Artificial Reality | The PatternEx Blog

Collections of the thoughts and the people behind the PatternEx Virtual Analyst Platform powered by AI2.

AI Not Optional for the SOC

With the recent flood of cyber breaches, everyone is looking for answers to stop this seemingly unending cycle of attacks. The current model of multi-tier SOC analysts, SIEM, and basic ML alone is not our future. AI is no longer an option, but a requirement to keep up with threat volume and sophistication. Read more from our guest author, VP IT Security at a leading hospitality company.

Donald Trump, Theresa May, MIT & Apple all agree on one thing

Meta-trends around AI cybersecurity are driving industry and governments alike to drive change. Who is doing what and how can you get involved?

Can MDR's save the enterprise from security threats?

MDRs path to a smarter SOC to help enterprises solve security issues more cost effectively.

An Overview of AI for Security Pros: Lessons Learned from our Webinar

Get an overview of our recent webinar, "An Overview of AI for Security Pros," where we covered two of the critical elements of data science/AI applied to infosec -- labeling and data variety.

Success Criteria for PoCs

Try before you buy, or drive before you buy, or a proof of concept (PoC) which is the IT equivalent. However, to get the maximum value from a PoC, there are several important steps that need to be completed in advance. This is important for both the prospective customer as well as the vendor. Mistaken expectations can be costly for one or both of the parties. Do your homework! And, here is your homework assignment.

Rules vs. Correlations vs. Models

Information security practitioners need to broaden their vocabulary to understand machine learning terminology. For example, what are the differences between a "rule" versus a "correlation" versus a "model"? What is the difference between an algorithm versus a model?

Alerts Continue to Rise

As alerts continue to rise, is the solution SOAR, or first to better / more accurately discern false positives and detect current false negatives? Moving directly to SOAR without improving detection seems to merely be another digital version of garbage in / garbage out. Certainly improved security automation & response are needed, but don't just port poor detection to response and expect to improve your program's effectiveness.

More Morphing in the Security Services Space: Moving from SOC to SOCaaS

We have more imorphing in the security services space. occurring. We tend to focus on the evolution of security products. However, an interesting evolution of security services is also occurring. I'm not speaking about penetration testing to bug bounties to attack simulation platforms. I'm speaking today about MSSPs to MDRs to SOCaaS, (security operations center-as-a-service) and what is driving this evolution.

The Value of Threat Intelligence

Commercial cyber threat intelligence (TI) is relatively new to the sector. While all major firewall vendors provide threat intelligence, many non-product TI companies have also emerged. Too many? Does a CISO really need yet another vendor in the form of a non-product TI company?

Detecting DNS Rebinding Attacks

DNS rebinding attacks - they're back! And this time, on a massive scale. Protection of vulnerable IoT devices is highly problematic, but detection of such attacks poses it's own challenges. How to detect these attacks in near real-time on a massive scale. Enter AI please.
Load More

Subscribe Now