Employing machine learning in a security environment: A data science-driven approach

Thumb original uk employing machine learning in a security environment white paper

No matter where you look in the security world today, you’ll see the terms machine learning and artificial intelligence (AI). There’s been a great deal of interest in machine learning and AI as security vendors and their customers look for better ways to improve their security posture and fight against advancing cyberattacks. Machine learning and AI offer breakthroughs in solving problems in many other areas of our lives, so it’s only natural to try to use them to make similar breakthroughs in the field of security.

Unfortunately, there’s a lot of hype and misinformation surrounding what machine learning and AI can do to improve security. In this paper, you will discover the most critical things you need to know about applying machine learning and AI in your security environment. You will also learn to recognise the most significant opportunities and challenges for using machine learning and AI to improve your security team’s ability to swiftly detect and respond to cyberthreats.

View whitepaper
Date: 2 August 2018, 0:00 am   |   Provider: LogRhythm EMEA   |   Size: 2.13 MB   |   Language: English
This may interest you too:
Thumb original uk uws using mitre attack in threat hunting and detection white paper

Using MITRE ATT&CK™ in Threat Hunting and Detection

MITRE ATT&CK1 is an open framework and knowledge base of adversary tactics and techniques based on real-world observations. ATT&CK provides a common taxonomy of the tactical objectives of adversaries and their methods. Having a taxonomy by itself has many valuable uses, such as providing a common vocabulary for exchanging information with others in the security community. But it also serves as a real technical framework for classifying your current detection efforts and identifying gaps where you are blind to certain types of attack beh ...

To the download
Thumb original uk the security operations maturity model quick reference guide brochure

The Security Operations Maturity Model Quick Reference Guide

Organisations should think of security operations as a critical business process. Effective security operations are the first line of defence when it comes to preventing cyberattacks. To accomplish this, organisations need mature programs that leverage people, process and technology to rapidly detect and respond to sophisticated attacks.

Yet some organisations struggle with the overall effectiveness of their security operations. They also lack the basis for measuring the effectiveness and maturing capabilities. A mature security operation e ...

To the download
Thumb original wp understanding the obstacles to wan transformation

Understanding the Obstacles to WAN Transformation — Security, Performance, and TCO

Network engineering and operations leaders are looking to software-defined wide- area networks (SD-WAN) to support the influx of traffic and applications driven by digital transformation (DX). These applications improve staff productivity while creating new business opportunities, but they also reshape corporate networking and security needs.

In response, many organizations are beginning to rethink their traditional WAN architecture. SD WAN has emerged as a replacement, but many SD-WAN implementations also present serious challenges—from ina ...

To the download
Thumb original wp sd wan in the age of digital innovation a4

SD-WAN in the Age of Digital Innovation — Achieving Business Agility While Reducing Disruption

Most organizations are in the midst of some form of digital innovation (DI) - leveraging technology to achieve specific goals—and ultimately deliver greater value to their customers. But DI also brings disruption. Disruption in the form of an expanded attack surface and the introduction of a more sophisticated threat landscape. Disruption can also lead to increased complexity as organizations try to counter these new threats with a range of new security solutions. Finally, maintaining compliance with relevant industy and regulatory standards su ...

To the download
Thumb original sd wan isnt just for retail   low res   web

SD-WAN Isn’t Just for Retail

In any organization, being responsible for cybersecurity is a complex job entailing interactions with the teams managing software development, servers, databases, storage, and networking. It becomes even more challenging where there is also a need to protect industrial installations and the Operational Technology (OT) that runs them in critical industries such as manufacturing, energy, and extraction.

Although it is not always on the OT security team’s radar, in the IT networking world Software Defined Wide Area Network, or SD-WAN, is the ho ...

To the download