Register Interest
IP EXPOCyber SecurityDeveloperAI and AnalyticsIoTBlockchain

What’s the key to a better cyber threat detection?

Tuesday 25 September 2018

Cyber security technologies are good at data collection – they collect logs and feeds from the entire infrastructure stack. But, whilst the signs of a breach are incorporated within that data, the reality is that it is so vast that it is becoming really hard to determine what is actually malicious, and what needs further analysis. Cyber criminals are, of course, taking advantage of this.

Opposite Directions, Arrow_S

A good example of such ‘plot’ is the famous Target data breach back in 2013. The retailer in fact did receive alerts that suggested a cyber attack. However, these alerts were part of 50,000+ events on the same day collected by their Security Information and Event Management (SIEM), and all of them seemed the same, so when their Security Operations Centre raised an alarm, no one realised it was part of a very serious, high-risk cyber attack.

Machine learning is very important when it comes to protecting cloud workloads – it detects anomalies, learns from cyber attack patterns and identifies new & advanced cyber threats. But even that isn't sufficient if you don't have the experts who can interpret machine learning outcomes, provide substantial threat intelligence, or investigate incidents. The fact is, the cyber threats are here to stay; businesses need to therefore understand the risks and their cloud attack surface. They must make sure to identify the risks before cyber criminals discover them first.

If you’d like to learn more about cyber threat detection or discuss ways AlertLogic could improve your cyber security posture please visit us at stand AA24 – we’ll be there on both days!

Digital Transformation Europe EXPO 9-10 October 2019

Register Interest

IP EXPO takes place on 9-10 October 2019 at ExCeL London. This unmissable event is your one stop shop for digital transformation and covers every vertical you need to consider for successful implementation. Including network and hardware, cybersecurity, developer community, AI and analytics, IoT and Blockchain.