Using AI/Machine Learning in Cybersecurity

Trend Micro

AI and machine learning have proven to be valuable technologies when it comes to detecting threats at time zero and across various vectors.  But there is a time and place for its usage. Join me during my monthly threat webinar and live Q&A session to learn: How you can help improve your ability to detect zero-hour threats by implementing AI/machine learning techniques. Areas in which Trend Micro has been using these AI/machine learning techniques. Why the best threat detection comes from a cross-generational blend of technologies.
Watch Now

Spotlight

Understanding Why Automated Machine Learning Behavioral Analytics with Contextualization provides better results than just big data centered approaches. Big Data Analytics is a very hot topic in IT Security circles lately. However Big Data by itself is not the panacea for all security ills that most believe it to be. This paper outlines how automated machine learning analytics with contextualization leads to better results and quickly identifies and repels attacks over approaches focused on Big Data.

OTHER ON-DEMAND WEBINARS

After updatein The Expanding Attack Surface: 5 Tips to Manage Third-Party Risk

BitSight

As organizations increase their reliance on third-party vendors for outsourced solutions, they expand their attack surface. Today’s digital environment offers tremendous opportunities for modern organizations. At the same time, there is more risk. Vulnerabilities and infections plague organizations around the globe — and their numbers continue to rise. The tips discussed in this webinar will help you start managing third-party risk to centralize your program and get a preliminary perspective of the risks you face. Once this foundation is established, you can build on it and shift to a more proactive approach to managing third-party risk — and limiting your exposure.
Watch Now

CIO on Data Privacy and Securing Sensitive Information Shared in the Cloud

Bank information security

As organizations are relying more and more on cloud collaboration tools to store and share sensitive customer data, security concerns abound. Failure to comply with regulation is not a risk worth taking, and the financial cost, time lost and reputation damage from even one data breach can jeopardize an entire company. After all, it is the people behind the files and sensitive data that you need to protect.
Watch Now

Ask the experts: What’s the worst web application security issue?

Synopsys

We know. It’s an impossible question to answer. There’s no such thing as a “worst web application security issue,” because every app and every organization has its own unique set of issues. But if you’re a development organization with limited resources, how do you know where to start? Which issues appear over and over in data breaches, exploits, and top N lists such as the OWASP Top 10? We asked some experts—and Twitter—to give us their opinions.
Watch Now

Anatomy of Container Attack Vectors and Mitigations

Data breach

Container adoption is skyrocketing, and so are concerns around securing container-based applications. While the market is still in its early phase of embracing this technology, lessons learned from securing Fortune 500 enterprise deployments against simple and sophisticated attacks alike are showing the path forward. Join us on an investigative journey as we explore popular attack vectors that have been used to breach container-based environments, provide best practices and tools to mitigate them, and discuss associated business risks.
Watch Now

Spotlight

Understanding Why Automated Machine Learning Behavioral Analytics with Contextualization provides better results than just big data centered approaches. Big Data Analytics is a very hot topic in IT Security circles lately. However Big Data by itself is not the panacea for all security ills that most believe it to be. This paper outlines how automated machine learning analytics with contextualization leads to better results and quickly identifies and repels attacks over approaches focused on Big Data.

resources