Strengthening Cybersecurity with Zero Trust Network Access (ZTNA) Integration
In today’s rapidly evolving cybersecurity landscape, organizations face increasingly sophisticated threats that challenge traditional security models. To counter these risks, a paradigm shift is underway toward a more robust and effective approach called Zero Trust Network Access (ZTNA). ZTNA has gained significant importance as a proactive... Read more
How AI and ML are Reshaping Cybersecurity: Advancing Towards the Best SIEM Alternatives
It is given that organizations should have an effective way of managing all information about their security and be capable of addressing security events as they arise. That’s why since its introduction in 2005, security information and event management (SIEM) has been regarded as a vital... Read more
Best Practices for Data Lake Security
In today’s world, digital and computer technology is essential for businesses to operate efficiently. Rather than using paper records, data is now collected and stored using digital tools. However, even digital information has to be stored somewhere.  While databases were the traditional way to store large... Read more
Automating Remediation Processes for Data Security Posture Management
If you are looking into data security posture management, I’m sure you realize that automating remediation activities for data security posture management is a vital tool for maintaining the security and integrity of data inside an organization. Automating these processes enables organizations to identify and respond... Read more
Botnet Detection at Scale – Lessons Learned From Clustering Billions of Web Attacks Into Botnets
Editor’s note: Ori Nakar is a speaker for ODSC Europe this June. Be sure to check out his talk, “Botnet detection at scale – Lesson learned from clustering billions of web attacks into botnets,” there! A common problem in the cybersecurity industry is how to detect... Read more
The Weak Spots Hackers Look to Attack
Anyone in the data or tech sectors knows cyberattacks are a severe threat to individuals and organizations. The global cost of cybercrime attacks is expected to rise to over $8 billion starting in 2023. That’s a lot of money and it will only increase as technology... Read more
How Does Automated Penetration Testing Prevent the Theft of Important Data?
In 2022, the average cost of a data breach in the United States was over 9.44 million U.S. dollars. This number is expected to be even higher for 2023. Reddit, Twitter, and T-Mobile are only some of the major companies that recently suffered damaging data breaches.... Read more
What are the Best Database Security Practices to Implement?
Data science is a field that, just like the quantity of data we have available to us, is constantly expanding. Since 2021 the world has been creating as much data every 40 minutes as was built in the entirety before 2003. Data is scaling at an... Read more
How to Use Data Mining in Cybersecurity
The amount of data circulating across industries and throughout the business world is almost incomprehensible. From large corporations to small businesses, it’s never been more important to gather vast amounts of raw data and have dedicated IT personnel sift through them to find patterns, discover valuable... Read more
A Primer on Resilient Intelligent Systems
Editor’s note: Dan Shiebler is a speaker for ODSC West this November 1st-3rd. Be sure to check out his talk, “Resilient Machine Learning,” there! The world around us is shaped by intelligent systems that solve problems. These systems process large amounts of raw and structured data... Read more