Gartner Releases First-Ever Magic Quadrant for Unified Endpoint Management (UEM)

IBM was named a leader in the 2018 Magic Quadrant for Unified Endpoint Management Tools report for its completeness of vision and ability to execute.

The post Gartner Releases First-Ever Magic Quadrant for Unified Endpoint Management (UEM) appeared first on Security Intelligence.

Continue reading Gartner Releases First-Ever Magic Quadrant for Unified Endpoint Management (UEM)

10 Key Findings From the Ponemon Institute Value of Artificial Intelligence in Cybersecurity Study

According to a new study conducted by the Ponemon Institute and sponsored by IBM, organizations could save an average of $2.5 million in operating costs by deploying artificial intelligence (AI).

The post 10 Key Findings From the Ponemon Institute Value of Artificial Intelligence in Cybersecurity Study appeared first on Security Intelligence.

Continue reading 10 Key Findings From the Ponemon Institute Value of Artificial Intelligence in Cybersecurity Study

What’s On the Horizon for SIEM Technology? Five Upcoming Innovations in Security Analytics

As cloud adoption increases, the IT skills gap widens and the threat landscape becomes more sophisticated, innovations in SIEM technology will revolutionize the way SOCs perform security analytics.

The post What’s On the Horizon for SIEM Technology? Five Upcoming Innovations in Security Analytics appeared first on Security Intelligence.

Continue reading What’s On the Horizon for SIEM Technology? Five Upcoming Innovations in Security Analytics

Security Analysts Are Overworked, Understaffed and Overwhelmed — Here’s How AI Can Help

Today’s security teams lack the time, talent and resources to keep up with the rapidly evolving threat landscape. AI can automate tedious processes and take some pressure off security analysts.

The post Security Analysts Are Overworked, Understaffed and Overwhelmed — Here’s How AI Can Help appeared first on Security Intelligence.

Continue reading Security Analysts Are Overworked, Understaffed and Overwhelmed — Here’s How AI Can Help

Calculating the Cost of a Data Breach in 2018, the Age of AI and the IoT

The 2018 Cost of a Data Breach Study from Ponemon Institute reveals that the total cost, per-capita cost and average size of a data breach have all increased year over year.

The post Calculating the Cost of a Data Breach in 2018, the Age of AI and the IoT appeared first on Security Intelligence.

Continue reading Calculating the Cost of a Data Breach in 2018, the Age of AI and the IoT

Why UEM Is the New MDM: The Latest Stage in Enterprise Evolution

In addition to protecting laptops, smartphones, tablets and IoT devices, AI-powered UEM solutions can help security leaders manage apps, content, data and user identity and access more efficiently.

The post Why UEM Is the New MDM: The Latest Stage in Enterprise Evolution appeared first on Security Intelligence.

Continue reading Why UEM Is the New MDM: The Latest Stage in Enterprise Evolution

It’s Time to Infuse AI Into Your Endpoint Security Strategy

As the threat landscape evolves to target connected devices, artificial intelligence (AI) and machine learning will become increasingly crucial parts of any organization’s endpoint security strategy.

The post It’s Time to Infuse AI Into Your Endpoint Security Strategy appeared first on Security Intelligence.

Continue reading It’s Time to Infuse AI Into Your Endpoint Security Strategy

Fight Fire With Fire: How AI Plays a Role in Both Stopping and Committing DDoS Attacks

When the machine learning technology cyber defenders use to stop DDoS attacks inevitably falls into the hands of malicious actors, which side will win?

The post Fight Fire With Fire: How AI Plays a Role in Both Stopping and Committing DDoS Attacks appeared first on Security Intelligence.

Continue reading Fight Fire With Fire: How AI Plays a Role in Both Stopping and Committing DDoS Attacks

Humans vs. Machines: Will Adversarial AI Become the Better Hacker?

The advent of artificial intelligence (AI) brought with it a new set of attacks using adversarial AI. How can organizations fight an unknown enemy that’s not even human?

The post Humans vs. Machines: Will Adversarial AI Become the Better Hacker? appeared first on Security Intelligence.

Continue reading Humans vs. Machines: Will Adversarial AI Become the Better Hacker?

Achieving More Effective Security With Collaborative Defense in Depth

Collaborative defense connects an organization’s people, processes and technology to deliver improved security through open integrations, threat intelligence sharing and digital transformation.

The post Achieving More Effective Security With Collaborative Defense in Depth appeared first on Security Intelligence.

Continue reading Achieving More Effective Security With Collaborative Defense in Depth