BehavioSec Fires Up Next-Gen Cybersecurity Solutions with Behavioral Biometrics

BehavioSec Fires Up Next-Gen Cybersecurity Solutions with Behavioral Biometrics

There’s no silver bullet for online security, especially when it comes to user authentication. And enterprises aren’t alone in the struggle to keep up with the needs and demands of authentication. At the center of all of this lies user behavior and the challenge it presents to security.

Do you Trust that (Data) Model?

Do you Trust that (Data) Model?

As George Box noted several decades ago, “All Models are essentially wrong, but some are useful”.  The work of statistical analysis, and its modern day derivatives of Machine Learning and Deep Learning, continue to be bold attempts at capturing what are essentially complex activities into a much simpler set of equations, even if those equations themselves often seem esoteric and complex.

Layers of Security

Layers of Security

Do you remember the movie “Die Hard”?  Arguably the best Christmas movie ever. All kidding aside, this movie has a great correlation into Security best practices.  Before we go into that, let’s recap. The bad guys in the movie were going to steal $640M in bearer bonds.

Tackling the Growing Threat Landscape of ICS and the IIoT

Tackling the Growing Threat Landscape of ICS and the IIoT

It is no secret that the proliferation of connected devices and sensors has introduced new and growing security challenges across every industry and enterprise. The question is no longer whether or not a device or sensor is digitally connected. Today’s focus must be on who has access to the operational data generated and how to ensure that the device or sensor is secure.