02.01.2024 Views

The Cyber Defense eMagazine January Edition for 2024

Cyber Defense eMagazine January Edition for 2024 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! 201 page January Edition fully packed with some of our best content. Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

Cyber Defense eMagazine January Edition for 2024 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! 201 page January Edition fully packed with some of our best content. Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Against this backdrop, it’s critical that AI not just get the right answers, but also that it works fast and is<br />

af<strong>for</strong>dable in your environment. <strong>The</strong> speed requirements rule out batch analytics, as it’s not helpful to<br />

detect today that you were ransomwared yesterday. That means it’s critical to have a real-time, streaming<br />

architecture that still meets the requirements above to run the best AI approach against your<br />

organizations data to answer all of the security problem statements you need coverage on…at an<br />

af<strong>for</strong>dable price point. Plat<strong>for</strong>m matters.<br />

Getting the most from AI requires continuous validation and improvement<br />

Security is a hyper-dynamic space: Attack surfaces are ever-expanding, and threats are becoming<br />

increasingly difficult to detect. At the same time, security operations center (SOC) analysts are being<br />

inundated with alerts. According to <strong>The</strong> 2023 State of Threat Detection Research Report, “97 percent of<br />

SOC analysts worry about missing a relevant security event because it's buried under a flood of alerts.”<br />

Thus, it’s important even <strong>for</strong> AI that vendors validate and improve products on an ongoing basis to ensure<br />

that AI models are continuing to accomplish what they’re designed to do. In the jargon, this is done by<br />

precision and recall. Precision is a measure of the false-positive rates and recall is a measure of falsenegative<br />

rates, and they generally operate in tension with each other. Essentially, vendors need to know<br />

whether their models are catching the threats they’re intended to detect without burying analysts in alerts.<br />

No ML model is perfect, but with the right focus they can be an amazingly powerful weapon <strong>for</strong> defenders.<br />

With 92 percent of companies either using or planning to use AI and ML to enhance cybersecurity, a<br />

significant opportunity exists <strong>for</strong> vendors to create groundbreaking products that bolster security. By<br />

practicing the principles outlined above, vendors can maximize their AI-powered security offerings and<br />

bring more value to their customers than ever be<strong>for</strong>e.<br />

About the Author<br />

Kevin Kennedy is senior vice president of products at Vectra AI. With more<br />

than 27 years in technology product management, more than half of those<br />

years in security, Kevin has seen it all. From Threat Intel, Encryption and<br />

Secure Web Gateways to Content, Email, Firewall, and Network security to<br />

today leading the Threat Detection and Response product vision and strategy<br />

<strong>for</strong> Vectra. Not afraid to challenge the status quo, but respectful of the<br />

challenges security teams face, Kevin approaches product with a healthy<br />

dose of empathy - staying true to the problem to be solved - and effectively<br />

balancing innovation and practicality. Prior to Vectra, Kevin launched his<br />

career in threat intel at IronPort. He continued to hone his security product management skills with stints<br />

at Juniper, Cisco, and Agari Data. Kevin bleeds maize and blue graduating from the University of<br />

Michigan with a BSE in computer engineering.<br />

Kevin can be reached on LinkedIn at https://www.linkedin.com/in/kevinkennedysf/ and at the Vectra AI<br />

company website https://www.vectra.ai/.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2024</strong> <strong>Edition</strong> 125<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!