From unstructured data to actionable intelligence: Using machine learning for threat intelligence

Credit to Author: Eric Avena| Date: Thu, 08 Aug 2019 16:30:12 +0000

Machine learning and natural language processing can automate the processing of unstructured text for insightful, actionable threat intelligence.

The post From unstructured data to actionable intelligence: Using machine learning for threat intelligence appeared first on Microsoft Security.

Read more

New machine learning model sifts through the good to unearth the bad in evasive malware

Credit to Author: Eric Avena| Date: Thu, 25 Jul 2019 16:30:55 +0000

Most machine learning models are trained on a mix of malicious and clean features. Attackers routinely try to throw these models off balance by stuffing clean features into malware. Monotonic models are resistant against adversarial attacks because they are trained differently: they only look for malicious features. The magic is this: Attackers can’t evade a monotonic model by adding clean features. To evade a monotonic model, an attacker would have to remove malicious features.

The post New machine learning model sifts through the good to unearth the bad in evasive malware appeared first on Microsoft Security.

Read more

Caution: Misuse of security tools can turn against you

Credit to Author: Vasilios Hioureas| Date: Thu, 11 Jul 2019 17:34:57 +0000

If not implemented correctly, the very security tools we use to keep our information private may actually cause data leaks themselves. We outline a few cases and provide suggestions for researchers and security admins.

Categories:

Tags:

(Read more…)

The post Caution: Misuse of security tools can turn against you appeared first on Malwarebytes Labs.

Read more

The Reality of Augmented Reality: a view from Austmine 2019

Credit to Author: Greg Johnson| Date: Thu, 06 Jun 2019 15:09:21 +0000

Austmine 2019, the biennial conference of Austmine, the leading industry body for the Australian Mining, Equipment, Technology and Services (METS) sector, was held last week (May 21-23, 2019) in my… Read more »

The post The Reality of Augmented Reality: a view from Austmine 2019 appeared first on Schneider Electric Blog.

Read more

How 5G could impact cybersecurity strategy

Credit to Author: Kayla Matthews| Date: Thu, 09 May 2019 16:00:00 +0000

With 5G wireless on the horizon, what will businesses need to do to secure their devices and networks?

Categories:

Tags:

(Read more…)

The post How 5G could impact cybersecurity strategy appeared first on Malwarebytes Labs.

Read more

Augmented Reality: Various industries have the same trend

Credit to Author: Darja Aleksejeva| Date: Tue, 30 Apr 2019 15:00:52 +0000

In the past few years we have started to see more and more posts and adverts about glasses and head-mounted displays, augmented reality (AR), mobile computing and many more. What… Read more »

The post Augmented Reality: Various industries have the same trend appeared first on Schneider Electric Blog.

Read more

For Machine OEMs, Digitization-driven Unprecedented Productivity Now a Reality

Credit to Author: Ali Haj Fraj| Date: Wed, 27 Mar 2019 15:04:13 +0000

Over the last several years, the mantra of “digitization is coming” has rung like a steady bell in the ears of both industrial manufacturers and the OEMs who support them. … Read more »

The post For Machine OEMs, Digitization-driven Unprecedented Productivity Now a Reality appeared first on Schneider Electric Blog.

Read more

Expanded OPC UA over TSN Standards Open the Door to New Levels of Industrial Productivity

Credit to Author: Fabrice Jadot| Date: Thu, 21 Mar 2019 15:37:40 +0000

One of the most important benefits of digitization is the ability to capture and analyze data and to derive business value and profitability from that data. However, until recently, only… Read more »

The post Expanded OPC UA over TSN Standards Open the Door to New Levels of Industrial Productivity appeared first on Schneider Electric Blog.

Read more