Several years ago, the key players in the US Government security infrastructure developed a new, more proactive architecture with which to confront the growing cyber security threat. They named it Active Cyber Defense (ACD). The goal with ACD is to move from being reactive to proactive in..
Recent acquisitions deliver on long-term business strategy
Today’s digital environment is driving a new generation of applications, workloads and data that is radically different from what we have known, and is moving and changing at a speed and scale we have never seen.
Integration of Niara into Aruba ClearPass security portfolio creates industry's most complete visibility and attack detection solution; welcomes back Aruba alumni instrumental to Aruba's early success.
Data scientists will tell you that the basic AI algorithms that drive much of the new machine learning technology are very well known—much like the tools in a carpenter’s tool box. How you use them and the results you get depend on the skill and experience of craftsmen who use them.
I’m always amazed by the intrepid hurricane hunters who jump into airplanes and deliberately fly from one side of a hurricane to the other in order to help forecast its intensity and trajectory. Despite meteorological sensors, computer models and prior experience, there is still no substitute..
During our webinar last week with Intel Security, Eric Ogren from the 451 Group highlighted how machine learning-based security analytics (he calls the general category “Applied Behavior Analytics”) will form the basis of the next $1B+ security market opportunity. He subdivides ABA into several..
We’ve just finished a webinar with Intel Security and Eric Ogren from the 451 Group titled “How UBA and Machine Learning Can Turbocharge SIEM.” Having both a prominent industry analyst and a leading security vendor endorse the value of integrating machine learning and UBA with SIEM is very..
The security team has decided it is time to check out the new security analytics solutions that have burst on the market—the ones that tout machine learning, AI, behavior analytics, etc. You’ve been chosen to lead the charge. Where do you start?
There is a favorite saying to characterize a situation where the remedy to a problem shows up too late: “It’s like locking the barn door after the horse is stolen.”
For an elephant, Hadoop moves pretty quickly. However, unlike an elephant, Hadoop hardly resembles a monolithic behemoth. Individual modules update asynchronously and new functionality is continuously hatched in support of new applications and use cases. Those that build mission-critical Hadoop..