Four years ago, it was argued that software would replace Tier One Security Analyst roles across the industry. But at Secureworks, we view the infusion of automation into the SOC differently. Kevin Hanes, Secureworks' Chief Operations Officer, believes the SOC of the future will bring together the best of data science...
As online activity increases and digital footprints expand, so too does the overall application attack surface. The recent shifts in consumer behaviours have greatly accelerated business digital transformation and compounded the associated application fraud and abuse.
In response, security, fraud and marketing...
Behavioral biometrics have evolved, and Michael Yeardley of LexisNexis Risk Solutions says the new generation of controls can not only identify the bad guy - but also "the really clever bad guy." He explains how.
Cyberattacks have rapidly evolved since the advent of online transacting almost 25 years ago, with attackers continually escalating and refining their techniques to protect their illicit revenue streams. More recently, cybercriminals have been weaponizing AI tools to easily bypass traditional security controls and...
Though parts of the world are slowly transitioning back to 'normal', cyber-attackers have not slowed down and may even be waiting to take advantage of new business challenges.
Join, Justin Fier - Director of Cyber Intelligence & Analytics, as he discusses how traditional cyber security tools are ill-equipped to...
Cybercriminals have weaponized AI tools to easily bypass traditional security controls and create effective new attacks such as credential stuffing. That means it's time to shift to next gen cybersecurity, says Shuman Ghosemajumder of F5. And here are the technologies that will get you there.
Over the course of the last decade, the nature of cybersecurity has changed, evolving past the idea of cybersecurity being a system of logical controls to fully prevent attackers from infiltrating systems, to becoming a data analytics problem based on behavioral analysis of attack patterns to detect them when they do....
Threats continue to evolve in complexity at unprecedented rates, making it a challenge to identify legitimate threats and respond timely. Having a threat management approach is key and infused with AI and Machine Learning, we can make decisions faster, identify threats earlier, perform investigations better, and begin...
The short history of cloud computing has been interesting and uneven. Today, a more flexible and agile vision of the cloud is emerging - one that will help educators streamline test procedures, enable real-time collaboration across campuses, and more. This new cloud approach offers developers and operation teams the...
The short history of cloud computing has been interesting and uneven. Today, a more flexible and agile vision of the cloud is emerging - one that will help agencies solve problems ranging from optimizing traffic flows to improving citizen safety. This new cloud approach offers developers and operation teams the...
Bots touch virtually every part of our digital lives; they populate our news feed, tell the weather, provide stock market updates, and control search rankings. We use bots to book travel, access online customer support - even turn on the lights in our own homes.
It's no wonder that bots also now account for over half...
AI will enable breakthrough advances in areas like healthcare, agriculture, education and transportation; it's already happening in many ways. But new technology also inevitably raises complex questions and broad societal concerns. As we look to a future powered by a partnership between computers and humans, it's...
in this session we'll first examine the current state of bot automation and the different attack modalities currently conducted through machine automation. We'll then dive into attacker tools, their infrastructure, and compromised credentials to demonstrate how they were used against a major retailer in a real-world...
In this exclusive one-on-one discussion, we will hear from Chris Calvert, Co-Founder and Product VP for Respond Software, to get his insights on:
Is AI falling short?
How do we successfully balance human and machine approaches to security?
How do we get on the right path?
No SOC has the resources or time to review and manage all its alerts manually. Overwhelmed security teams often ignore "low value" notifications for the sake of efficiency. This forced adjustment in workflow allows potential security threats to slip through the cracks.
In today's world of automation and AI, it's...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing omnibus.healthcareinfosecurity.com, you agree to our use of cookies.