The Future of Cognitive Security Is Now

Is cognitive security all hype, or can AI-powered tools help organizations defend their networks against evolving cyberthreats today?

The post The Future of Cognitive Security Is Now appeared first on Security Intelligence.

Continue reading The Future of Cognitive Security Is Now

Previewing RSA 2018: Collaboration, Orchestration and Augmented Intelligence

Our team at is optimistic about the future, and we believe that small teams can do impossibly big things. IBM Security experts will explain how at RSA 2018 in San Francisco.

The post Previewing RSA 2018: Collaboration, Orchestration and Augmented Intelligence appeared first on Security Intelligence.

Continue reading Previewing RSA 2018: Collaboration, Orchestration and Augmented Intelligence

How to Get the Most Out of the RSA Conference 2018

There’s something for every cybersecurity enthusiast at this year’s RSA Conference, including masterful keynotes, stirring panels and vendor showcases featuring the latest technologies in the field.

The post How to Get the Most Out of the RSA Conference 2018 appeared first on Security Intelligence.

Continue reading How to Get the Most Out of the RSA Conference 2018

A Letter From the Future: It’s January 2019 and Hackers Are Stealing Your Data

Welcome to the future. It’s January 2019 and cybercriminals are stealing your customer data. How will you use AI to execute your incident response plan and master the basics to avoid future incidents?

The post A Letter From the Future: It’s January 2019 and Hackers Are Stealing Your Data appeared first on Security Intelligence.

Continue reading A Letter From the Future: It’s January 2019 and Hackers Are Stealing Your Data

Generative Adversarial Networks and Cybersecurity: Part 2

Researchers have shown how generative adversarial networks (GANs) can be applied to cybersecurity tasks such as cracking passwords and identifying hidden data in high-quality images.

The post Generative Adversarial Networks and Cybersecurity: Part 2 appeared first on Security Intelligence.

Continue reading Generative Adversarial Networks and Cybersecurity: Part 2

Four Reasons Why I’m Excited About IBM Think 2018

At Think 2018, attendees will have the opportunity to learn about multiple areas of study, rub elbows with experts, attend illuminating sessions and more.

The post Four Reasons Why I’m Excited About IBM Think 2018 appeared first on Security Intelligence.

Continue reading Four Reasons Why I’m Excited About IBM Think 2018

Generative Adversarial Networks and Cybersecurity: Part 1

Generative adversarial networks are neural networks that compete in a game in which a generator attempts to fool a discriminator with examples that look similar to a training set.

The post Generative Adversarial Networks and Cybersecurity: Part 1 appeared first on Security Intelligence.

Continue reading Generative Adversarial Networks and Cybersecurity: Part 1

New Ponemon Report: Too Many Organizations Don’t Have a Plan to Respond to Incidents

Most organizations around the world lack a consistent incident response plan and thus are unprepared to manage the repercussions of a cyberattack, according to a recent Ponemon report.

The post New Ponemon Report: Too Many Organizations Don’t Have a Plan to Respond to Incidents appeared first on Security Intelligence.

Continue reading New Ponemon Report: Too Many Organizations Don’t Have a Plan to Respond to Incidents

Implementing O&A: Why Intelligence Is the Key to Strategic Orchestration

By implementing orchestration and automation (O&A), security leaders can deliver the real-time threat intelligence their understaffed analyst teams need to punch above their weight.

The post Implementing O&A: Why Intelligence Is the Key to Strategic Orchestration appeared first on Security Intelligence.

Continue reading Implementing O&A: Why Intelligence Is the Key to Strategic Orchestration

Machine Learning Is Our Best Weapon Against Spiraling Cyberthreats

To defend their confidential data from increasingly sophisticated cybercriminals, security teams must leverage machine learning to perform analytical tasks that are too tedious for humans to complete.

The post Machine Learning Is Our Best Weapon Against Spiraling Cyberthreats appeared first on Security Intelligence.

Continue reading Machine Learning Is Our Best Weapon Against Spiraling Cyberthreats