You searched for artificial - Page 8 of 9 - Exabeam

2020 Red and Blue Team Survey Reveals Positive Trends 

In 2019, Exabeam conducted its first study of red/blue team testing. Testing by red teams and defended by blue teams is a popular method for companies to find and address their most significant vulnerabilities and security gaps. For clarification on what we mean by red team and blue team, because there are many different descriptions and even capitalizations which can change the meanings, we are talking offensive (red) versus defensive (blue) cybersecurity teams. A red[...]

What the Twitter Attack Teaches Us About Manipulated Insiders

Do you know everyone who has access to your business’s systems? The recent Twitter hack has many cybersecurity teams taking a closer look at who has access to their systems. In mid-July, dozens of high-profile accounts on the social media platform were compromised through social engineering, with big names like Bill Gates, Elon Musk and Joe Biden affected.  The most disturbing aspect of the attack, though, is what the breach exposed about the site’s security[...]

Political Campaigns and Phishing: Five Things Campaign Staff Can Do to Stay Safe

Businesses, consumers, and government agencies are at risk of a cyberattack every day. But as the 2020 political campaign heats up, candidates and their staff are all too aware of the spotlight being shone on them. With experts citing security breaches, particularly phishing, as a top concern for the 2020 election, it’s more important than ever that campaigns find ways to protect themselves. One of the best things campaign managers can do is to educate[...]

Are Vulnerabilities in our U.S. Elections Insurmountable? Part 1

Security around elections is a concern for the U.S. and the global community. From “fake news” to social engineering and ransomware, there are several areas across the election process that can be unsecure and open to attacks that shift public opinion or sow distrust among voters. In this two-part blog series, we’ll look at vulnerabilities in campaigns, the election process, and the voting system. In part one, we’ll explore the security challenges with our campaigns.[...]

Machine Learning for Cybersecurity: Next-Gen Protection Against Cyber Threats

Information security tools and techniques have to move fast to keep up with new and evolving cyber threats. The cutting edge of cybersecurity technology leverages machine learning making it possible for organizations to stay ahead of cyber threats. These are algorithms and systems that can use data from networks and applications to smartly detect, investigate, and even respond to cyber threats. In this article you will learn: What is machine learning for cybersecurity and how[...]

Census Security: Solutions for Protecting Complex Cloud Systems

The U.S. Constitution mandates a decennial census of everyone living within the country. Results determine congressional districts, apportion congressional seats for each state, and guide transfer of nearly a trillion dollars to programs’ recipients including an army of federal, state and local employees and contractors who administer and dispense the money and services. The census also produces an accurate national database of personally identifiable data. Needless to say, the nation must prevent malicious actors from[...]

Using AI to Prevent Sensitive Data Loss from Law Firms

Artificial intelligence is finding exciting new applications and changing workflows in many industries. One example of change is for law firms, particularly larger organizations that process expansive quantities of sensitive data. Before AI, the discovery process for a complex litigation may have required large teams of a dozen or more attorneys to analyze data for weeks or months. With AI such as that applied by iManage for document management, results for a discovery project can[...]

MITRE ATT&CK®: Using Exabeam for Threat Hunting and Investigations

The MITRE ATT&CK knowledge base was created to help track threats and methodologies to give security practitioners a common vocabulary to tackle cybersecurity threats. By tracking the tactics, techniques, and procedures (TTPs) associated with today’s security risks, security analysts can better safeguard against them. Analysts use the information to learn more about attacks and develop strategies to battle them, while managers can compare the information to their security procedures and adjust accordingly. Exabeam Product Manager[...]

Beat Cyber Threats with Security Automation

It is becoming increasingly difficult to prevent and mitigate cyber attacks as they are more numerous and sophisticated. Security teams often have no way to effectively manage the thousands of alerts generated by disparate security tools. To investigate these potential threats, analysts must also complete manual, repetitive tasks. Combined with the strain of insufficient time and headcount, many organizations simply cannot cope with the volume of security work limiting their incident response capabilities. To improve[...]

Eight Cybersecurity Predictions for 2020

It’s that time of year when predictions abound, and skeptical battle-worn security professionals will often side with Nils Bohr, the physics Nobel laureate who said, “Prediction is very difficult, especially about the future.” Nevertheless, readiness requires looking forward so we asked security experts within Exabeam, partners and customers to describe top strategic trends in cybersecurity.  Here are the eight cybersecurity predictions for 2020, structured by People, Processes and Technology—the familiar pillars of organization transformation that[...]

101 results found for artificial.
Showing results 85 - 96