Can Save Your Business from a Zero-Day Attack

The best way to detect threats across an entire network in the quickest manner is to have complete visibility over every part of that network with a multi-stream platform which can incorporate not only network data, but Cloud Data and SIEM logs as well… Continue reading Multi-Stream Cybersecurity and How it Can Save Your Business from a Zero-Day Attack