by Shlom | Jun 12, 2017 | Uncategorized
There are a number of guidelines to follow when it comes to protecting your data. Questions on how best to achieve this often include examples like “which data should be classified as sensitive?” and “which groups of users should have access to this data?” In fact,...
by Shlom | Jun 12, 2017 | Uncategorized
As networks continue to grow in size, so invariably does the number of endpoints grow – all of this makes endpoint threat detection more difficult than ever. At the same time, so too does detecting them become ever more important. As such, a very reasonable question –...
by Shlom | Jun 12, 2017 | Uncategorized
Almost every day there is news of yet another security breach. Yet still too many organizations assume they are immune from attack because they practice their own ‘good hygiene’ when it comes to internal security. Time and time again, however, companies...
by Shlom | Jun 12, 2017 | Uncategorized
Those of us in the world of cybersecurity are facing increasingly dynamic threats from profit-driven and sophisticated cybercriminals. We are now living in a world where attacks are driven, more and more, by well-funded organized crime as well as nation states. Given...
by Shlom | Jun 12, 2017 | Uncategorized
Typically, the method of dealing with SQL injection attacks is to install a firewall in learning mode and train it to recognize attacks. This is far from perfect, but until now it’s been the only way. However, there are now claims that this has been solved with...
by Shlom | Jun 12, 2017 | Uncategorized
Many of the statistical techniques are useful for both prediction and explanation in the world of advanced analytics. However, certain techniques are necessarily more suited for one than the other. For example, techniques such as Mixed Linear Models are primarily used...