RIP IOCs: How Machine Learning will Revolutionize IT Security - Part II

Author: 
David Ross

 

In my last blog post, I sounded the death knell for indicators of compromise (IOCs) — attributes that implicate an item as being associated with cybercrime. IOCs written for one environment rarely transfer into new environments without lots of false positives and false negatives because what’s abnormal (and therefore an IOC) for one system or user might be completely normal for another user or system, or even for the same user at a different time of day.

Survey: Majority of Americans Reuse Passwords and Millennials Are the Biggest Culprits

 

Irvine, Calif. – July 19, 2017SecureAuth Corp., the leader in adaptive access control, today announced results of a survey that reveal Americans’ online security anxiety is real, but their password practices remain sloppy. The report says Americans are much more likely to be concerned with their online personal information being stolen (69 percent) than their wallet being stolen (31 percent).

RIP IOCs: How Machine Learning will Revolutionize IT Security - Part I

Author: 
David Ross

 

For over a decade, the security industry has relied on indicators of compromise (IOCs) — attributes that implicate an item as being associated with cybercrime — to spot threats. Since anything observable, such as a file name, a checksum, a registry entry or an email subject line, can be an IOC, IOCs are easy to write, share, and use.

Palo Alto and SecureAuth IdP Integration Brief

This integration brief describes how SecureAuth integrates with Palo Alto Networks GlobalProtect to provide an advanced user authentication solution that goes beyond simple-two-factor to determine identities with confidence.

AngularJS Best Practices Guide

 

This guest provides an best practices for using the AngularJS framework to enhance basic HTML vocabulary for designing web pages within the SecureAuth IdP environment.

Achieving Stronger Security in Healthcare IT

 

Achieving Stronger Security in Healthcare IT

Ask someone to name the top priority of a healthcare organisation and they’ll probably say “providing excellent patient care.” But if you ask someone to name a second top priority, they might add, “IT security.” Recent breaches like WannaCry ransomware and past examples such as Anthem have turned cyber security into an urgent concern for every healthcare organisation.

Evidence.com Integration Guide

This guide provides a brief overview of how to integrate SecureAuth IdP with the Evidence.com database management platform. Many law enforcement organizations use Evidence.com to manage and maintain their evidence. In order to make this evidence database as secure as possible, SecureAuth IdP has developed a software bridge that enables secure authentication between the department’s computers and Evidence.com’s resources.

Gartner Magic Quadrant for Access Management


CLICK TO READ FULL REPORT


 

Gartner's 2017 Magic Quadrant for Access Management

Access management (AM) applies to technologies that use access control engines to provide centralized authentication, single sign-on (SSO), session management and authorization enforcement for target applications in multiple use cases.

Pages