The Fourth Industrial Revolution – AI, Quantum, and IoT Impacts on Cybersecurity

The next cybersecurity challenge lies with the advances in quantum computing that are set to revolutionize tech while simultaneously equipping threat actors with a new arsenal of cyberweapons.
The post The Fourth Industrial Revolution – AI, Quantum, an… Continue reading The Fourth Industrial Revolution – AI, Quantum, and IoT Impacts on Cybersecurity

3 Reasons Why a Rule-Based Cybersecurity Platform Will Always Fail

When it comes to advancements in cybersecurity, rule-based systems are holding the industry back. Relying on humans to constantly input and label rules in order to detect and stay ahead of threats is a bottleneck process that is setting security teams … Continue reading 3 Reasons Why a Rule-Based Cybersecurity Platform Will Always Fail

The Many Ways Your Employees Can Get Hacked While Working From Home and How to Respond

Although it is not surprising at all that hackers are taking advantage of the global pandemic —phishing threat reports are always highest when there is some natural disaster happening— we have never before had such an unsafe environment to … Continue reading The Many Ways Your Employees Can Get Hacked While Working From Home and How to Respond

Yesterday’s SIEM Solutions Can’t Combat Today’s Cyberthreats

While it’s true that having a SIEM is better than forgoing network monitoring all together, a standalone SIEM solution is simply insufficient in today’s cybersecurity landscape. Hackers and other bad actors have become more sophisticated –… Continue reading Yesterday’s SIEM Solutions Can’t Combat Today’s Cyberthreats

Hacking the Hackers: Adversarial AI and How to Fight It

Advances in Artificial Intelligence (AI) have led to smarter, more robust network security platforms that are quickly replacing legacy security solutions.
The post Hacking the Hackers: Adversarial AI and How to Fight It appeared first on Security Boule… Continue reading Hacking the Hackers: Adversarial AI and How to Fight It

Generative Unsupervised Learning vs. Discriminative Clustering Technology: Which Prevents Zero-Day Attacks?

Knowing the difference between Discriminative and Generative Unsupervised Learning can tell you a lot about the effectiveness of a cybersecurity solution’s artificial intelligence, for example, whether or not that security solution can perform ac… Continue reading Generative Unsupervised Learning vs. Discriminative Clustering Technology: Which Prevents Zero-Day Attacks?

Case Study: MixMode AI Detects Attack not Found on Threat Intel

In October, 2019 a MixMode customer experienced an incident where an external entity attacked a web server located in their DMZ, compromised it, and then pivoted internally through the DMZ to attempt access of a customer database. While the attacker wa… Continue reading Case Study: MixMode AI Detects Attack not Found on Threat Intel