Cyber Security

Cyber AI for SaaS Security

Today’s dynamic workforce is dispersed, agile, and unpredictable. From a security perspective, user behaviors are more disjointed than ever – cutting across a wide range of email, cloud, and SaaS services, and often operating well beyond the corporate network. To protect today’s dynamic workforce, security teams must be equipped to discern if, when and how […]

Maximising eIDAS opportunities

The European Union’s Electronic Identification and Trust Services (eIDAS) regulation offers significant opportunities for organisations across the EU. For government agencies and businesses, eIDAS makes it faster, easier and more secure to support cross-border digital commerce. For trust service providers (TSPs), eIDAS establishes a business environment that will create expanded demand for solutions. To realise […]

nShield Bring Your Own Key

Cloud convenience meets security – Safer key management practices that strengthen the security of your sensitive data in the cloud – Stronger key generation using nShield’s high-entropy random number generator, which is protected by FIPS-certified hardware – Greater control over keys—use your own nShield HSMs in your own environment to create and securely export your […]

Triton 2.0 & The Future of OT Cyber-Attacks

Over the last few years, cyber-attacks on Operational Technology have increased rapidly in frequency and scale. As geopolitical tensions are reflected in cyberspace and attacker technologies become more advanced, the cyber-threat to critical infrastructure and other key operational systems is now front and center of national security concerns. There is a new frontline in cyber […]

Darktrace Cyber AI – An Immune System for Cloud Security

From small businesses seeking to cut costs to corporate innovation centers launching digital transformation projects, the large-scale journey to the cloud has fundamentally reshaped the digital business and the traditional paradigm of the network perimeter. As this perimeter dissolves, hybrid and multi-cloud infrastructure has become a part of the furniture of an increasingly diverse digital […]

Darktrace Cyber AI – An Immune System for Email

Email and collaboration platforms represent the connective tissue of any digital business. Information is shared, plans are hatched, and alliances are formed in the digital realm of written correspondence. Yet as a human-driven medium, email will always be fueled by a pervasive assumption of trust that stands as the ‘weakest link’ in an organization’s security […]

AI-Augmented Attacks and the Battle of the Algorithms

In discussions around the future of AI and cyber-threats, we often wonder when we can expect to see malicious or offensive AI attacks in the wild. While we have not yet seen conclusive evidence of execution, this report will show that all the tools and open-source research needed to facilitate an AI-augmented attack exist today. […]

CordenPharma Case Study

Many of CordenPharma’s customers are in early-stage clinical drug trials and thus require strong data protection. It takes several years and billions of dollars to bring new pharmaceuticals to market, a process which requires the safekeeping of both patient information and confidential IP. As a consequence, the pharmaceutical industry continues to be targeted by sophisticated […]

Cyber AI Response

Cyber security is one of the number one risks to businesses today. The problem is characterized by three fundamental challenges: the complexity of enterprises’ digital infrastructures, the speed and sophistication of today’s attacks, and the strain on overwhelmed security teams. In recent years, businesses have hungrily adopted new technologies – from cloud computing to the […]

Autonomous Response: Threat Report 2019

This report details seven case studies of attacks that were intercepted and neutralized by cyber defense AI, including insider threat, ransomware, and IoT attacks. While all threat scenarios were distinct, some fast-moving and others slow and stealthy, in all cases the subtle indicators of suspicious activity were only detectable using Darktrace AI, which learns what […]

Favourites

  • Favorite list is empty.
FavoriteLoadingClear favorites

Your favorite posts saved to your browsers cookies. If you clear cookies also favorite posts will be deleted.