Powered by machine learning, IBM Trusteer can help IT professionals nip phishing attacks in the bud with unprecedented speed and accuracy.
When implementing threat hunting programs for the first time, IT teams should start with basic concepts, then add more capabilities gradually.
A recent survey revealed that hackers can bypass security controls in under 12 hours. How can companies protect critical systems and eliminate new threats?
According to a recent survey, threat hunting has moved to the top of security professionals' agenda in response to the ever-growing volume of cyberattacks.
Threat hunting can help organizations transition from reactive to proactive defense strategies and start thinking like cybercriminals.
Two researchers performed an experiment based on billions of log lines that demonstrated the importance of domain expertise in machine learning analysis.
AI2 uses an "analyst-in-the-loop" system to improve itself and a "human-in-the-loop" system to create examples to be used in iterative training algorithms.
Machine learning systems like A12 are designed to augment human analysis with cognitive intelligence, enabling IT professionals to reduce false positives.
If a threat model assumes a system is operating within certain parameters, changes in the threat environment could trigger unintended second-order effects.
The IBM X-Force Threat Research team is keeping watch on all things retail during the upcoming Black Friday through Cyber Monday shopping weekend.