Cyber Security

Darktrace Cyber AI Analyst

The myriad of security tools used by businesses today creates massive quantities of data and surfaces too many alerts for analysts to effectively manage. As threats become increasingly sophisticated and the cyber security industry continues to face a skills shortage, over-worked and under-resourced teams urgently need augmentation. Cyber AI Analyst, the product of a research […]

Secure Beyond Breach

Cyberspace connects every part of civilization. It is the new map of the world. A good security segmentation (often referred to as microsegmentation or even just segmentation) strategy helps you see and control your terrain, map your own applications, and set rules for how servers interact. Rather than simply segmenting networks on a macro level, […]

Endpoint Security Effectiveness

Organizations are indeed dealing with many of the tactics, techniques, and procedures (TTPs) of today’s sophisticated and varied ransomware attacks. Most respondents have updated their endpoint security to include endpoint detection and response (EDR) capabilities. The majority of respondents admit that their endpoint security does not stop everything, and that it needs some time to […]

Cyber AI for SaaS Security

Today’s dynamic workforce is dispersed, agile, and unpredictable. From a security perspective, user behaviors are more disjointed than ever – cutting across a wide range of email, cloud, and SaaS services, and often operating well beyond the corporate network. To protect today’s dynamic workforce, security teams must be equipped to discern if, when and how […]

Maximising eIDAS opportunities

The European Union’s Electronic Identification and Trust Services (eIDAS) regulation offers significant opportunities for organisations across the EU. For government agencies and businesses, eIDAS makes it faster, easier and more secure to support cross-border digital commerce. For trust service providers (TSPs), eIDAS establishes a business environment that will create expanded demand for solutions. To realise […]

nShield Bring Your Own Key

Cloud convenience meets security – Safer key management practices that strengthen the security of your sensitive data in the cloud – Stronger key generation using nShield’s high-entropy random number generator, which is protected by FIPS-certified hardware – Greater control over keys—use your own nShield HSMs in your own environment to create and securely export your […]

Triton 2.0 & The Future of OT Cyber-Attacks

Over the last few years, cyber-attacks on Operational Technology have increased rapidly in frequency and scale. As geopolitical tensions are reflected in cyberspace and attacker technologies become more advanced, the cyber-threat to critical infrastructure and other key operational systems is now front and center of national security concerns. There is a new frontline in cyber […]

Darktrace Cyber AI – An Immune System for Cloud Security

From small businesses seeking to cut costs to corporate innovation centers launching digital transformation projects, the large-scale journey to the cloud has fundamentally reshaped the digital business and the traditional paradigm of the network perimeter. As this perimeter dissolves, hybrid and multi-cloud infrastructure has become a part of the furniture of an increasingly diverse digital […]

Darktrace Cyber AI – An Immune System for Email

Email and collaboration platforms represent the connective tissue of any digital business. Information is shared, plans are hatched, and alliances are formed in the digital realm of written correspondence. Yet as a human-driven medium, email will always be fueled by a pervasive assumption of trust that stands as the ‘weakest link’ in an organization’s security […]

AI-Augmented Attacks and the Battle of the Algorithms

In discussions around the future of AI and cyber-threats, we often wonder when we can expect to see malicious or offensive AI attacks in the wild. While we have not yet seen conclusive evidence of execution, this report will show that all the tools and open-source research needed to facilitate an AI-augmented attack exist today. […]

Favourites

  • Favorite list is empty.
FavoriteLoadingClear favorites

Your favorite posts saved to your browsers cookies. If you clear cookies also favorite posts will be deleted.