Threat Hunting March 21, 2017 Understanding Cyber Threat Hunting 3 min read - When implementing threat hunting programs for the first time, IT teams should start with basic concepts, then add more capabilities gradually.
February 27, 2017 Hurry Hard? Not For Hackers: Security Controls Fall in Less Than 12 Hours 2 min read - A recent survey revealed that hackers can bypass security controls in under 12 hours. How can companies protect critical systems and eliminate new threats?
February 13, 2017 Threat Hunting Is a Top Security Priority for 2017 2 min read - According to a recent survey, threat hunting has moved to the top of security professionals' agenda in response to the ever-growing volume of cyberattacks.
Threat Hunting February 1, 2017 Enterprise Intelligence Brief: Threat Hunting Takes Center Stage 5 min read - Threat hunting can help organizations transition from reactive to proactive defense strategies and start thinking like cybercriminals.
Artificial Intelligence December 19, 2016 With AI2, Machine Learning and Analysts Come Together to Impress, Part 3: The Experiment 4 min read - Two researchers performed an experiment based on billions of log lines that demonstrated the importance of domain expertise in machine learning analysis.
Artificial Intelligence December 12, 2016 With AI2, Machine Learning and Analysts Come Together to Impress, Part 2: The Algorithms 4 min read - AI2 uses an "analyst-in-the-loop" system to improve itself and a "human-in-the-loop" system to create examples to be used in iterative training algorithms.
Artificial Intelligence December 5, 2016 With AI2, Machine Learning and Analysts Come Together to Impress, Part 1: An Introduction 3 min read - Machine learning systems like A12 are designed to augment human analysis with cognitive intelligence, enabling IT professionals to reduce false positives.
Data Protection December 2, 2016 The Threat Model of 2017 3 min read - If a threat model assumes a system is operating within certain parameters, changes in the threat environment could trigger unintended second-order effects.
November 23, 2016 Relax and Shop, We’re Keeping Watch 2 min read - The IBM X-Force Threat Research team is keeping watch on all things retail during the upcoming Black Friday through Cyber Monday shopping weekend.
November 15, 2016 Researchers Try to Create Malware Chip 2 min read - The NSF is sponsoring an attempt to build a malware chip capable of detecting anomalies in system processes and alerting local security software.