Avoiding a surprise attack from an opponent is difficult and nearly impossible to counter, as we’ve seen throughout history in examples of sports, chess, and warfare. In the cyber domain, this holds true for zero-day attacks or "surprise moves" as well. As cyber attackers refine their tactics and employ both evasive attack avenues and malware, security professionals must look for hints of intrusion within the sea of data. Below are four key preventative actions organizations can take to mitigate the impact or avoid a surprise attack on the network: Establish Ground Truth: Understand [ … ]
‘Big Data’, ‘analytics’, ‘machine learning’, ‘AI’…the list of misused and misunderstood terms grows exponentially the more technology evolves. Of course, most IT executives understand the definitions and capabilities of emerging technologies, and many even see the opportunities that are possible – it’s the business executives that may need further explanation. I’ve heard many variations of the same story. A CEO walks into a meeting inspired by a new buzz word they read about in an airline magazine. They don’t exactly know what it is, but they know they need it. The problem lies [ … ]