Now That You Have a Machine Learning Model, It’s Time to Evaluate Your Security Classifier

Now that you’ve identified an AI solution and selected a suitable algorithm for your machine learning model, you’re ready to measure the effectiveness of your security classifier.

The post Now That You Have a Machine Learning Model, It’s Time to Evaluate Your Security Classifier appeared first on Security Intelligence.

Continue reading Now That You Have a Machine Learning Model, It’s Time to Evaluate Your Security Classifier

Manage Emerging Cybersecurity Risks by Rallying Around Mutual Concerns

Chief information security officers (CISOs) are looking for ways to set the tone for the year and have more engaged conversations with top leadership regarding cybersecurity risks.

The post Manage Emerging Cybersecurity Risks by Rallying Around Mutual Concerns appeared first on Security Intelligence.

Continue reading Manage Emerging Cybersecurity Risks by Rallying Around Mutual Concerns

AI May Soon Defeat Biometric Security, Even Facial Recognition Software

Threat actors will soon gain access to artificial intelligence (AI) tools that will enable them to defeat multiple kinds of authentication systems, even biometric security.

The post AI May Soon Defeat Biometric Security, Even Facial Recognition Software appeared first on Security Intelligence.

Continue reading AI May Soon Defeat Biometric Security, Even Facial Recognition Software

Break Through Cybersecurity Complexity With New Rules, Not More Tools

While many CISOs are tempted to invest in as many new technologies as they can find to fight emerging threats, less is more when it comes to minimizing cybersecurity complexity.

The post Break Through Cybersecurity Complexity With New Rules, Not More Tools appeared first on Security Intelligence.

Continue reading Break Through Cybersecurity Complexity With New Rules, Not More Tools

Why CISOs and Boards Should Work Together to Improve Cybersecurity Disclosure

Just how well are organizations informing stakeholders about cyber risks? That was the question that EY sought to answer in their recent “Cybersecurity disclosure benchmarking” report.

The post Why CISOs and Boards Should Work Together to Improve Cybersecurity Disclosure appeared first on Security Intelligence.

Continue reading Why CISOs and Boards Should Work Together to Improve Cybersecurity Disclosure

When It Comes to Cyber Risks, A Confident Board Isn’t Always a Good Thing

While board directors have been concerned with cybersecurity for some time, we’re now seeing reports that they are improving their understanding of cyber risks and how those risks can impact business.

The post When It Comes to Cyber Risks, A Confident Board Isn’t Always a Good Thing appeared first on Security Intelligence.

Continue reading When It Comes to Cyber Risks, A Confident Board Isn’t Always a Good Thing

Maturing Your Security Operations Center With the Art and Science of Threat Hunting

By combining repeatable processes for threat hunting with intelligent solutions and skilled analysts, organizations can improve threat response and protect their most critical assets.

The post Maturing Your Security Operations Center With the Art and Science of Threat Hunting appeared first on Security Intelligence.

Continue reading Maturing Your Security Operations Center With the Art and Science of Threat Hunting

Your Security Strategy Is Only as Strong as Your Cyber Hygiene

Without full network visibility and regular utilization of cyber hygiene best practices, your enterprise could face very real, but entirely preventable, security risks.

The post Your Security Strategy Is Only as Strong as Your Cyber Hygiene appeared first on Security Intelligence.

Continue reading Your Security Strategy Is Only as Strong as Your Cyber Hygiene

Top 2019 Cybersecurity Predictions From the Resilient Year-End Webinar

During the recent IBM Resilient year-end webinar, expert panelists discussed and debated the trends that defined 2018 and offered cybersecurity predictions on what the industry can expect in 2019.

The post Top 2019 Cybersecurity Predictions From the Resilient Year-End Webinar appeared first on Security Intelligence.

Continue reading Top 2019 Cybersecurity Predictions From the Resilient Year-End Webinar

Cloud Security With a Chance of Data Breaches

Companies should look for a cloud security solution that sits in front of the database and can send traffic to your existing tools without having to install any software on the database.

The post Cloud Security With a Chance of Data Breaches appeared first on Security Intelligence.

Continue reading Cloud Security With a Chance of Data Breaches