Machine learning systems adapt their behavior on the basis of a feedback loop, so they can overlearn and develop blind spots, which if not understood by practitioners can lead to dangerous situations, says Sam Curry of Cybereason.
Getting a telemetry stream back from applications can help organizations to "adjust much more quickly to see how practical attacks are happening on the endpoint and then go to mitigate," says Aaron Lint of Arxan.
Two recent ransomware attacks on mental healthcare providers serve as reminders of the security incident response and risk mitigation pressure faced by entities handling especially sensitive patient information.
Backers in the U.S. Congress are hoping that the third time is the charm for an internet of things cybersecurity bill that would set minimum security standards for the connected devices that the federal government purchases for various projects.
Criminals wielding a new strain of ransomware called Cr1ptT0r are targeting network-attached storage users. The campaign was first discovered in February after owners of D-Link network storage enclosures reported that their devices were being crypto-locked.
In the wake of the EU's GDPR and other legislation, privacy suddenly is the hot topic within enterprises and governments alike. A panel of experts discusses the privacy imperative and what it means for security.
More than half of 250 anti-virus applications available in Google's Play Store offer insufficient protection against malicious software, according to a new study by testing firm AV Comparatives. One clear takeaway for all Android anti-virus users: Select products carefully.
Broadcom acquired CA. AlienVault became AT&T Cybersecurity. These are just two of the deals that headlined in 2018. What does the 2019 market hold? Brad Topchick, managing director of Mooreland Partners, shares insights.
Security has the opportunity - or challenge - to help drive digital transformation within the enterprise. Al Ghous of GE Digital describes how security leaders can maximize their influence and avoid potholes.
According to some researchers, up to 61 percent of recent data breaches were a result of a third-party vulnerability. Matan Or-El, CEO of Panorays, discusses the weakest links of supply chain security and how to strengthen them with automated tools.
CenturyLink has opened Black Lotus Labs, which focuses on threat research used to share information with customers as well as initiate takedowns of networks used to support cybercrime activities, says Peter Brecl, a director at the company.
In the latest stop in this roundtable dinner series, ISMG and Zscaler visited Seattle on Feb. 26 to discuss security's role as a catalyst for digital transformation. It was a diverse crowd - and a mature conversation, says Bil Harmer, Americas CISO with Zscaler.
ISMG and Zscaler hosted a roundtable dinner in Columbus, OH on Feb. 22 focused on security's role in digital transformation. Managing expectation for security as a core component of business enablement was a core component of the discussion.