![](https://static.wixstatic.com/media/b41421_feab9e41cbb149a698a306e6992389c1~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/b41421_feab9e41cbb149a698a306e6992389c1~mv2.webp)
![Characterizing the Friction and Incompatibility Between IoC and AI](https://static.wixstatic.com/media/b41421_feab9e41cbb149a698a306e6992389c1~mv2.jpg/v1/fill/w_319,h_240,fp_0.50_0.50,q_90,enc_auto/b41421_feab9e41cbb149a698a306e6992389c1~mv2.webp)
Characterizing the Friction and Incompatibility Between IoC and AI
Many organizations are struggling to overcome key conceptual differences between today’s AI powered threat detection systems and legacy...
![](https://static.wixstatic.com/media/b41421_f0e38124bb9342fc9cc6c6dc946261c1~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/b41421_f0e38124bb9342fc9cc6c6dc946261c1~mv2.webp)
![Security Automation Isn’t AI Security](https://static.wixstatic.com/media/b41421_f0e38124bb9342fc9cc6c6dc946261c1~mv2.jpg/v1/fill/w_319,h_240,fp_0.50_0.50,q_90,enc_auto/b41421_f0e38124bb9342fc9cc6c6dc946261c1~mv2.webp)
Security Automation Isn’t AI Security
The AI revolution is still relatively young in the InfoSec world. Despite endless floors of vendor booths displaying the latest security...
![](https://static.wixstatic.com/media/b41421_6047236cc31b4c2d9d6423e334e2a829~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/b41421_6047236cc31b4c2d9d6423e334e2a829~mv2.webp)
![From Anomaly, to Behavior, and on to Learning Systems](https://static.wixstatic.com/media/b41421_6047236cc31b4c2d9d6423e334e2a829~mv2.jpg/v1/fill/w_319,h_240,fp_0.50_0.50,q_90,enc_auto/b41421_6047236cc31b4c2d9d6423e334e2a829~mv2.webp)
From Anomaly, to Behavior, and on to Learning Systems
Anomaly detection approaches to threat detection have traditionally struggled to make good on the efficacy claims of vendors once...
![](https://static.wixstatic.com/media/b41421_35ea74e3d1204ac8adc0be0d3a2711cb~mv2_d_1940_1940_s_2.jpeg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/b41421_35ea74e3d1204ac8adc0be0d3a2711cb~mv2_d_1940_1940_s_2.webp)
![Ransomware Detection and Mitigation in 2017](https://static.wixstatic.com/media/b41421_35ea74e3d1204ac8adc0be0d3a2711cb~mv2_d_1940_1940_s_2.jpeg/v1/fill/w_319,h_240,fp_0.50_0.50,q_90,enc_auto/b41421_35ea74e3d1204ac8adc0be0d3a2711cb~mv2_d_1940_1940_s_2.webp)
Ransomware Detection and Mitigation in 2017
With near unanimous agreement between InfoSec authors of 2017 security predictions, ransomware will continue to grow as the number-one...
![](https://static.wixstatic.com/media/b41421_b060d1e58aba4db7817626dc409ad451~mv2.jpeg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/b41421_b060d1e58aba4db7817626dc409ad451~mv2.webp)
![Allowing Vendors VPN access during Product Evaluation](https://static.wixstatic.com/media/b41421_b060d1e58aba4db7817626dc409ad451~mv2.jpeg/v1/fill/w_319,h_240,fp_0.50_0.50,q_90,enc_auto/b41421_b060d1e58aba4db7817626dc409ad451~mv2.webp)
Allowing Vendors VPN access during Product Evaluation
For many prospective buyers of the latest generation of network threat detection technologies it may appear ironic that these AI-driven...