Artificial intelligence can be used to create a model of an organization's infrastructure that can make detecting ransomware easier, says Alberto Pelliccione of ReaQta.
Australia is taking an aggressive approach to securing its critical infrastructure, which is vital to public safety and the economy, says Australian Member of Parliament Gai Brodtmann.
The quality and completeness of data is key to being able to perform meaningful analytics to detect malicious events, says Damien Smith of Australia's ANZ Bank.
Business intelligence technologies are increasingly being used with artificial intelligence to extract events that defenders need to know about, says Anurag Sanghai of Intellicus.
Layering defenses and maintaining strong security postures help mitigate risks as an organization's attack surface expands, says Narelle Devine, CISO of the Australian Department of Human Services.
The growing use of multiple cloud services in enterprises is creating new security challenges, says Cisco's Harry Dogan, who shares common mistakes and fixes.
Regulatory compliance and technology innovation are making security more complex, so organizations need to look beyond technical base measures for metrics, says SAI Global's Andrew Bissett.
The best way to take a holistic approach to the current threat landscape is to define security issues as business problems and then put the problem before the solution - not the other way around, contends RSA CTO Zulfikar Ramzan.
Malware detection needs to shift to detecting anomalous behavior, rather than depending on signature-based detection technologies to deal with such threats as sandbox-evading malware, says Verizon's Ashish Thapar.
While IT and OT integration has brought about new levels of operational efficiency, it has also introduced serious cyber risks that conventional IT security approaches might fail to address, says IBM Security's Paul Garvey.
Threat analytics involves understanding where threats to key data assets exist and planning your mitigation strategy around that, says Skybox's Gerry Sillars.
The STIX and TAXII standards for threat intel interchange have undergone a major upgrade to v2.0. LookingGlass CTO Allan Thomson, who's been closely involved in its development, describes the role of these enhanced standards.
Because of the lack of specialists with the skills needed to run security operations in the cloud, intelligent automation is essential, says Microsoft's Diana Kelley.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.