Artificial Intelligence, Automation, Cyber Security, Machine Learning

Cybersecurity Automation Best Practices

The very common type of web attack today is credential stuffing. The attackers take stolen passwords from data breaches and use tools to automatically log in to every matching account on other websites to take over those accounts to steal money or the or data. Cybercrime has become a business, and for any growing business, it is all about scale…

Continue Reading

Artificial Intelligence, Automation, Big Data, Cyber Security

From Cybersecurity Sisyphus to Cybersecurity Alchemist

Greek civilization was the most influential civilization in the history of the world. Although people of all countries, eras, and stages of civilization have developed myths that explain the existence and workings of natural phenomena, recount the deeds of gods or heroes, or seek to justify social or political institutions, the myths of the Greeks have remained unrivaled in the…

Continue Reading

Artificial Intelligence, Big Data, Cyber Security, Machine Learning

CyberSecurity: How to Avoid Being Blinded by Artificial Intelligence

Ever growing cybersecurity threat vector due to digitization and proliferation of IoT devices, the impact, effectiveness of attacks and the shortage of skilled resources to identify, mitigate threats are the main challenges most of the organizations are facing today. This has lead security technology firms to look for options to reduce the efforts of security analyst and improve the effectiveness…

Continue Reading

Artificial Intelligence

Impact of Artificial Intelligence & Machine Learning on Cyber-security Career

The introduction of cloud, IoT and digital transformation is increasing the attack vector. Security professionals need to expand the security coverage to protect hybrid cloud, SaaS and now Microservices and Function as a Service. The attackers are getting empowered by advancement in technologies like Artificial Intelligence and machine learning to automate the repetitive task like scanning targets and keep them…

Continue Reading

Artificial Intelligence, Compliance, Cyber Security, Machine Learning

The Rise of Next Generation Security Operation Center (NG-SOC)

The year 2017 has been dominated by the worst cyber-attacks and high profile data breaches. Just to give an example, Consumer credit score company Equifax has revealed that hackers accessed up to 143 million customer account details earlier this year. The data breach happened on July 29 and the details taken include names, social security numbers, drivers’ licenses, and credit…

Continue Reading

Artificial Intelligence, Cyber Security

Risk Management Using Artificial Intelligence

When we go through the pages of history, we can easily make out, the economic activities have a substantial risk, and management of these risks is essentially safeguarding the impact on the society and human life. In this era of digitization, businesses have relied more and more on the digital information. Protecting digital information from the risk of compromise, accidental…

Continue Reading

Artificial Intelligence, Cyber Security, Machine Learning

Key Benefits of Cognitive Security

Security threats are growing in volumes and sophistication. Despite the implementation of best of breed detective and preventive controls from edge to endpoints, attackers can get into the organization’s network to steal information or hold organizations data hostage for ransom. Like latest ransomware attack impacted over 200 countries. In this age of IoT, BYOD and social networking – monitoring, analyzing and identifying the…

Continue Reading

Artificial Intelligence, Cyber Security, Machine Learning

Artificial Intelligence and Changing Face of Cybersecurity

The cybersecurity attacks are evolved from wild predator-prey chase to well-designed targeted attacks which are creating significant financial and reputational damages to businesses and government. Identification of these attacks is becoming very difficult for the cybersecurity defense teams as the signs of these attacks are very subtle. Hacker are using disruptive technologies like Artificial Intelligence (AI) and machine learning to…

Continue Reading