AI Security: How Human Bias Limits Artificial Intelligence

For cybersecurity experts, artificial intelligence (AI) can both respond to and predict threats. But because AI security is everywhere, attackers are using it to launch more refined attacks. Each side is seemingly playing catch-up, with no clear winner in sight.  How can defenders stay ahead? To gain context about AI that goes beyond prediction, detection […]

The post AI Security: How Human Bias Limits Artificial Intelligence appeared first on Security Intelligence.

Continue reading AI Security: How Human Bias Limits Artificial Intelligence

Clean Sweep: A 30-Day Guide to a New Cybersecurity Plan

While the arrival of spring promises better days ahead, enterprises are also facing a cyberthreat landscape filled with both familiar threats and emerging attack vectors. As a result, it’s worth taking stock of current security systems and services to see what’s working, what isn’t and where operations can be improved. But how do businesses begin? […]

The post Clean Sweep: A 30-Day Guide to a New Cybersecurity Plan appeared first on Security Intelligence.

Continue reading Clean Sweep: A 30-Day Guide to a New Cybersecurity Plan

Solving 5 Challenges of Contact Tracing Apps

Contact tracing apps are designed to help public health agencies connect the dots by linking confirmed carriers of novel coronavirus to recent, close-proximity interactions. In theory, this creates a protective safety net — a way for countries to manage the spread and mitigate the impact of COVID-19 at scale. Despite good intentions, the push for […]

The post Solving 5 Challenges of Contact Tracing Apps appeared first on Security Intelligence.

Continue reading Solving 5 Challenges of Contact Tracing Apps

AI Security: Curation, Context and Other Keys to the Future

Security leaders need to cut through the hype when it comes to artificial intelligence (AI) security. While AI offers promise, buzzwords and big-picture thinking aren’t enough to deliver practical, useful results. Instead, using AI security correctly starts with knowing what it looks like today and what AI will look like tomorrow. Improved curation, enhanced context […]

The post AI Security: Curation, Context and Other Keys to the Future appeared first on Security Intelligence.

Continue reading AI Security: Curation, Context and Other Keys to the Future

Triage Attacks More Efficiently With AI for Cybersecurity

Think of cybersecurity like your personal health. In cybersecurity, basic cyber hygiene foils most cyber attacks. With a shortage of cyber experts, just as in medicine, finding faster and better ways to train practitioners using real-world scenarios is key. However, artificial intelligence (AI) for cybersecurity can improve a team’s response by triaging threats on its […]

The post Triage Attacks More Efficiently With AI for Cybersecurity appeared first on Security Intelligence.

Continue reading Triage Attacks More Efficiently With AI for Cybersecurity

Credential Stuffing: AI’s Role in Slaying a Hydra

One data breach can lead to another. Because so much of the data stolen in breaches ends up for sale on the dark web, a threat actor can purchase authentication credentials — the emails and passwords — of the organization’s employees without having to steal them directly. With that information in hand, threat actors have […]

The post Credential Stuffing: AI’s Role in Slaying a Hydra appeared first on Security Intelligence.

Continue reading Credential Stuffing: AI’s Role in Slaying a Hydra

7 Cybersecurity Tools On Our Holiday Wish List

The holiday season is upon us. After a difficult year, and facing an even more challenging year ahead, digital defense experts don’t have visions of sugar plums dancing in their heads. Instead, they dream of cybersecurity tools and other resources to help them cope with a wild threat landscape.  Here’s our ultimate holiday wish list.  […]

The post 7 Cybersecurity Tools On Our Holiday Wish List appeared first on Security Intelligence.

Continue reading 7 Cybersecurity Tools On Our Holiday Wish List

AI Driven SOC Automation

As California, where Gurucul is based, rolls into another full lockdown over the Holidays and…
The post AI Driven SOC Automation appeared first on Gurucul.
The post AI Driven SOC Automation appeared first on Security Boulevard.
Continue reading AI Driven SOC Automation

How AI Can Make Cybersecurity Jobs Less Stressful and More Fulfilling

Words for health and the human body often make their way into the language we use to describe IT. Computers get viruses; companies manage their security hygiene; incident response teams train on their cyber fitness. Framing IT concepts in terms of health can also be useful when looking at security operations centers (SOCs) and jobs […]

The post How AI Can Make Cybersecurity Jobs Less Stressful and More Fulfilling appeared first on Security Intelligence.

Continue reading How AI Can Make Cybersecurity Jobs Less Stressful and More Fulfilling

Enhance Integrated Risk Management Solutions With Modern Technologies

Many business leaders struggle to efficiently respond to risk and compliance needs because of the complex regulatory landscape, ever-evolving risk scenarios and inconsistent internal processes. It’s only been more recently that organizations have embraced enterprise integrated risk management (IRM) tools to overcome a siloed approach of managing risk and compliance data. The advent of these […]

The post Enhance Integrated Risk Management Solutions With Modern Technologies appeared first on Security Intelligence.

Continue reading Enhance Integrated Risk Management Solutions With Modern Technologies