Why AI could help in the industrial security space

Sometimes cybersecurity companies develop cutting edge technology that helps users better protect themselves in ways they never thought possible. Other times, the need for new technology is so great that the clients build their own solutions. That looks to be the case with Norsk Hydro, an aluminum company that is reportedly developing its own AI tools after it was hit by a ransomware attack. It is aiming to use those tools to look for unusual activity on its industrial equipment, which could potentially avert a cyberattack. Companies are hungry for this type of technology in order to protect their critical infrastructure devices. I get questions about it nearly every day when I meet with CISOs and other security leaders. Critical infrastructure networks are increasingly under attack. There are a growing number of attacks on power utilities and manufacturing plants that shows that to be true, and many more that are […]

The post Why AI could help in the industrial security space appeared first on CyberScoop.

Continue reading Why AI could help in the industrial security space

Why AI could help in the industrial security space

Sometimes cybersecurity companies develop cutting edge technology that helps users better protect themselves in ways they never thought possible. Other times, the need for new technology is so great that the clients build their own solutions. That looks to be the case with Norsk Hydro, an aluminum company that is reportedly developing its own AI tools after it was hit by a ransomware attack. It is aiming to use those tools to look for unusual activity on its industrial equipment, which could potentially avert a cyberattack. Companies are hungry for this type of technology in order to protect their critical infrastructure devices. I get questions about it nearly every day when I meet with CISOs and other security leaders. Critical infrastructure networks are increasingly under attack. There are a growing number of attacks on power utilities and manufacturing plants that shows that to be true, and many more that are […]

The post Why AI could help in the industrial security space appeared first on CyberScoop.

Continue reading Why AI could help in the industrial security space

Sound Advice: Our 2019 International Podcast Day Roundup

Sept. 30 is International Podcast Day. Here’s a roundup of this year’s most interesting and insightful SecurityIntelligence podcasts.

The post Sound Advice: Our 2019 International Podcast Day Roundup appeared first on Security Intelligence.

Continue reading Sound Advice: Our 2019 International Podcast Day Roundup

What Is Unified Threat Management? A Pragmatic Approach to Information Security

Organizations are spending on security, but threat vectors continue to evolve. Unified threat management tools offer a way to bridge the gap.

The post What Is Unified Threat Management? A Pragmatic Approach to Information Security appeared first on Security Intelligence.

Continue reading What Is Unified Threat Management? A Pragmatic Approach to Information Security

3 Reasons Why Traditional Managed Security Services (MSS) Is Out

Reading Time: 4 minutes The market for managed security services (MSS) is transitioning from traditional monitoring and management to sophisticated security services driven by AI and human intelligence.

The post 3 Reasons Why Traditional Managed Security Services (MSS) Is Out appeared first on Security Intelligence.

Continue reading 3 Reasons Why Traditional Managed Security Services (MSS) Is Out

What Does Good Cyber Resilience Look Like in 2019?

Reading Time: 4 minutes As cyber risks increase, cyber resilience in 2019 requires the establishment of measurable baselines and the implementation of tools, such as the NIST Cybersecurity Framework, to minimize risk.

The post What Does Good Cyber Resilience Look Like in 2019? appeared first on Security Intelligence.

Continue reading What Does Good Cyber Resilience Look Like in 2019?

How to Know if Your Cybersecurity Tools Are Actually Working

Reading Time: 3 minutes It’s time to turn that nagging feeling of uncertainty about the efficacy of your cybersecurity tools into an action plan for gaining the visibility you need.

The post How to Know if Your Cybersecurity Tools Are Actually Working appeared first on Security Intelligence.

Continue reading How to Know if Your Cybersecurity Tools Are Actually Working

What Is SIEM and How Does It Enhance Threat Detection?

Reading Time: 3 minutes What is SIEM? Security information and event management helps organizations detect threats via fine-grained, real-time visibility into on-premises and cloud-based activity.

The post What Is SIEM and How Does It Enhance Threat Detection? appeared first on Security Intelligence.

Continue reading What Is SIEM and How Does It Enhance Threat Detection?

Why Deepfake Audio Technology Is a Real Threat to Enterprise Security

Reading Time: 3 minutes Deepfake audio technology has already begun wreaking havoc on the business world. Is your enterprise prepared for this next-generation threat?

The post Why Deepfake Audio Technology Is a Real Threat to Enterprise Security appeared first on Security Intelligence.

Continue reading Why Deepfake Audio Technology Is a Real Threat to Enterprise Security

Securing the Industrial Internet of Things in the Utilities Sector

Reading Time: 4 minutes While the industrial internet of things has clear benefits, IIoT environments also have the potential to expose high-value assets or services to a larger attack surface.

The post Securing the Industrial Internet of Things in the Utilities Sector appeared first on Security Intelligence.

Continue reading Securing the Industrial Internet of Things in the Utilities Sector