Security

machine learning exploit detection recursive neural network

Using Machine Learning to Reduce False Positives

Today’s threat landscape is massive and expanding at an alarming rate—especially given the explosion of mobile devices, hybrid cloud environments, DevOps, and containers. Organizations of all sizes, and across all industries, struggle to keep up with the volume of legitimate […]

Using Machine Learning to Reduce False Positives Read More »

BlackBerry cybersecurity encryption US government military

BlackBerry Moves to Strengthen Ties with the US Government (Thank God)

BlackBerry has successfully transitioned from being a smartphone vendor to something very different. They still have the leading operating system for automobiles and nuclear power plants (QNX), which is arguably (and has to be) the most secure in segment. The

BlackBerry Moves to Strengthen Ties with the US Government (Thank God) Read More »

zero trust privilege privileged access management

The Role of Privileged Access Management in Addressing Cybersecurity Challenges

Organizations spend over $100 billion globally on cybersecurity. In spite of that level of investment in cybersecurity and the attention paid to network security and data protection, major data breaches are still relatively common—and increasing. A new survey from Centrify

The Role of Privileged Access Management in Addressing Cybersecurity Challenges Read More »

Scroll to Top