Architectures for Securing IT Systems

IT analysts can refer to the human immune system as a model for securing IT systems through careful vetting of data and prioritization of threats.

The post Architectures for Securing IT Systems appeared first on Security Intelligence.

Continue reading Architectures for Securing IT Systems

Watson and Cybersecurity: Bringing AI to the Battle

At InterConnect, Marc van Zadelhoff explained how cognitive technology can revolutionize cybersecurity and the role of the security analyst.

The post Watson and Cybersecurity: Bringing AI to the Battle appeared first on Security Intelligence.

Continue reading Watson and Cybersecurity: Bringing AI to the Battle

Security Orchestration for an Uncertain World

Security orchestration is the union of people, process and technology — computer automation where it works, and human coordination where it doesn’t.

The post Security Orchestration for an Uncertain World appeared first on Security Intelligence.

Continue reading Security Orchestration for an Uncertain World

Intelligent Code Analytics: Increasing Application Security Testing Coverage With Cognitive Computing

With intelligent code analytics, developers can use machine learning to mark up APIs and bring application security testing to the next level.

The post Intelligent Code Analytics: Increasing Application Security Testing Coverage With Cognitive Computing appeared first on Security Intelligence.

Continue reading Intelligent Code Analytics: Increasing Application Security Testing Coverage With Cognitive Computing

Taking a Cognitive Approach to Unified Endpoint Management

Unified endpoint management solutions can reduce the time and complexity it takes to perform functions traditionally reserved for MDM and EMM tools.

The post Taking a Cognitive Approach to Unified Endpoint Management appeared first on Security Intelligence.

Continue reading Taking a Cognitive Approach to Unified Endpoint Management

Man Versus Machine: IBM Brings Science Fiction to Life With Cognitive Security

With its innovative cloud, IoT and cognitive security offerings, IBM is bringing science fiction to life. Learn more about AI and Watson at InterConnect.

The post Man Versus Machine: IBM Brings Science Fiction to Life With Cognitive Security appeared first on Security Intelligence.

Continue reading Man Versus Machine: IBM Brings Science Fiction to Life With Cognitive Security

QRadar UBA App Adds Machine Learning and Peer Group Analyses to Detect Anomalies in Users’ Activities

User behavior analytics (UBA) solutions enable SOC analysts to reduce the rate of false positives and more accurately detect insider threats.

The post QRadar UBA App Adds Machine Learning and Peer Group Analyses to Detect Anomalies in Users’ Activities appeared first on Security Intelligence.

Continue reading QRadar UBA App Adds Machine Learning and Peer Group Analyses to Detect Anomalies in Users’ Activities

Artificial Intelligence in Security: How Smart Is Smart?

To fully embrace the power of the cognitive era, security professionals must understand the capabilities and limitations of artificial intelligence.

The post Artificial Intelligence in Security: How Smart Is Smart? appeared first on Security Intelligence.

Continue reading Artificial Intelligence in Security: How Smart Is Smart?

Connecting to the Future With Cognitive Security

IT teams are beginning to adopt cognitive security solutions to enable their analysts to make connections and drive innovation in the cybersecurity space.

The post Connecting to the Future With Cognitive Security appeared first on Security Intelligence.

Continue reading Connecting to the Future With Cognitive Security

Connecting to the Future With Cognitive Security

IT teams are beginning to adopt cognitive security solutions to enable their analysts to make connections and drive innovation in the cybersecurity space.

The post Connecting to the Future With Cognitive Security appeared first on Security Intelligence.

Continue reading Connecting to the Future With Cognitive Security