Security Information and Event Management

Blog

Cyber Security: Why Machine Learning is Not Enough

Currently, there is a lot of talk about new analytical approaches in the field of cyber security. Anomaly detection and behavioral analytics are some of the overarching trends along with RTSI (Real Time Security Intelligence), which combines advanced analytical approaches with established…

Analysts' View

KuppingerCole Analysts' View on Real Time Security Intelligence & Future SOC

Organizations depend upon the IT systems and the information that they provide to operate and grow.  However, the information that they contain and the infrastructure upon which they depend is under attack. Statistics show that most data breaches are detected by agents outside of the…

Blog

Your future Security Operations Center (SOC): Not only run by yourself

There is no doubt that organizations need both a plan for what happens in case of security incidents and a way to identify such incidents. For organizations that either have high security requirements or are sufficient large, the standard way for identifying such incidents is setting up a…

Webcast

Internet Security as a Service

Das Internet hat ganze Industriezweige und Geschäftsmodelle revolutioniert und darüber hinaus unsere Arbeitsweise grundlegend verändert. Über Jahrzehnte gewachsene Arbeitsabläufe und Geschäftstätigkeiten wurden innerhalb kürzester Zeit ausgehebelt. Unternehmen öffnen sich zunehmend den…

Webinar

Oct 21, 2015: Internet Security as a Service: Weltweit sicher und kostengünstig im Netz agieren, Shadow-IT vorbeugen und Cloud-Enablement vorantreiben

Das Internet hat ganze Industriezweige und Geschäftsmodelle revolutioniert und darüber hinaus unsere Arbeitsweise grundlegend verändert. Über Jahrzehnte gewachsene Arbeitsabläufe und Geschäftstätigkeiten wurden innerhalb kürzester Zeit ausgehebelt. Unternehmen öffnen sich zunehmend den…

Discover KuppingerCole

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Blog

Blog

How to Train Your AI to Mis-Identify Dragons

This week Skylight Cyber disclosed that they were able to fool a popular “AI”-based Endpoint Protection (EPP) solution into incorrectly marking malware as safe. While trying to reverse-engineer the details of the solution's Machine Learning (ML) engine, the researchers found that it contained a secondary ML model added specifically to whitelist certain types of software like popular games. Supposedly, it was added to reduce the number of false positives their "main engine" was [...]

Stay Connected

Latest Insights

Hot Topics

Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00