Machine learning has revolutionized our world. It powers our smart phones, determines which advertisements we view and soon it will dominate the automobile industry through self-driving cars. Even Google now
Is Yesterday’s Trusted Employee Today’s Insider Threat? And How Would You Know?
What if you could instinctively know whom to trust within your organization? Better yet, what if you could automatically reassess a person’s level of trustworthiness, day by day and month
Making Bayesian Networks Accessible
Bayesian Networks are among the more sophisticated capabilities applied to security analytics, relying as they do on decision science and statistics rather than software engineering expertise. But in many implementations
Three Security Analytics Approaches That (Mostly) Don’t Work
Note: This is the introductory post of a five-part series assessing three common security analytics approaches that typically don’t work well. Future articles will examine each of the three in
Managing cyber alert overload: how to find high-priority threat signals amid the noise
A new study by FedScoop finds that one-third of government and industry IT professionals surveyed say they receive more than 1,000 cyber-threat alerts per day, with 10 percent saying they