Ever growing cybersecurity threat vector due to digitization and proliferation of IoT devices, the impact, effectiveness of attacks and the shortage of skilled resources to identify, mitigate threats are the main challenges most of the organizations are facing today. This has lead security technology firms to look for options to reduce the efforts of security analyst and improve the effectiveness of identifying malicious code, abnormal activities at earlier stages of attack kill chain. The Artificial intelligence and Machine learning are the obvious choices for these technology firms. Continue reading “CyberSecurity: How to Avoid Being Blinded by Artificial Intelligence”
Category: Machine Learning
Business and organizations are digitally transforming, this spans from automated customer support systems to the intelligent business analytics. The interconnectedness and the use of disruptive technologies like IoT and cloud are enabling the business to grow faster and be competitive. The mammoth of data generated by IT infrastructure, operational technologies, and IoT is utilized for business analytics, improving operational efficiencies. At the same cyber-attack vector is increasing and cybercriminals are making use of exposure of data to launch high profile attacks and steal the data without getting noticed by cyber defense systems for months together. The following diagram shows the biggest data breaches of the 21st century. (Source CSOonline) Continue reading “How Big Data is Impacting Cyber Security Operations”
The year 2017 has been dominated by the worst cyber-attacks and high profile data breaches. Just to give an example,
Consumer credit score company Equifax has revealed that hackers accessed up to 143 million customer account details earlier this year. The data breach happened on July 29 and the details taken include names, social security numbers, drivers’ licenses, and credit card numbers of around 200,000 people Continue reading “The Rise of Next Generation Security Operation Center (NG-SOC)”
Security threats are growing in volumes and sophistication. Despite the implementation of best of breed detective and preventive controls from edge to endpoints, attackers can get into the organization’s network to steal information or hold organizations data hostage for ransom. Like latest ransomware attack impacted over 200 countries.
In this age of IoT, BYOD and social networking – monitoring, analyzing and identifying the subtle signs of the security breaches are like finding a needle in a haystack at dark night. A scarcity of trained security resources makes the problem more difficult. Continue reading “Key Benefits of Cognitive Security”
The cybersecurity attacks are evolved from wild predator-prey chase to well-designed targeted attacks which are creating significant financial and reputational damages to businesses and government.
Identification of these attacks is becoming very difficult for the cybersecurity defense teams as the signs of these attacks are very subtle. Hacker are using disruptive technologies like Artificial Intelligence (AI) and machine learning to plan and launch these attacks. Continue reading “Artificial Intelligence and Changing Face of Cybersecurity”