The Bots That Stole Christmas
When mobile phones were coming of age, everyone would say “there’s an app for that!” Nowadays, the phrase is quickly becoming “there’s a bot for that!”
Secure Network Analytics (Stealthwatch) Then, Now and Beyond – Part 3: Into the Future
The final part in our look at the past, present, and future of Secure Network Analytics. We’ve looked at the origins of the product formerly known as Stealthwatch and now it’s time for us to look ahead as we consider what the future holds.
The Why of AI and ML
While artificial intelligence (AI) and machine learning (ML) have been in the spotlight in recent years, the central questions around them have focused more on what they are and how they’re used. While these are important questions, it’s time that we shift the conversation to why we need AI and ML so we can better understand the roles they play in our lives.
Secure Network Analytics (Stealthwatch) Then, Now and Beyond – Part 2: Behavioral Analytics Has its Day
Part 2 of a look back at the history and origins of Secure Network Analytics, where we look at how behavioral analytics helped shape the product into what it is today.
As more organizations turn to SaaS options for monitoring and managing their network security, it’s time to revise how we look at the network being “under management.”
Secure Network Analytics (Stealthwatch): Then, Now, and Beyond
A look back at the history and origins of Secure Network Analytics as a we explore the beginnings of the recognized industry leader in Network Detection and Response (NDR).
Defense in Diversity
Security has favored “Defense in Depth” as the dominant strategy. As we enter the world of automated workloads at internet-scale, it is clear that “Defense in Diversity” wins over depth.
The Tactical Chameleon: Security Through Diverse Strategy
In order to effectively combat an increasingly strategic and varied set of threats, security professionals need to take a page from Musashi Miyamoto and fighting game players.