Machine Learning

How to implement and use the MITRE ATT&CK framework

The MITRE ATT&CK framework is a popular template for building detection and response programs. Here's what you'll find in its knowledgebase and how you can apply it to your environment.

What is "reasonable security"? And how to meet the requirement

Privacy regulations such as the GDPR and CCPA require companies to provide "reasonable security" to protect customers' personal information. Here's how you might best achieve that standard.

Cyber espionage shows no signs of slowing down: Michael Sentonas, CrowdStrike

The bears, pandas, kittens and chollimas are out in the open, and the military top-brass is apprehensive. Michael Sentonas, VP of Technology Strategy at CrowdStrike, gives us a dekko at the cyber espionage threat landscape.

Google expands cloud security capabilities, including simpler configuration

New tools and services will help make it easier for enterprises to manage security with Google products as well as with Amazon and in their own private clouds and applications.

Data protection: The role of AI, analytics and the new CDO

As data protection takes center stage in the enterprise, companies will require a chief data protection officer (CDpO) instead of a chief digital officer (CDO).

Go DACS this fiscal

CIOs and IT leaders of India Inc. focusing on data, artificial intelligence, cloud and security will be an upright start on day one of the new fiscal year.

The need of the hour is not just AI, but explainable AI: Subram Natarajan, CTO, IBM India/South Asia

From explainable AI to blockchain to building a super-fast processor, Subram Natarajan, CTO of IBM India/South Asia tells us how IBM does what it does best – innovate to stay ahead. 

Majority of Indian businesses struggle with adequate data protection: Research

Both in India and globally, 76 percent respondents experienced a disruption in the last 12 months, while 30 percent experienced irreparable data loss in India. 

SoftNAS Cloud zero-day found: Why you should upgrade ASAP

SoftNAS Cloud users should upgrade immediately following a report by Digital Defense that the virtual cloud appliance is vulnerable to a session management security issue.

A tenth of security alerts that should be taken seriously are ignored: John Maynard, Cisco

From evolving threats to DNS attacks and IoT security, John Maynard, Global Security Officer at Cisco brings to light present-day security challenges the enterprise needs to brace up to.

Email remains one of the most popular threat vectors: Report

Cloud App Security report reveals, email remains one of the most popular threat vectors. In total, the solution detected and blocked nearly 9 million high-risk email threats in 2018.

 

What is shadow IoT? How to mitigate the risk

When someone in your organization starts using internet-connected devices without IT’s knowledge, that’s shadow IoT. Here's what you need to know about its growing risk.