The promise of connected vehicles is tremendous, and so are the security measures required to reach that destination without winding up in a ditch, both literally and figuratively. Highly complex systems from multiple vendors, with legacy standards, equipment, and infrastructure, all make very attractive targets for...
With advances in big data, artificial intelligence, machine learning and more, healthcare is primed to innovate. But do HIPAA, GDPR and other regulatory standards inhibit the ability to innovate? Scott Whyte of ClearDATA discusses healthcare's complex convergence of innovation and compliance.
The cyberthreat landscape is rapidly changing. As attacks continue to increase in volume and sophistication, agency defenses also must evolve.
In order to do so, many agencies are moving toward a more holistic, analytics-driven approach to security. By gaining an end-to-end view of what's happening inside an...
Choosing the right cybersecurity solution is challenging. You need to protect your organization from increasingly sophisticated threats, but you don't want to consume valuable IT resources with complex management and reporting requirements. In a crowded vendor landscape, how do you find the most effective security for...
The conversation around the cloud is not something new to the industry, with the topic showing up everywhere from IT back offices to Fortune 500 C-Suites. Despite cloud's ubiquity, there is still a lot to understand, regardless of your expertise level; there is not just one single cloud - and, for that matter, not all...
With customers expecting faster and more convenient services, the challenge isn't just intercepting suspicious transactions, but it's also about enabling legitimate transactions to proceed without interruption. To more effectively assess fraud risk, the ability to view omni-channel account activity in context is...
How the critical capability of machine learning can help prevent today's most sophisticated attacks
While many organizations are guarding the front door with yesterday's signature-based antivirus (AV) solutions, today's unknown malware walks out the back door with all their data. What's the answer?
Enter:...
In order to fully understand the impact of a breach, the detection of malware threats needs to be complemented by the proactive exploration of anomalous network behavior and inter-artifact relationships. This activity is supported by machine learning techniques, which can be leveraged to aggregate and classify events...
All ML technology isn't created equal.. While many public sector organizations are guarding the front door with yesterday's signature-based antivirus (AV) solutions, today's unknown malware walks out the back door with all their data. What's the answer?
Enter: Machine Learning (ML) technology. Learn what it is, how...
Artificial intelligence has been called a future technology that will drive the Fourth Industrial Revolution. Its impact on the job force is one leading reason. But within the technology industry, AI's impact is best seen in the realm of cybersecurity, where machine learning is helping organizations more readily react...
To catch today's most sophisticated cyber-attacks, organizations have to find all anomalies, however slight or subtle, inside their networks that contain millions of constantly changing data points, where billions of events take place every day. Finding a single abnormality in such a chaotic backdrop is a task that is...
Following two years of headline breaches at the likes of Target, JPMorgan Chase, Sony, Anthem and OPM, many industries are increasing regulations on cybersecurity. One of the more important requirements is detecting anomalous behavior within your company's network. So how can your security team distinguish between...
For years, financial services and other industries have experimented with first-generation user behavior analytics solutions. Now the security sector is starting to deploy second-generation solutions that have the promise of enhancing organizations' ability to spot and stop intrusions.
Register for this session to...
Fraud Summit - San Francisco 2014 - Could artificial intelligence have been used to prevent the high-profile Target breach? The concept is not so far-fetched. Organizations such as MasterCard and RBS WorldPay have long relied on artificial intelligence to detect fraudulent transaction patterns and prevent card fraud....
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.