Top 10 technologies for information security and their implications

Gartner highlighted the top 10 technologies for information security and their implications for security organizations in 2016. “Information security teams and infrastructure must adapt to support emerging digital business requirements, and simultaneously deal with the increasingly advanced threat environment,” said Neil MacDonald, vice president, distinguished analyst and Gartner Fellow Emeritus. “Security and risk leaders need to fully engage with the latest technology trends if they are to define, achieve and maintain effective security and risk … More Continue reading Top 10 technologies for information security and their implications

Looking for trouble: How predictive analytics is transforming cybersecurity

Leading organizations recognize that stringent cybersecurity processes and strong infrastructure, while essential, are not enough to eliminate today’s disparate and ubiquitous threats. So they aim to use predictive analytics to identify and stop potential threats before they can wreak havoc. Some approaches that organizations are taking to root out potential threats include automated scanning of Internet chatter; development of predictive models through analysis of hacks and breaches; and systematic, continuous probing of their own defenses. … More Continue reading Looking for trouble: How predictive analytics is transforming cybersecurity

Hidden in plain sight: Four signs your network might be under attack

It’s a well-documented fact that an organization may be under attack and not even know it, with malware spreading undetected across the network for days, weeks or even years. With increasingly sophisticated, polymorphic malware hitting enterprise networks daily — either opportunistically or by intention — how can security staff on the front lines effectively combat these threats? We know it is no longer enough to simply detect and stop threats we already know about: now … More Continue reading Hidden in plain sight: Four signs your network might be under attack

AI system predicts cyber attacks using input from human experts

Today’s security systems usually fall into one of two categories: man or machine. So-called “analyst-driven solutions” rely on rules created by human experts and therefore miss any attacks that don’t match the rules. Meanwhile, today’s machine-learning approaches rely on “anomaly detection,” which tends to trigger false positives that both create distrust of the system and end up having to be investigated by humans, anyway. But what if there was a solution that could merge those … More Continue reading AI system predicts cyber attacks using input from human experts

The rise of threat hunting

85 percent of enterprises have already adopted some form of threat hunting to aggressively track and eliminate cyber adversaries as early as possible. This proactive model leverages existing tools combined with human intervention to strengthen the security posture of the organization. According to new SANS/DomainTools research, adopters of this model reported positive results, with 74 percent citing reduced attack surfaces, 59 percent experiencing faster speed and accuracy of responses, and 52 percent finding previously undetected … More Continue reading The rise of threat hunting

Don’t get stuck with dead end User Behavior Analytics

As the frequency of sophisticated cyberattacks continue to increase, User Behavior Analytics (UBA) has taken center stage. It now seems like every vendor in security, no matter its product, wants to be in the UBA space. Even after weeding out the pretenders, the number of UBA players is daunting. But savvy customers now talk about the dangers of getting locked into “first-generation UBA” and are looking for a more mature, stable next-gen solution. Why are … More Continue reading Don’t get stuck with dead end User Behavior Analytics

How effective are orgs at detecting and investigating cyber threats?

A new threat detection effectiveness survey compiling responses from more than 160 respondents around the world has provided valuable global insight into what technologies organizations use, what data they gather to support this effort, and their satisfaction with their current toolsets. Additionally respondents were asked what new technologies they plan to invest in and how they plan to evolve their strategies going forward. According to RSA, a key insight from the survey was that respondents … More Continue reading How effective are orgs at detecting and investigating cyber threats?