BlogHide Resteemsjonsmith (8)in tech • 8 years agoAI provides an urgent solution to evolving ransomware threats facing healthcareArtificial intelligence that can quickly identify patterns of risky behavior may be the only viable solution to protect health systems against an influx of ransomware attacks. The use of AI in the…jonsmith (8)in hacking • 8 years agoMcCaskill asks DHS about 'critical infrastructure' designationFIRST IN MC: MCCASKILL QUESTIONS DHS — A top Senate Democrat, Claire McCaskill, wants to know what it actually meant when the Homeland Security Department labeled election systems as “critical…jonsmith (8)in health • 8 years agoHow AI Can Help Fight Healthcare Ransomware ThreatsThe Institute for Critical Infrastructure Technology discusses in a recent paper how artificial Intelligence can fight against healthcare ransomware threats. March 15, 2017 - Healthcare is facing…jonsmith (8)in ransomware • 8 years agoAI provides an urgent solution to evolving ransomware threats facing healthcareArtificial intelligence that can quickly identify patterns of risky behavior may be the only viable solution to protect health systems against an influx of ransomware attacks. The use of AI in the…jonsmith (8)in icit • 8 years agoCan Artificial Intelligence cure the Ransomware pandemic on Healthcare?A new report from the Institute of Critical Infrastructure Technology considers the possibility that artificial intelligence might be the cure for the security ills of the healthcare industry A…jonsmith (8)in hacking • 8 years agoSNYPR Recognized as a Strong Performer in The Forrester Security Analytics Wave ReportSecuronix has been named a “strong performer” by the leading global research and advisory firm Forrester in The Forrester Wave™: Security Analytics Platforms, Q1 2017 Report. Forrester evaluated…jonsmith (8)in hacking • 8 years agoA User and Entity Behavior Analytics Scoring System ExplainedHow risk assessment for UEBA (user entity behavior analytics) works is not unlike how humans assess risk in our surrounding environment. When in an unfamiliar setting, our brain constantly takes in…jonsmith (8)in google • 8 years agoWhats Next from Google Cloud: Scenes from Google NextGoogle Cloud last week had their big event in San Francisco, gathering Partners, customers and Googlers alike to talk about Google Cloud and its bright future. Centrify was proud to sponsor this…jonsmith (8)in health • 8 years agoParsons Named as a World’s Most Ethical Company by Ethisphere Institute for Eighth Year in a RowPASADENA, CA (March 13, 2017) – Parsons is pleased to announce that it has been named by the Ethisphere Institute—a global leader in defining and advancing the standards of ethical business…jonsmith (8)in tech • 8 years agoDOING THREAT INTEL THE HARD WAY - PART 5: ANALYZE THREAT INTELLIGENCEThe Analyst work flow must provide a repeatable process to analyze the output of the integrations you have created in the previous steps. For example, if the SIEM determines that a server is…jonsmith (8)in it • 8 years agoITSM: rationalizing processes with tooling requirementsIt’s a natural response for many IT organizations to think about how implementing tools can be the solution to IT problems. But it’s a big problem, as there’s no magic pixie dust sprinkled over a…jonsmith (8)in software • 8 years agoFacilities Management Implementations Expose Data GapsThe promise of the latest Facilities Management (FM) software is an exciting one of reduced asset and space management costs, increased productivity and a better-managed asset lifecycle. One…jonsmith (8)in technology • 8 years agoBuild your plan for the 2017 HPE Software Government SummitWe look forward to your attendance on Wednesday, March 22 for the 7th Annual Hewlett Packard Enterprise Software Government Summit. You'll gain new insights into the technology and innovations HPE…jonsmith (8)in tech • 8 years agoCISSP SPOTLIGHT: ALBERT TORRESI had been in the IT industry for over 10 years and our company was creating its first software as a service (SaaS) software offering. The previous software we had developed was only used in house.…jonsmith (8)in healthcare • 8 years agoICIT Briefing - Artificial Intelligence & Machine Learning: Cybersecurity's Paradigm ShiftICIT is pleased to host this briefing in support of its current initiative on artificial intelligence and non-signature based technologies to protect our critical infrastructures. During this…jonsmith (8)in health • 8 years agoWhy Healthcare Is The Next Big Target For RansomwareThe increasing digitization of medical data has meant more streamlined processes for patients and healthcare providers; but the transformation has also been an opportunity for malicious cyber…jonsmith (8)in security • 8 years agoWikiLeaks’ Release on CIA Hacking Tools Raises Concerns about IoT Security to New HeightsThe concept of the “Internet of Things” exploded in 2016, with many new devices able to connect to the Internet that weren’t before. Aside from the usual devices such as smartphones and personal…jonsmith (8)in security • 8 years agoMore Thoughts on Vendor Consolidation in the Security MarketIn my last blog post, I discussed a new major trend in the security market, which is that security buyers are increasingly looking to consolidate vendors and want more of a platform approach to…jonsmith (8)in tech • 8 years agoThe Potential POS BreachExabeam recently discovered unusual behavior at one of our retail customers. On some of the most sensitive point of sale (POS) devices, a local account was added to a privileged active directory…jonsmith (8)in tech • 8 years agoSNYPR Recognized as a Strong Performer in The Forrester Security Analytics Wave ReportSecuronix has been named a “strong performer” by the leading global research and advisory firm Forrester in The Forrester Wave™: Security Analytics Platforms, Q1 2017 Report. Forrester evaluated…