Artificial Intelligence November 3, 2016 Cognitive Security to the Rescue? Study Predicts 3x Adoption in the Next Few Years 4 min read - According to a recent survey conducted by the IBM Institute of Business Value (IBV), the era of cognitive security may be coming sooner than we think.
November 2, 2016 World of Watson 2016 Wrap-Up 3 min read - IBM demoed the integration of Watson for Cyber Security with QRadar, designed to improve the quality and velocity of security analysis, at World of Watson.
Fraud Protection November 2, 2016 The Art and Science of How Spam Filters Work 4 min read - Few truly understand how spam filters work, but nearly every internet user benefits from the security they provide on a daily basis.
Intelligence & Analytics October 31, 2016 Machine Learning: When It Works and When It Doesn’t 3 min read - Machine learning is an invaluable analytical tool, but problems can arise from its inability to reason beyond the scope of its classification algorithms.
Intelligence & Analytics October 17, 2016 Machine Learning for Threat Analytics: A Boost or a Bust? 4 min read - Machine learning relies on data acquisition and classification of examples to help security teams and threat analysts reduce the rate of false positives.
January 19, 2016 IBM Targets Online Fraud by Scooping Up IRIS Analytics 2 min read - IBM recently acquired IRIS Analytics and its security system, which is designed to combat real-time payment fraud with the help of machine learning.
CISO December 11, 2015 With 2015 Cybersecurity Challenges in the Rearview, 2016 Presents New Opportunities 7 min read - 2015 had a lot of cybersecurity challenges, but many of these incidents have set up 2016 to be a year of opportunities for individuals and enterprises.
X-Force November 5, 2015 Factorization Machines: A New Way of Looking at Machine Learning 3 min read - Here's a look at Steffen Rendle's theory on factorization machines — including how they could be used to assist data scientists in the future.
August 11, 2015 DGA Changer Malware Variant Shows How Attackers Are Improving Domain Names 2 min read - Researchers have discovered that those attackers behind the DGA Changer malware have come up with an even better way to avoid sandbox detection.