Blog
Deep learning and machine learning to transform cybersecurity
September 16, 2019
0 Comment
By Soumik Roy
CYBERSECURITY specialists have been betting on artificial intelligence (AI) to defend their organizations against sophisticated cyberattacks for quite a while now — and it seems as though deep learning and machine learning have the potential to deliver. AI is a broad term that encompasses computer vision, machine learning, and deep
Protect your business and customers – invest in reliable cyber security
September 16, 2019
0 Comment
By Sara Rego
Heart Internet explores the importance of investing in reliable cyber security.It’s no secret that cyberattacks are on the rise. According to a Clark School study at the University of Maryland, in today’s world a website is hacked every 39 seconds. Cybercrime is one of the biggest threats facing modern businesses,
How Artificial Intelligence Is Changing Cyber Security Landscape and Preventing Cyber Attacks
September 14, 2019
0 Comment
By Remesh Ramachandran
The world is going digital at an unprecedentedly fast pace, and the change is only going to go even faster. The digitalization means everything is moving at lightning speed – business, entertainment, trends, new products, etc. The consumer gets what he or she wants instantly because the service provider has
SOAPA vs. SOAR: How these security terms differ
September 13, 2019
0 Comment
By Jon Oltsik
SOAPA and SOAR look the same, but the terms are vastly different. Security orchestration, automation, and response (SOAR) tools represent a component of a security operations and analytics platform architecture (SOAPA). I came up with the security operations and analytics platform architecture (SOAPA) concept in late 2016. As a review,
Balancing innovation and security in digital transformation
September 12, 2019
0 Comment
By Stuart Reed
Businesses everywhere are undergoing digital transformation. Widespread adoption of mobile and cloud platforms, along with recent advances in technologies such as AI, blockchain and quantum computing are reshaping how we work. But the increased opportunities these developments represent are accompanied by a growing number of threats to our security. In