Access your Pro+ Content below.
AI in security analytics is the enhancement you need
This article is part of the Information Security issue of November 2020, Vol. 21, No. 4
The volume of cyberthreats is staggering. One research project put the number of attacks detected during the first quarter of 2020 at 445 million. That figure, from the Q2 2020 Fraud and Abuse Report released by Arkose Labs, represents a 44% increase over the prior quarter -- the highest attack rate ever detected in a quarter. Likewise, others have reported a rising number of attacks, as well as an increasing level of sophistication in those attacks. Although such statistics can vary, experts generally agreed that both the volume and velocity of cyber attacks today can overwhelm enterprise security teams that aren't operating at peak proficiency and aren't using the latest processes and technologies to help them detect and thwart bad actors from doing damage. That now means having AI as part of the defense arsenal is a must. The sophistication, diversity, speed and volume of attacks -- coupled with the growing complexity and reach of an enterprise technology stack that no longer has any real perimeter -- has made conventional ...
Access this PRO+ Content for Free!
Features in this issue
When enterprises quickly pivoted to remote work during the pandemic, it prompted a wave of new threats while also widening existing gaps in cybersecurity postures.
Third parties often prove to be the weak links when it comes to IoT cybersecurity. Learn what you can do to minimize the risk while reaping the benefits that outside vendors bring.
News in this issue
AI capabilities can identify and take down cyberthreats in real time but are only part of what your team needs to come out on the winning side of the cybersecurity battle.
AI-powered analytics is critical to an effective, proactive security strategy. Learn how AI-enabled tools work and what your organization needs to do to reap their benefits.
Columns in this issue
Tackle the security challenges COVID-19 wrought by using this playbook from an experienced disaster-zone responder.
Cybersecurity pros have been predicting the firewall's demise for years, yet the device is still with us. But does it have a place in zero-trust networks? One analyst says yes.