© 2017 Ablative Security LLC

Follow Us

January 25, 2017

Many organizations are struggling to overcome key conceptual differences between today’s AI powered threat detection systems and legacy signature detection systems. A key friction area - in perception and delivery capability - lies with the inertia of Indicator of Comp...

January 17, 2017

The AI revolution is still relatively young in the InfoSec world. Despite endless floors of vendor booths displaying the latest security device or technology, we're still in the v1.0 realm.

In many cases, while the marketing literature references machine learning, must...

January 13, 2017

Anomaly detection approaches to threat detection have traditionally struggled to make good on the efficacy claims of vendors once deployed in real environments. Rarely have the vendors lied about their products capability – rather, the examples and stats they provide a...

January 4, 2017

For many prospective buyers of the latest generation of network threat detection technologies it may appear ironic that these AI-driven learning systems require so much manual tuning and external monitoring by vendors during a technical “proof of concept” (PoC) evaluat...

Please reload

  • Twitter Basic Square
  • RSS Social Icon
  • LinkedIn Social Icon