vulnerabilities

Machine Learning And The 5 Key Elements Of A Layered Defense

While machine learning, an application of artificial intelligence, is not new, customers still struggle to understand how it will benefit their efforts to defend their critical assets. When evaluating this technology, here are the five key components that are critical to effective machine learning and successful protection of the endpoint.

The Metamorphosis of an Open Source Bot - Mirai to Persirai

The Mirai malware has become particularly notorious for recruiting IoT devices to form botnets that have launched some of the largest distributed denial of service (DDoS) attacks ever recorded. This new Experts Corner from Robert Hamilton tracks the evolution of the Mirai botnet.

Seriously?! Can You Not Do That? Chapter III - External Internet Access

Between the massive amounts of data flowing through a company, the difficulty of managing its IT systems internally, relying on data synchronization and backup services, and the need to be budget conscious, much of this data may reside outside the firewall. But the use of convenient inward-out systems can put your company at risk if not managed properly.

Your Blockchain Might Be Dead - and Alive - on Arrival

Government and business leaders in every corner are experimenting with blockchain solutions. But these projects face the risk of becoming dead-on-arrival if their designers fail to prepare for the looming threat of quantum computers.

Stuck in Cybersecurity Hell? Professional Education Is the Only Way Out

If we want to escape from “cyber hell” – then professionals will need additional training, not only to learn the latest technology, but also to understand public policy and organizational management. Howard Shrobe is looking to change this through professional education initiatives at MIT.

It Takes A Village, And A Town Square

When thinking about the elements of a village, you may think about people, homes, transportation and commerce. However, there’s another critical component that sits passively in the backdrop yet plays a very frontal role. In this Experts Corner, Ryan Stolte connects the town square to the business bringing together people, process, and technology to reduce cyber risk.

Ransomware Trending as Weapon of Choice for Hackers

Ransomware is not a new threat, it has been around for at least 15 years, but it has become a trending one. Last year, FBI reported more than 2,500 incidents. The figures are likely much higher as most companies and organizations do not want to publicly disclose that they have been breached, and especially extorted. Ransomware is a growing global problem.