Generative Adversarial Networks and Cybersecurity: Part 1

Generative adversarial networks are neural networks that compete in a game in which a generator attempts to fool a discriminator with examples that look similar to a training set.

The post Generative Adversarial Networks and Cybersecurity: Part 1 appeared first on Security Intelligence.

Continue reading Generative Adversarial Networks and Cybersecurity: Part 1

Machine Learning Is Our Best Weapon Against Spiraling Cyberthreats

To defend their confidential data from increasingly sophisticated cybercriminals, security teams must leverage machine learning to perform analytical tasks that are too tedious for humans to complete.

The post Machine Learning Is Our Best Weapon Against Spiraling Cyberthreats appeared first on Security Intelligence.

Continue reading Machine Learning Is Our Best Weapon Against Spiraling Cyberthreats

Unified Endpoint Management: Why a UEM Solution Is a Compulsory Choice for a Modern Organization

Modern organizations need a UEM solution that harnesses the power of cognitive technology to deliver enhanced data security, maximize user productivity and increase operational efficiency.

The post Unified Endpoint Management: Why a UEM Solution Is a Compulsory Choice for a Modern Organization appeared first on Security Intelligence.

Continue reading Unified Endpoint Management: Why a UEM Solution Is a Compulsory Choice for a Modern Organization

Read My Lips: Researchers Find Ways to Fool Speech Recognition Systems

Researchers have devised ways to manipulate speech recognition systems to carry out hidden commands, suggesting that cybercriminals will soon develop similar ways to exploit this technology.

The post Read My Lips: Researchers Find Ways to Fool Speech Recognition Systems appeared first on Security Intelligence.

Continue reading Read My Lips: Researchers Find Ways to Fool Speech Recognition Systems

SecOps 2018: Cognitive Era and the Coming of GDPR

As organizations prepare for GDPR in 2018, SecOps and cognitive technology will play crucial roles in helping to ensure improved security without compromising agility.

The post SecOps 2018: Cognitive Era and the Coming of GDPR appeared first on Security Intelligence.

Continue reading SecOps 2018: Cognitive Era and the Coming of GDPR

Now Trending: Your 2018 Network Security Snapshot

The top network security trends for security professionals to monitor in 2018 include the evolution of AI, cryptocurrency crime, serverless apps, digital twins, the IoT and more.

The post Now Trending: Your 2018 Network Security Snapshot appeared first on Security Intelligence.

Continue reading Now Trending: Your 2018 Network Security Snapshot

Readying Your Security Operations for 2018 and Beyond

If you are planning to launch a new deployment or otherwise expand your security operations center (SOC) in 2018, ensure that cognitive technologies are available to help analysts digest threat data.

The post Readying Your Security Operations for 2018 and Beyond appeared first on Security Intelligence.

Continue reading Readying Your Security Operations for 2018 and Beyond

Cybersecurity, Fraud and Operational Risk: The Time for Cognitive Convergence Is Now

The threat landscape is expanding, and organizations must undergo a cognitive convergence to manage evolving security, fraud and operational risks.

The post Cybersecurity, Fraud and Operational Risk: The Time for Cognitive Convergence Is Now appeared first on Security Intelligence.

Continue reading Cybersecurity, Fraud and Operational Risk: The Time for Cognitive Convergence Is Now

Improving Decision-Making in User Access Review and Cleanup Projects

Machine learning algorithms can help security teams improve decision-making while conducting user access review and cleanup projects.

The post Improving Decision-Making in User Access Review and Cleanup Projects appeared first on Security Intelligence.

Continue reading Improving Decision-Making in User Access Review and Cleanup Projects

All Aboard! Applying the Security Immune System Approach to the Railroad Industry

When it comes to protecting the railroad industry from cyberthreats, the security immune system approach can reduce incident triage from months to minutes.

The post All Aboard! Applying the Security Immune System Approach to the Railroad Industry appeared first on Security Intelligence.

Continue reading All Aboard! Applying the Security Immune System Approach to the Railroad Industry