Intelligence & Analytics February 23, 2017 Connecting the Dots With the IBM Cognitive SOC and Watson for Cyber Security 5 min read - With IBM's Cognitive SOC and Watson for Cyber Security, analysts can detect and respond to incidents that traditional threat intelligence platforms miss.
Fraud Protection February 22, 2017 Adaptive Security: The Safety Net in the Flying Trapeze Act 2 min read - IT leaders should use adaptive security solutions as a safety net to protect user, customer and corporate data from fraudsters.
February 15, 2017 Sogeti Realizes 50 Percent Faster Analysis Times With Watson for Cyber Security 2 min read - With Watson for Cyber Security, Sogeti accelerated its data analysis process by 50 percent, enabling the firm to focus on the most persistent threats.
Intelligence & Analytics February 14, 2017 For the Love of SIEM 3 min read - Not feeling the love from your SIEM solution? Integrate it with existing tools to best fit the unique needs and goals of your business.
February 13, 2017 When Artificial Intelligence, Cybersecurity and EU Policy Meet 2 min read - The intersection of artificial intelligence, cybersecurity and EU policy will continue to generate increased interest — and debate — for years to come.
Intelligence & Analytics February 13, 2017 Bringing the Power of Watson and Cognitive Computing to the Security Operations Center 2 min read - The power of Watson and cognitive computing enables security operations center specialists to defend their environments against threats with confidence.
Endpoint February 13, 2017 It’s Time to Go Beyond Next-Generation Endpoint Security 4 min read - To protect the most vulnerable gateways into their networks, IT leaders must go beyond next-generation endpoint security with IBM BigFix Detect.
Artificial Intelligence February 9, 2017 An Education Initiative in Cognitive Application: How I Embarked on Designing a Master’s Course for GSU 3 min read - An education in cognitive application should demonstrate the power of Watson and show students what it takes to become a security analyst.
Endpoint January 23, 2017 Perspectives on Securing Mobile and Social Business, 12 Months On 4 min read - The IT landscape has changed since we issued our paper on securing mobile and social business in late 2015. We revised our findings to reflect this shift.
Intelligence & Analytics January 17, 2017 Applying Machine Learning to Improve Your Intrusion Detection System 6 min read - Security analysts can train intelligent intrusion detection systems to distinguish between normal and malicious traffic by creating generic data sets.