Artificial Intelligence in the Cyber Domain

BrightTALK

Artificial intelligence (AI) offers businesses better ways to defend their systems, but it also offers hackers better ways to compromise those systems. Companies need to understand how AI will impact cyber security before they rely on it for network defense. On April 19, join Michelle Cantos, Strategic Intelligence Analyst and Awalin N. Sopan, Engineer, Analysis Platform, for the second installation of our three-part webinar series on AI that covers: How AI technology can enhance a businesses’ defensive capabilities. How cyber threats can use AI to improve the sophistication and scope of their attacks. How FireEye uses machine learning to bolster its internal defenses and tools.
Watch Now

Spotlight

Malware has come a long way since its earliest days, and aided by the rapid development of the internet it’s certainly faster spreading than the weeks it took in the days of floppy disk transfer. We’ve created this infographic to sumarise key developments in the history of malware and the fight against them, from Pakistani Brain in 1986 to the Windigo malware that hit earlier this year.


OTHER ON-DEMAND WEBINARS

Compliance Does Not Equal Security – A Risk-Based Plan for ePHI Protection

"With the emergence of big data healthcare analytics, electronic health information exchange, clinical data warehousing, and other technologies for optimizing patient care, the healthcare industry has never been more reliant on electronic data and the strict requirements associated with the data. The advances in business processes, technology and regulations require that data security initiatives evolve to address new and growing threats. Coincidentally, in a recent survey, 69% of organizations felt that provisions of the Affordable Care Act (ACA) have the effect of increasing or significantly increasing risks to patient privacy and security. Chasing compliance is an expensive proposition that doesn’t adequately address the current security threats and vulnerabilities. Organizations that simply want to comply with the regulations are already at risk. A more effective program is risk-based -- one where incremental changes to controls can be made in real-time to more effectively combat current threats to your security program.
Watch Now

Orchestration: Combatting Broken Security Processes

FireEye, Inc.

Cyber security is an asymmetric fight. Most security operations centers (SOCs) are understaffed and overwhelmed with alerts. Traditional security relies on manual intervention and containment. Attackers have access to intellectual resources, computing power, and the backbone of the fastest digital delivery networks. They can change the tools, shift to new delivery methods and constantly fine-tune how they approach their goal of infiltrating your network.
Watch Now

"HP Cyber Risk Report 2015: The Past is Prologue"

HP

The 2015 edition of the HP Cyber Risk Report, drawn from innovative work by HP Security Research (HPSR), examines the nature of currently active vulnerabilities, how adversaries take advantage of them, and how defenders can prepare for what lies ahead. Jewel Timpe, HPSR’s senior manager of threat research, describes the report’s findings and explains how this intelligence can be used to better allocate security funds and personnel resources for enterprises looking toward tomorrow.
Watch Now

Social media and email phishing: How to protect financial information from fraudsters

Channel Futures

Email phishing remains a top security threat. Even smart and savvy people are fooled everyday by these malicious emails. They’re even harder to spot now that bad actors use information from social media to personalize their attacks against your customers and your business. In this webinar, Brian Wickenhauser, Mastercard’s Vice President of Security Events Management, will share examples of phishing attempts, how to spot them, ways to combat them and tips for improved safety – all important information to add to your security training programs.
Watch Now

Spotlight

Malware has come a long way since its earliest days, and aided by the rapid development of the internet it’s certainly faster spreading than the weeks it took in the days of floppy disk transfer. We’ve created this infographic to sumarise key developments in the history of malware and the fight against them, from Pakistani Brain in 1986 to the Windigo malware that hit earlier this year.

resources