article thumbnail

Navigating the Cyber Threat Landscape: Lessons Learned & What’s Ahead

Tech Republic Security

A look at the cyber threat landscape of 2024, including major breaches and trends. An expert weighs in on key lessons and what to expect in 2025.

article thumbnail

SHARED INTEL Q&A: Everything the Cisco-Splunk merger tells us about the rise of SIEMs

The Last Watchdog

Cisco’s recent move to acquire SIEM stalwart Splunk for a cool $28 billion aligns with the rising urgency among companies in all sectors to better protect data — even as cyber threats intensify and disruptive advancements in AI add a wild card to this challenge. Related: Will Cisco flub Splunk?

Marketing 306
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Future of Payments Security

Thales Cloud Protection & Licensing

Big Data and EMV 3DS. Fraud detection is where big data and machine learning come in handy. Using machine learning, algorithms can go through huge transactional data sets to spot unusual behaviour. The use of big data analytics by the banking sector can lead to enhanced fraud detection and superior risk assessment.

Retail 144
article thumbnail

Cyber Security Combo: Big Data, Machine Learning and AI

Spinone

From identity theft to credit card numbers being taken away, Machine Learning and Artificial Intelligence play an instrumental role in establishing new standards for cyber security. While the potential of Big Data is vast, it might lag behind as a standalone tool to deal with hackers due to the enormous volume of data to analyze.

article thumbnail

News alert: Criminal IP and Quad9 collaborate to exchange domain and IP threat intelligence

The Last Watchdog

May 13, 2024, CyberNewsWire — Criminal IP, a renowned Cyber Threat Intelligence (CTI) search engine developed by AI SPERA, has recently signed a technology partnership to exchange threat intelligence data based on domains and potentially on the IP address to protect users by blocking threats to end users.

DNS 130
article thumbnail

ENISA – The need for Incident Response Capabilities in the health sector

Security Affairs

The level of exposure to cyber threats is increasing to the adoption of emerging technologies such as the Internet of Things (IoT), Artificial Intelligence (AI), big data, and cloud computing. In 2020, the number of reports sent to ENISA about cybersecurity incidents saw an increase of 47% compared to the previous year.

article thumbnail

Exploring Cybersecurity Research Topics for Master’s Degree Studies

CyberSecurity Insiders

Whether you’re passionate about securing networks, protecting data, or investigating cyber threats, choosing the right research topic is crucial for a successful and impactful Master’s journey. Cyber Threat Hunting and Incident Response: Research proactive strategies for detecting and responding to cyber threats.