Remove products threat-hunting
article thumbnail

How resilient CIOs future-proof to mitigate risks

CIO Business Intelligence

With the increasing sophistication of cyber threats and the accelerated pace of digital transformation, organizations must be more proactive in identifying and mitigating risks. Resilience frameworks have measurable ROI, but they require a holistic, platform-based approach to curtail threats and guide the safe use of AI, he adds.

Risk 105
article thumbnail

My top learning moments at Splunk.conf23

Rocket-Powered Data Science

Despite the thousands of miles (and kilometers) of separation, I could feel the excitement in the room as numerous announcements were made, individuals were honored, customer success stories were presented, and new solutions and product features were revealed. testing for hypothesized threats, behaviors, and activities), (2) Baseline (i.e.,

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Camelot Secure’s AI wizard eases path to cybersecurity compliance

CIO Business Intelligence

We noticed that many organizations struggled with interpreting and applying the intricate guidelines of the CMMC framework,” says Jacob Birmingham, VP of Product Development at Camelot Secure. Birmingham says the company plans to expand Myrddin’s AI capabilities into its other product areas.

article thumbnail

Closing the breach window, from data to action

IBM Big Data Hub

Accelerate threat detection and response (TDR) using AI-powered centralized log management and security observability It is not news to most that cyberattacks have become easier to launch and harder to stop as attackers have gotten smarter and faster. For those defending against cyberthreats, things continue to get more complicated.

article thumbnail

Accenture forges own path to improve attack surface management

CIO Business Intelligence

As a global consulting and technology company, Accenture understands how quickly an attack surface can grow and become vulnerable to cyber threats. While Accenture successfully protected upwards of 99% of its assets from threats, with an expanding attack surface from acquisitions, 99% wasn’t good enough. Threat intelligence response.

article thumbnail

7 tough IT security discussions every IT leader must have

CIO Business Intelligence

The discussions address changing regulatory and compliance requirements, and reveal vulnerabilities and threats for risk mitigation.” Are we truly up to date on emerging threats assessment? Ongoing IT security strategy conversations should address the organization’s cyber risk and arrive at strategic objectives, Albrecht says.

IT 142
article thumbnail

Utilizing AI to defend the Black Hat NOC

CIO Business Intelligence

This year’s Black Hat USA conference saw more than 907M threat events detected in real time, according to data collected by Palo Alto Networks. This is a staggering number that shows just how attractive the event is to threat actors – and artificial intelligence (AI) was a key driver in protecting against these attempts.