RESOURCES

Machines Can Learn, But How?

Machines Can Learn, But How?

Many experts predict that machine learning (which any companies are currently investing in significantly) will be responsible for the most important breakthroughs in history. That includes being more important than the industrial revolution or the introduction of...

Data May Not Lie – But Liars Can

Data May Not Lie – But Liars Can

Figures don't lie,  the old saying, but liars can figure. Put another way, even accurate and honest-in-itself data can be presented in misleading ways to support a less-than-honest result. To protect against data-rich lies, we must learn to understand the limitations...

Peeling the Onion of Ransomware

Peeling the Onion of Ransomware

Ransomware attacks on computers are increasing, and they can have devastating consequences. Just look at the heart-breaking story of 17-year-old Joseph Edwards, an autistic college student who killed himself after being on the receiving end of a ransomware email...

Balance Between Top Security And User Access

Balance Between Top Security And User Access

If anything, recent attacks have shown that there is no single solution to the complex challenge of being protected against insider threats within an enterprise. However, one major defense against such issues is putting in place prudent policies, with strict limits,...

Outdated Software And Its Dangers

Outdated Software And Its Dangers

Antique, vintage, throwback. These words are often used in today's world to refer to objects that are cool, steady or unique. However, when it comes to software these are the last things you want. This blatant security risk may seem obvious, and no one likes to be...

Managing Your Security Patches

Managing Your Security Patches

For years, patch management has been a thorn in the side of organizations and continues to be a popular topic of discussion. Management of an organization's security is an increasingly critical aspect of the modern business. Technology continues to evolve and...

Motivated Employees Best Defense

Motivated Employees Best Defense

Attacks and raids on private company data are commonplace these days. The easiest way into a company is often for would-be fraudsters to find a disgruntled employee who can leak data. Indeed, this has been the case with several high profile data leaks in the past....

Combating Threats Using Data Analytics

Combating Threats Using Data Analytics

Stories in the media regarding the latest disturbing news about advanced persistent threats (APTs) are now a common sight, affecting well-known institutions, companies and government agencies. The frequency of these threats highlights that even the best IT network...

Is Big Data End For Traditional SIEM

Is Big Data End For Traditional SIEM

The use of data to tackle incoming threats is nothing new, and basic intrusion detection systems that monitor suspicious activity within a network have been around for at least three decades. However, during this time data volumes have increased exponentially, and...

Big Data And Marketing – Three Mistakes To Avoid

Big Data And Marketing – Three Mistakes To Avoid

Big Data analytics and Business Intelligence (BI) revolutions are having a big impact on the marketing world. But in all too many cases, IT is not giving marketing teams the information they really need. The result? CMOs are often resorting to building their own...