Machine Learning Will Transform How We Detect Software Vulnerabilities

When used as part of the software development process, machine learning can help identify vulnerabilities before threat actors have a chance to exploit them.

The post Machine Learning Will Transform How We Detect Software Vulnerabilities appeared first on Security Intelligence.

Continue reading Machine Learning Will Transform How We Detect Software Vulnerabilities

Stay on Top of Zero-Day Malware Attacks With Smart Mobile Threat Defense

Mobile threats are growing both in number and severity. To protect crucial data, organizations need mobile threat defense solutions that can replicate the accuracy of manual analysis on a large scale.

The post Stay on Top of Zero-Day Malware Attacks With Smart Mobile Threat Defense appeared first on Security Intelligence.

Continue reading Stay on Top of Zero-Day Malware Attacks With Smart Mobile Threat Defense

Machine Learning Algorithms Are Not One-Size-Fits-All

Before you can choose the right machine learning algorithms to serve your business’ needs, you must understand the type of problem you’re trying to solve and the type of training data you’ll need.

The post Machine Learning Algorithms Are Not One-Size-Fits-All appeared first on Security Intelligence.

Continue reading Machine Learning Algorithms Are Not One-Size-Fits-All

How Can Government Security Teams Overcome Obstacles in IT Automation Deployment?

IT automation is the future of security programs, but it’s not simply plug-and-play. SOC leaders must implement this technology thoughtfully to unlock the full range of benefits.

The post How Can Government Security Teams Overcome Obstacles in IT Automation Deployment? appeared first on Security Intelligence.

Continue reading How Can Government Security Teams Overcome Obstacles in IT Automation Deployment?

Fight Evolving Cybersecurity Threats With a One-Two-Three Punch

Collaborative industry partnerships, a hardened attack surface and a well-practiced incident response plan are all critical in the fight against emerging cybersecurity threats.

The post Fight Evolving Cybersecurity Threats With a One-Two-Three Punch appeared first on Security Intelligence.

Continue reading Fight Evolving Cybersecurity Threats With a One-Two-Three Punch

Insights From European Customers on Cybersecurity and Security Awareness

Hot topics of conversation around European Cyber Security Month (ECSM) included the challenges and opportunities of cybersecurity, the blurred line between the good guys and bad actors, and more.

The post Insights From European Customers on Cybersecurity and Security Awareness appeared first on Security Intelligence.

Continue reading Insights From European Customers on Cybersecurity and Security Awareness

How Daniel Gor Helps Protect the World — and His Grandparents — From Financial Fraud

If you’ve ever gotten a financial fraud alert from your bank, you can thank Daniel Gor for developing the automated processes by which fraud analysts monitor customers’ behavioral patterns.

The post How Daniel Gor Helps Protect the World — and His Grandparents — From Financial Fraud appeared first on Security Intelligence.

Continue reading How Daniel Gor Helps Protect the World — and His Grandparents — From Financial Fraud

Is Your SOC Overwhelmed? Artificial Intelligence and MITRE ATT&CK Can Help Lighten the Load

By adopting artificial intelligence solutions to help execute the MITRE ATT&CK framework, security teams can reduce dwell times, guide threat hunting endeavors and lighten the load of SOC analysts.

The post Is Your SOC Overwhelmed? Artificial Intelligence and MITRE ATT&CK Can Help Lighten the Load appeared first on Security Intelligence.

Continue reading Is Your SOC Overwhelmed? Artificial Intelligence and MITRE ATT&CK Can Help Lighten the Load

Retail Cybersecurity Is Lagging in the Digital Transformation Race, and Attackers Are Taking Advantage

Retail cybersecurity requires a large-scale transition to cope with new threat vectors, close significant infrastructure gaps, and extend security protocols across new cloud and SaaS platforms.

The post Retail Cybersecurity Is Lagging in the Digital Transformation Race, and Attackers Are Taking Advantage appeared first on Security Intelligence.

Continue reading Retail Cybersecurity Is Lagging in the Digital Transformation Race, and Attackers Are Taking Advantage

Soft Skills, Solid Benefits: Cybersecurity Staffing Shifts Gears to Bring in New Skill Sets

It’s time to prioritize soft skills, re-evaluate recruitment practices and prepare for a future where the hard skills of AI-enhanced tools require a soft-side balance to drive cybersecurity success.

The post Soft Skills, Solid Benefits: Cybersecurity Staffing Shifts Gears to Bring in New Skill Sets appeared first on Security Intelligence.

Continue reading Soft Skills, Solid Benefits: Cybersecurity Staffing Shifts Gears to Bring in New Skill Sets