Anti-I: The Future of AI-Generated Malware

As AI progresses, security professionals must prepare for the inevitability of machines writing their own malware to infect other machines in the not-so-distant future.

The post Anti-I: The Future of AI-Generated Malware appeared first on Security Intelligence.

Continue reading Anti-I: The Future of AI-Generated Malware

Adversarial AI: As New Attack Vector Opens, Researchers Aim to Defend Against It

While fraudsters have yet to master adversarial AI, the only way for the security community to get ahead of the emerging threat is through collaborative defense.

The post Adversarial AI: As New Attack Vector Opens, Researchers Aim to Defend Against It appeared first on Security Intelligence.

Continue reading Adversarial AI: As New Attack Vector Opens, Researchers Aim to Defend Against It

Cybersecurity’s Next Major Challenge: Connecting Human and Machine Intelligence

Today, IBM introduced the Resilient Incident Response Platform (IRP) with Intelligent Orchestration and X-Force Threat Management services to help organizations connect human and machine intelligence.

The post Cybersecurity’s Next Major Challenge: Connecting Human and Machine Intelligence appeared first on Security Intelligence.

Continue reading Cybersecurity’s Next Major Challenge: Connecting Human and Machine Intelligence

Breaking Down the Security Immune System: Proactive Database Protection Through SIEM Integration

Security analysts can maximize the effectiveness of their incident response capabilities by integrating disparate tools such as database firewalls and UBA with a strong SIEM solution.

The post Breaking Down the Security Immune System: Proactive Database Protection Through SIEM Integration appeared first on Security Intelligence.

Continue reading Breaking Down the Security Immune System: Proactive Database Protection Through SIEM Integration

The Future of Cognitive Security Is Now

Is cognitive security all hype, or can AI-powered tools help organizations defend their networks against evolving cyberthreats today?

The post The Future of Cognitive Security Is Now appeared first on Security Intelligence.

Continue reading The Future of Cognitive Security Is Now

Previewing RSA 2018: Collaboration, Orchestration and Augmented Intelligence

Our team at is optimistic about the future, and we believe that small teams can do impossibly big things. IBM Security experts will explain how at RSA 2018 in San Francisco.

The post Previewing RSA 2018: Collaboration, Orchestration and Augmented Intelligence appeared first on Security Intelligence.

Continue reading Previewing RSA 2018: Collaboration, Orchestration and Augmented Intelligence

Generative Adversarial Networks and Cybersecurity: Part 2

Researchers have shown how generative adversarial networks (GANs) can be applied to cybersecurity tasks such as cracking passwords and identifying hidden data in high-quality images.

The post Generative Adversarial Networks and Cybersecurity: Part 2 appeared first on Security Intelligence.

Continue reading Generative Adversarial Networks and Cybersecurity: Part 2

Understanding the Relationship Between AI and Cybersecurity

While some observers fear a Skynet-esque future of malicious, self-aware machines, Dudu Mimran envisions a world in which AI and cybersecurity work together to keep emerging threats in check.

The post Understanding the Relationship Between AI and Cybersecurity appeared first on Security Intelligence.

Continue reading Understanding the Relationship Between AI and Cybersecurity

Generative Adversarial Networks and Cybersecurity: Part 1

Generative adversarial networks are neural networks that compete in a game in which a generator attempts to fool a discriminator with examples that look similar to a training set.

The post Generative Adversarial Networks and Cybersecurity: Part 1 appeared first on Security Intelligence.

Continue reading Generative Adversarial Networks and Cybersecurity: Part 1

Tracking Malicious Insiders: Catch Me If You Can

A UBA solution powered by machine learning enables security teams to model normal behavior and track subtle changes in user activity to identify malicious insiders.

The post Tracking Malicious Insiders: Catch Me If You Can appeared first on Security Intelligence.

Continue reading Tracking Malicious Insiders: Catch Me If You Can