Bringing the Power of Watson and Cognitive Computing to the Security Operations Center

The power of Watson and cognitive computing enables security operations center specialists to defend their environments against threats with confidence.

The post Bringing the Power of Watson and Cognitive Computing to the Security Operations Center appeared first on Security Intelligence.

Continue reading Bringing the Power of Watson and Cognitive Computing to the Security Operations Center

IBM QRadar Advisor with Watson: Revolutionizing the Way Security Analysts Work

IBM Security developed QRadar Advisor to help IT analysts address gaps in speed, accuracy and intelligence and respond to incidents more confidently

The post IBM QRadar Advisor with Watson: Revolutionizing the Way Security Analysts Work appeared first on Security Intelligence.

Continue reading IBM QRadar Advisor with Watson: Revolutionizing the Way Security Analysts Work

It’s Time to Go Beyond Next-Generation Endpoint Security

To protect the most vulnerable gateways into their networks, IT leaders must go beyond next-generation endpoint security with IBM BigFix Detect.

The post It’s Time to Go Beyond Next-Generation Endpoint Security appeared first on Security Intelligence.

Continue reading It’s Time to Go Beyond Next-Generation Endpoint Security

The Future of Cybersecurity

Emerging technologies such as big data analytics, cognitive computing and the Internet of Things (IoT) are shaping the future of cybersecurity.

The post The Future of Cybersecurity appeared first on Security Intelligence.

Continue reading The Future of Cybersecurity

An Education Initiative in Cognitive Application: How I Embarked on Designing a Master’s Course for GSU

An education in cognitive application should demonstrate the power of Watson and show students what it takes to become a security analyst.

The post An Education Initiative in Cognitive Application: How I Embarked on Designing a Master’s Course for GSU appeared first on Security Intelligence.

Continue reading An Education Initiative in Cognitive Application: How I Embarked on Designing a Master’s Course for GSU

Perspectives on Securing Mobile and Social Business, 12 Months On

The IT landscape has changed since we issued our paper on securing mobile and social business in late 2015. We revised our findings to reflect this shift.

The post Perspectives on Securing Mobile and Social Business, 12 Months On appeared first on Security Intelligence.

Continue reading Perspectives on Securing Mobile and Social Business, 12 Months On

Perspectives on Securing Mobile and Social Business, 12 Months On

The IT landscape has changed since we issued our paper on securing mobile and social business in late 2015. We revised our findings to reflect this shift.

The post Perspectives on Securing Mobile and Social Business, 12 Months On appeared first on Security Intelligence.

Continue reading Perspectives on Securing Mobile and Social Business, 12 Months On

Applying Machine Learning to Improve Your Intrusion Detection System

Security analysts can train intelligent intrusion detection systems to distinguish between normal and malicious traffic by creating generic data sets.

The post Applying Machine Learning to Improve Your Intrusion Detection System appeared first on Security Intelligence.

Continue reading Applying Machine Learning to Improve Your Intrusion Detection System

Leapfrog the Skills Shortage and Security Intelligence Challenge With Cognitive Security

Cognitive security solutions dig through structured and unstructured data to deliver deep insights and patterns and empower CISOs to make better decisions.

The post Leapfrog the Skills Shortage and Security Intelligence Challenge With Cognitive Security appeared first on Security Intelligence.

Continue reading Leapfrog the Skills Shortage and Security Intelligence Challenge With Cognitive Security

Improve Threat Classification Accuracy With Supervised Machine Learning

Supervised machine learning can free up security analysts to respond to actual threats instead of sifting through endless streams of false positives.

The post Improve Threat Classification Accuracy With Supervised Machine Learning appeared first on Security Intelligence.

Continue reading Improve Threat Classification Accuracy With Supervised Machine Learning