Search

Page 3 of 472 results

Blog

Cognitive Security: The Future of Cybersecurity is Now

by Alexei Balaganski

... them anywhere at any time, the traditional notion of security perimeter ceases to ... with a new generation of security solutions, which KuppingerCole has dubbed “Real-Time Security Intelligence”. Thanks to a technological ... huge amounts of security data across multiple sources in real time. Various correlation algorithms ... is to process all of those 80% of security intelligence data and make it available in structured ... provide additional external threat intelligence. Second, cognitive security would provide analysts ...

Blog

OpenC2 – Standards for Faster Response to Security Incidents

by Martin Kuppinger

... initiative, driven by the NSA (U.S. National Security Agency) and several industry organizations ... coordinated, to act in a synchronized manner, and in real-time, upon attacks. Communication between these ... topic aligns well with the Real-Time Security Intelligence, an evolving area of software solutions and ... in that area are Security Intelligence Platforms (SIP) and Threat Intelligence Services. SIPs provide ... anomalies and attacks, while Threat Intelligence Services deliver information about newly ...

Blog

The Role of Artificial Intelligence in Cyber Security

by Martin Kuppinger

... I better write “Artificial” Intelligence?) will play in Cyber Security. There is no doubt that ... KuppingerCole, we started looking at what we call Real Time Security Intelligence (RTSI) a couple of years back. We published ... such as in IBM Watson for Cyber Security, to provide a better understanding of cyber ... and unstructured information. Cognitive Security solutions such as IBM Watson ... awareness for “AI in Cyber Security” as well as the field of Real Time Security Intelligence. This is, regardless of all ...

Blog

Big Data and Information Security Study

by Alexei Balaganski

... traditional approaches to information security can no longer keep up. As the security industry’s response to ... the whole enterprise in real time. These Real-Time Security Intelligence solutions are combining Big ... Data and advanced analytics to correlate security ... critical role of security analytics technology in their corporate security strategies, earlier this ... Business Intelligence – to conduct a global survey on Big Data and Information Security. Our ...

Blog

Microsoft Azure Security Center

by Alexei Balaganski

... about anyway? In short, Azure Security Center is a security intelligence service built directly into the ... various security events in near real-tome, fuses them with the latest threat intelligence ... and third party security intelligence feeds and generates prioritized security alerts when ... In other words, Microsoft Azure Security Center is a full-featured Real-Time Security Intelligence solution “in the cloud ... , for the cloud”. Sure, other SIEM and security ...

Blog

Cognitive Security – the next big thing in security?

by Martin Kuppinger

... and delivering exactly what an Information Security professional needs. A challenge we must ... can help Information Security professionals in making better use of their time, by focusing on ... the most likely traces of attacks. Traditional SIEM (Security Information ... to the field of Information Security. We at KuppingerCole call this Real Time Security Intelligence (RTSI). RTSI is a ... first step on the journey towards Cognitive Security. ...

Blog

Multi-Factor, Adaptive Authentication Security Cautions

by Ivan Niccolai

... time-limited passwords. These are generally a good idea, and do offer additional security ... depends on multi-factor authentication as an additional security measure is itself a mobile application then ... authentication vitiates the possible security benefits of MFA. Security researchers have recently proven ... cybersecurity threat landscape. Tactical security approaches here include careful selection ... detection and response, an approach known as Real-Time Security Intelligence. It should focus on the data governance ...

Blog

Your future Security Operations Center (SOC): Not only run by yourself

by Martin Kuppinger

... plan for what happens in case of security incidents and a way to identify ... organizations that either have high security requirements or are sufficient large ... identifying such incidents is setting up a Security Operations Center (SOC). However, setting ... experts for network security, SAP security, and other areas of security. In these days of ... today’s challenges. Traditional SIEM (Security Information and Event Management) ... goes towards what we call RTSI - Real Time Security Intelligence. RTSI is more than just a ...

Report

Product Report: SECUDE Security Intelligence

by Martin Kuppinger

Product Report: SECUDE Security Intelligence SECUDE Security Intelligence 1.0 Product Report © KuppingerCole, IT Analysts, 2010 ... www.kuppingercole.com Martin Kuppinger, Tim Cole, Jörg Resch, Dr. Horst ... www.kuppingercole.com Martin Kuppinger, Tim Cole, Jörg Resch, Dr. Horst ... information from the source systems in real-time (“incidence-triggered”), but instead through ... www.kuppingercole.com Martin Kuppinger, Tim Cole, Jörg Resch, Dr. Horst ... www.kuppingercole.com Martin Kuppinger, Tim Cole, Jörg Resch, Dr. Horst ...

Blog

Cyber Security: Why Machine Learning is Not Enough

by Martin Kuppinger

... analytical approaches in the field of cyber security. Anomaly detection and behavioral analytics ... overarching trends along with RTSI (Real Time Security Intelligence), which combines advanced analytical approaches ... with established concepts such as SIEM (Security Information and Event Management). Behind ... is able to improve its results over time by analyzing the effect of previous actions ... . One of the challenges with cyber security is the fact that there are ...