Malicious insiders pose an existential threat to any organization. Technical countermeasures only address part of the problem and are increasingly expensive. What are some new approaches to efficient and effective insider threat detection?
It is dangerous to be related to a terrorist, let alone a senior terror operative. Such an association can lead to one's imminent death while participating in an attack encouraged by a family member.
How does Eric Clay, System Director of Public Safety for CoxHealth, address common healthcare security challenges, and what initiatives has he taken to improve the safety of staff and patients?
Providing a safe and secure environment where clinical staff can focus on administering excellent patient care requires the CoxHealth Public Safety team to address all challenges head-on. How does Eric Clay, System Director of Public Safety, provide a safe and secure environment?
If enterprise security continues to mature as a business function, in most enterprises, senior management will ask for a set of metrics to measure performance.
January 1, 2020
What is the point of spending time, resources and money on your security program if you can't tell whether it's working or not? It's just as important to establish the right metrics for a security program as it is to have such a program in the first place.
2020 heralds a few major shifts that will transform cybersecurity: ransomware attacks, artificial intelligence, facial recognition and mobile cybersecurity.
As we enter the new year, conversations within the security community often inevitably deal with issues and programs that will be of greatest concern to leadership in the coming months.
In 10 months, U.S. citizens will elect a new president. As the race heats up and election day nears, a key component of the U.S. election infrastructure remains vulnerable to cyberattacks and misinformation campaigns.
In this year’s Cyber Security Predictions, the WatchGuard Threat Lab has imagined the top cyber attacks we’ll see in 2020 and has also provided tips for simplifying your approach to stopping them.
Lots of security vendors talk about integrating innovative techniques using Artificial Intelligence. In cybersecurity, this often boils down to supervised or unsupervised anomaly detection of measures attributes. However, in many cases there is a big gap between the identification of anomalies and transforming them into actionable data.
There are lots of buzzwords floating around cybersecurity: machine learning, artificial intelligence, supervised and unsupervised learning … In many cases these advanced technologies are based on anomaly detection.