AD360 | December 8, 2021Reinventing cybersecurity with a multi-layered approach The complexity of cybersecurity threats has increased over the years. Additionally, the...
IT Security | June 2, 2021The importance of behavior analytics in your organization's cybersecurity Collin's dictionary defines "behavior pattern" as a recurrent way of acting by an...
General | August 14, 2020Five worthy reads: How augmented data management can pave the way for better decision-making Five worthy reads is a regular column on five noteworthy items we've discovered while...
General | February 28, 2020Five worthy reads: XAI, a move from black to white Five worthy reads is a regular column on five noteworthy items we’ve discovered while...
General | February 14, 2020Five worthy reads: Why AI-as-a-Service, or AIaaS, is quickly growing in popularity Five worthy reads is a regular column on five noteworthy items we’ve discovered while...
General | December 13, 2019Five worthy reads: The privacy implications of AI Five worthy reads is a regular column on five noteworthy items we’ve discovered while...
General | October 25, 2019Five worthy reads: Cybersecurity drift: Leveraging AI and ML to safeguard your network from threats Five worthy reads is a regular column on five noteworthy items we’ve discovered while...
Log360 | July 15, 2019Five reasons to choose Log360, part 4: Advanced security features Part two and part three of this blog series gave a detailed look at Log360's in-depth...
Log360 | April 22, 2019Free webinar on accelerating threat detection and response with user and entity behavior analytics (UEBA) Most security personnel take measures to combat threats from outside the network. However,...
General | February 15, 2019Five worthy reads: AI and ML: Keys to the next layer of endpoint protection Five worthy reads is a regular column on five noteworthy items we’ve discovered while...
General | February 1, 2019Five worthy reads: Augmented analytics paves the way Five worthy reads is a regular column on five noteworthy items we’ve discovered while...
General | February 15, 2018Five worthy reads: Machine learning, the next phase of cybersecurity Five worthy reads is a regular column on five noteworthy items we’ve discovered while...