Third-wave AI has Proven More Effective than Traditional Cybersecurity Platforms and Methodologies

Unfortunately, the majority of cybersecurity solutions available today rely on outdated applications for AI. So-called first- and second-wave AI solutions don’t cut it, but few vendors have the technical capabilities and know-how to apply cutting edge,… Continue reading Third-wave AI has Proven More Effective than Traditional Cybersecurity Platforms and Methodologies

Cybersecurity Spend for Data Retention and Analysis is Out of Control and Largely Unnecessary

Managing a relatively small, stable data store is one thing, but dynamic companies face immense challenges when those circumstances change. Data growth can become unwieldy to safeguard when it has to be carefully prepared through a series of time-consu… Continue reading Cybersecurity Spend for Data Retention and Analysis is Out of Control and Largely Unnecessary

Log Data is Not Effective as a Foundation for Prevention, Detection, Remediation or Analytics

In the imperfect, real world, where SOC teams actually live, the SIEM log-based approach is fundamentally flawed. In fact, it tends to add more challenge to the workday for SOC teams, not less.
The post Log Data is Not Effective as a Foundation for Pre… Continue reading Log Data is Not Effective as a Foundation for Prevention, Detection, Remediation or Analytics

Incremental Stacking of Correlative Analysis Platforms Will Ultimately Prove Ineffective and Costly

On the surface, an “incremental stacking” approach to correlative analysis platforms like SIEM, XDR and UEBA is logical. Organizations can overcome some of the inherent limitations present in their security solutions by adding a network traffic analysi… Continue reading Incremental Stacking of Correlative Analysis Platforms Will Ultimately Prove Ineffective and Costly

A Modern SOC Should Not Be Entirely Dependent On Human Operators and Their Personal Experience

A modern SOC should not be entirely dependent on human operators and their personal experience. The issue has been a foundational problem with not only the methodologies used by SOCs for the past 15 to 20 years, but it should be questioned whether the … Continue reading A Modern SOC Should Not Be Entirely Dependent On Human Operators and Their Personal Experience

How Self-Supervised AI Tackles Ambiguity in Network Security

Cybersecurity vendors promise the moon when it comes to AI. As the recent TechRepublic article, “Why cybersecurity tools fail when it comes to ambiguity,” makes clear, often, these promises fail short in real world network environments.
The post How Se… Continue reading How Self-Supervised AI Tackles Ambiguity in Network Security

The Fourth Industrial Revolution – AI, Quantum, and IoT Impacts on Cybersecurity

The next cybersecurity challenge lies with the advances in quantum computing that are set to revolutionize tech while simultaneously equipping threat actors with a new arsenal of cyberweapons.
The post The Fourth Industrial Revolution – AI, Quantum, an… Continue reading The Fourth Industrial Revolution – AI, Quantum, and IoT Impacts on Cybersecurity