behavior analytics
Worldwide infosec spending to reach $81.6 billion in 2016
Worldwide spending on information security products and services will reach $81.6 billion in 2016, an increase of 7.9 percent over 2015, according to the latest forecast from …
Security analytics: Risk from the inside out
High profile security breaches are at an all-time high. The threat has finally reached the boardroom, and we’re seeing increased security spending. Funds are increasingly …
How do you win the web security game when the rules keep changing?
Successfully protecting against web-based attacks is like trying to win a game that keeps changing its rules, only nobody tells you what the new rules are. With a rapidly …
Top 10 technologies for information security and their implications
Gartner highlighted the top 10 technologies for information security and their implications for security organizations in 2016. “Information security teams and …
Looking for trouble: How predictive analytics is transforming cybersecurity
Leading organizations recognize that stringent cybersecurity processes and strong infrastructure, while essential, are not enough to eliminate today’s disparate and ubiquitous …
Hidden in plain sight: Four signs your network might be under attack
It’s a well-documented fact that an organization may be under attack and not even know it, with malware spreading undetected across the network for days, weeks or even …
AI system predicts cyber attacks using input from human experts
Today’s security systems usually fall into one of two categories: man or machine. So-called “analyst-driven solutions” rely on rules created by human experts …
The rise of threat hunting
85 percent of enterprises have already adopted some form of threat hunting to aggressively track and eliminate cyber adversaries as early as possible. This proactive model …
Don’t get stuck with dead end User Behavior Analytics
As the frequency of sophisticated cyberattacks continue to increase, User Behavior Analytics (UBA) has taken center stage. It now seems like every vendor in security, no …
How effective are orgs at detecting and investigating cyber threats?
A new threat detection effectiveness survey compiling responses from more than 160 respondents around the world has provided valuable global insight into what technologies …
Balabit’s Blindspotter extends behavior analysis with biometrics
Balabit, best known as “the creator of syslog-ng,” announced the release of Blindspotter version 2016.03 at the RSA Conference in San Francisco. The new version of its …
Identifying abuse of compromised credentials in real-time
DB Networks announced at RSA Conference industry-first capabilities to non-intrusively identify compromised credentials in real-time by uniquely applying machine learning and …
Featured news
Resources
Don't miss
- CISA: Use Signal or other secure communications app
- Another NetWalker affiliate sentenced to 20 years in prison
- Why cybersecurity is critical to energy modernization
- Cryptocurrency hackers stole $2.2 billion from platforms in 2024
- CISA orders federal agencies to secure their Microsoft cloud environments