To serve the need of the ever-increasing population in urban areas is stressing the resources available and the management of these resources. Examples of these resources are water, electricity, west, traffic, transport, parking, health services. The urban planning teams are taking advantage of the technology advancements, availability affordability of high-speed connectivity, the proliferation of IoT devices, and other smart technologies…
Category: Machine Learning
Cybersecurity Automation Best Practices
The very common type of web attack today is credential stuffing. The attackers take stolen passwords from data breaches and use tools to automatically log in to every matching account on other websites to take over those accounts to steal money or the or data. Cybercrime has become a business, and for any growing business, it is all about scale…
CyberSecurity: How to Avoid Being Blinded by Artificial Intelligence
Ever growing cybersecurity threat vector due to digitization and proliferation of IoT devices, the impact, effectiveness of attacks and the shortage of skilled resources to identify, mitigate threats are the main challenges most of the organizations are facing today. This has lead security technology firms to look for options to reduce the efforts of security analyst and improve the effectiveness…
How Big Data is Impacting Cyber Security Operations
Business and organizations are digitally transforming, this spans from automated customer support systems to the intelligent business analytics. The interconnectedness and the use of disruptive technologies like IoT and cloud are enabling the business to grow faster and be competitive. The mammoth of data generated by IT infrastructure, operational technologies, and IoT is utilized for business analytics, improving operational efficiencies.…
The Rise of Next Generation Security Operation Center (NG-SOC)
The year 2017 has been dominated by the worst cyber-attacks and high profile data breaches. Just to give an example, Consumer credit score company Equifax has revealed that hackers accessed up to 143 million customer account details earlier this year. The data breach happened on July 29 and the details taken include names, social security numbers, drivers’ licenses, and credit…
Key Benefits of Cognitive Security
Security threats are growing in volumes and sophistication. Despite the implementation of best of breed detective and preventive controls from edge to endpoints, attackers can get into the organization’s network to steal information or hold organizations data hostage for ransom. Like latest ransomware attack impacted over 200 countries. In this age of IoT, BYOD and social networking – monitoring, analyzing and identifying the…
Artificial Intelligence and Changing Face of Cybersecurity
The cybersecurity attacks are evolved from wild predator-prey chase to well-designed targeted attacks which are creating significant financial and reputational damages to businesses and government. Identification of these attacks is becoming very difficult for the cybersecurity defense teams as the signs of these attacks are very subtle. Hacker are using disruptive technologies like Artificial Intelligence (AI) and machine learning to…