Remove Behavioral Analytics Remove Risk Management Remove Software
article thumbnail

AI and cybersecurity: A double-edged sword

CIO Business Intelligence

Gone are the days when simple firewalls and antivirus software could keep our digital assets safe. Perhaps one of the most anticipated applications of AI in cybersecurity is in the realm of behavioral analytics and predictive analysis. The cybersecurity world has changed dramatically.

article thumbnail

10 projects top of mind for IT leaders today

CIO Business Intelligence

The approach taken by James Phillips, CIO at software maker Rev.io, reflects that trend. Those projects include implementing cloud-based security, anti-ransomware, and user behavior analytics tools, as well as various authentication technologies. Risk management came in at No. Foundry / CIO.com 3. For Rev.io

IT 142
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Database Activity Monitoring – A Security Investment That Pays Off

Smart Data Collective

Does DAM need a user behavior analytics (UBA) module? Do database activity monitoring systems need user behavior analytics features? Since databases store companies’ valuable digital assets and corporate secrets, they are on the receiving end of quite a few cyber-attack vectors these days. How do DAM solutions work?

article thumbnail

The FireEye Attack and 4 Security Moves to Make Right Now

CDW Research Hub

Initial information from FireEye disclosed that the software they use in penetration testing and security analysis services for their customers was stolen. This software is used by public and private entities worldwide. We are working through our third-party risk management process to identify whether any of our partners were impacted.