Remove 2018 Remove Events Remove Mining Remove Retail
article thumbnail

Q&A: Why SOAR startup Syncurity is bringing a ‘case-management’ approach to threat detection

The Last Watchdog

There is a gaping shortage of analysts talented enough to make sense of the rising tide of data logs inundating their SIEM (security information and event management) systems. In many cases the tedious, first-level correlating of SIEM logs to sift out threats has moved beyond human capability.

article thumbnail

Attacks against machine learning — an overview

Elie

This series of posts is modeled after the talk I gave at RSA 2018. A very recent example of such behavior is the rise of abusing cloud services such as Google Cloud to mine cryptocurrencies in response to the surge of bitcoin price late 2017. Here are a few directions to explore while preparing for black swan events.

Mining 107
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Attacks against machine learning — an overview

Elie

This series of posts is modeled after the talk I gave at RSA 2018. A very recent example of such behavior is the rise of abusing cloud services such as Google Cloud to mine cryptocurrencies in response to the surge of bitcoin price late 2017. Here are a few directions to explore while preparing for black swan events.

Mining 91
article thumbnail

Federal Agency Data is Under Siege

Thales Cloud Protection & Licensing

to discuss the findings of the 2018 Thales Data Threat Report, Federal Edition. Question: Can you provide an overview of the 2018 Thales Data Threat Report, Federal Edition, and elaborate why it’s needed today more than ever? Their data must be protected in the event a subpoena is issued to their cloud provider.