Machine learning is nothing new in cybersecurity, but in recent years, it’s gotten significantly better, says Rob Wood.
Search Results: cybersecurity (1489)
Rob Wood explains why cybersecurity ML models need clean and ample data, proper input ranges, and robust data platforms, such as the security data lake.
Your competitors are already doing it, so you do not want to put your head in the sand, says Rob Wood.
The integration of machine learning and AI capabilities in cybersecurity offer opportunities for improved specificity, consistency, and scalability.
Security leaders should have conversations with key personnel in HR, finance, and sales/marketing to ensure alignment between security and business goals.
These two complementary cybersecurity practices, when combined, enable organizations to quickly and effectively identify and mitigate potential cyber threats.
Leveraging threat intelligence for operational needs can make organizations more effective and adaptable in modern cybersecurity operations.
The new resource provides intelligence on malicious actors and attack vectors, especially those used in recent software supply chain attacks.
A communications point person is essential after a breach; they keep everyone in the loop, enabling cybersecurity folks to focus on cybersecurity.
Working with multiple partners delivers the best outcomes for enterprises looking to integrate critical elements of modern business infrastructure.
Bill Doerrfeld analyzes the state of modern CI/CD security, reviews the most common risks, and offers some safeguarding suggestions.
A briefing featuring three CISO Practitioner Analysts discussing the state of the market, CISO priorities, Multi-Cloud Cybersecurity, SaaS Security, and the impact of Generative AI.
Excerpted from the session on “AI, Cybersecurity, and Innovation,” this CIO Digital Summit moment features a cautionary tale about what caused a security breach at the SBA.
Cybersecurity teams must work closely with finance teams to help them determine what kind of data is essential for automation to deliver more benefits than risk.
Fear, uncertainty, and doubt (FUD) surround AI in cybersecurity, and practitioners need to have proactive conversations to combat it.
In this CIO Summit moment, Tony Uphoff, Rob Wood, Chris Hughes, and Frank Domizio discuss communication to stakeholders during a cybersecurity investigation.
Key RSA 2023 takeaways include a strong emphasis on AI defense, the push for an identity-centric security model, and management of the increasingly complex modern attack surface.
Chris Hughes reviews a new CISA publication, which explains why cybersecurity risk must be moved away from consumers to “secure by default” products.
In a survey of 1,600 business and tech leaders, Rubrik finds high levels of concern about cybersecurity preparedness, and reveals the extent of ransomware demands.
Chris Hughes and Rob Wood discuss the benefits of thinking in terms of themes and portfolios as a strategy for navigating a busy security expo floor.