Now that you've identified an AI solution and selected a suitable algorithm for your machine learning model, you're ready to measure the effectiveness of your security classifier.
Cybersecurity industry leaders should define a new threat intelligence model that is three-dimensional, nonlinear, rooted in elementary number theory and that applies vector calculus.
Security researchers report that the newest version of NRSMiner crypto-mining malware is causing problems for companies that haven't patched the EternalBlue exploit.
The concept of mutually assured destruction (MAD) has historically prevented nuclear war, but threat actors' advanced obfuscation techniques have made cyber deterrence difficult if not impossible.
One cybersecurity capability that continues to prove it's here to stay is threat hunting, a proactive approach to discovering and mitigating threats.
Before you can choose the right machine learning algorithms to serve your business' needs, you must understand the type of problem you're trying to solve and the type of training data you'll need.
Nearly one-third of incidents reported in Q3 were classified as "destructive attacks," according to a recent report, putting election security at risk leading up to the 2018 midterms.
A PowerShell malware downloader known as sLoad uses geofencing, customized emails and device reconnaissance to identify high-value Trojan targets.
X-Force IRIS Practice Lead Nick Bradley was on track for an illustrious career in the military police when a computer virus detoured his path towards protection of a different kind.
Security researchers observed the threat group Cobalt Gang using a downloader known as CobInt to infect and subsequently install additional malware on systems of interest.