Good threat intelligence can sift through mountains of data collected from sensors across the globe to provide insights into what is happening and what countermeasures need to be in place to defend against a dynamic threat environment.
Today’s CIOs have an unprecedented challenge on their hands. They are spearheading digital transformation efforts, creating revenue-generating applications, enabling remote work and driving seamless customer experiences. This new business environment also created a veritable playground for attackers, making it hard to strike the right balance between innovation and security. Most attacks today follow a similar…
The technology environment in which businesses and society operate is becoming increasingly complex. Smart cities now rely on tools like AI to coordinate things like traffic, power, and emergency systems. Distributed manufacturing platforms use it to respond to consumer demand in near-real-time. Massive data centers depend on intelligent systems to process elephant flows of information…
As COVID-19 continues to spread, the virulent disease has impacted our lives with restricted travel, cancelled public and sporting events, and it compels employees to work from home. Remote workers are not as well-protected as ones behind the defenses of the mothership. In times like these, it becomes even more important to protect your endpoints.…
The COVID-19 outbreak provides ripe opportunities for criminal actors to exploit fear, uncertainty, and companies ill prepared to to secure remote workers, driven to home offices by travel restrictions and social-distancing. The first threat comes in the form of misinformation and weaponized websites and documents. Websites and apps with outbreak maps are attracting unwitting victims…
The 80/20 rule, which was first introduced as Pareto’s principle in 1941 by American engineer Joseph Juran, suggests that 20 percent of your activities (in life, business, athletics, etc.) will account for 80 percent of your results. Simply put: work smarter, not harder. How can we apply Pareto’s principle to cloud security? Within your security activities, what is the key 20 percent that will produce 80 percent of your results when it comes to reducing risk? One effort that absolutely falls into the…
Hackers took over the account of an employee at LiveRamp – one of Facebook’s significant data partners and a marketer extraordinaire that helps advertisers target ads – to access its Business Manager account and launch a campaign to run scam ads, tapping other user accounts to pay for them and deceiving customers. “The instance to…
The cybersecurity industry is currently experiencing a shortage of trained staff in epidemic proportions. While complex and sophisticated malware is generated in increasing numbers daily, the skilled personnel needed to prevent or remediate the ever-increasing malevolent code is simply not to be found. In 2018-2019, 53 percent of organizations reported a “problematic shortage” of cybersecurity…
Few know it, but AI has been around for the better half of a century, machine learning for decades and deep learning for a few years now, but consumers and companies struggle to identify the subsets of AI and what these distinctions mean. Many are unclear about the difference between machine learning and deep learning,…
How deep learning technology acts pre-emptively to stop attackers before they cause serious damage A core evaluation of artificial intelligence (AI) in cyber threat landscape indicates that AI is on the verge of overhauling the attack domain. Organizations need to be ready for the next wave of attacks because the reality on the ground will…