Circle
Events
Blog

Industry Insights

Read the latest cloud security news, trends, and thought leadership from subject matter experts.

Industry Insights
Four Reasons for Alert Fatigue and How to Make It Stop
Published: 06/24/2022

This blog was originally published by LogicHub here. Written by Ryan Thomas, VP of Product Management, LogicHub. Alert (or alarm) fatigue is the phenomenon of becoming desensitized (and thus ignoring or failing to respond appropriately) to signals meant to warn us about emergencies.IT security...

The 3 Biggest Challenges Faced by Today's SOCs & One Smart Solution
Published: 06/14/2022

This blog was originally published by LogicHub here. Written by Kumar Saurabh, CEO and Co-founder, LogicHub. As a security operations professional, you've put in your fair share of late nights. You know what it's like to wake up to a deluge of alerts and the need to assess the situation — fast. Y...

Predictive Analytics and Machine Learning in Cybersecurity: an Untapped Opportunity for ‘Negative’ Response Time
Published: 06/13/2022

This blog was originally published by CXO REvolutionaries here. Written by Brad Moldenhauer, CISO - Americas, Zscaler. The chief information security officer (CISO) is measured by his or her ability to reduce risk, control cost, and minimize friction among employees, data, and the business at lar...

It's Time to Put AI to Work in Security
Published: 05/31/2022

This blog was originally published by LogicHub here. Written by Willy Leichter, LogicHub. While we’ve been talking about and imagining artificial intelligence for years, it only has recently started to become mainstream, and accepted for a wide range of applications – from healthcare analytics to...

The Evolution from SIEM to AI Driven Automation
Published: 04/12/2022

This blog was originally published by LogicHub here. Written by Kumar Saurabh, LogicHub. Kumar Saurabh, LogicHub CEO and Co-founder, discusses his experience in the SIEM space and what he sees as the natural evolution from SIEM technology to AI and automation driven detection and response.The Ear...

Handling the Challenge of Model Drift in Data Lakes
Published: 03/30/2022

Written by Dr. Nathan Green, Marymount University and Oliver Forbes, NTT DATA One of the most constant and evolving characteristics of the sharing of information, is data in its readable form and its various models of consumption. Machine learning is an impactful tool of analysis that plays a...

Adopting AI-based Attack Detection
Published: 03/24/2022

This blog was originally published by LogicHub here. Written by Willy Leichter, Chief Marketing Officer, LogicHub. The security industry is long-overdue for real innovation with the practical application of emerging technologies around automation, machine learning, and artificial intelligence for...

The Top 22 Digital Transformation Trends To Look Out For In 2022
Published: 03/22/2022

This blog was originally published by Contino here. Written by Deepak Ramchandani, Contino. 2021 was a big year in the world of digital transformation. The pandemic continued to push businesses to accelerate their digital journeys. From data-driven sustainability initiatives to cloud-first remote...

On the Cyber Horizon
Published: 01/20/2022

This blog was originally published by KPMG on December 16, 2021. Written by David Ferbrache, KPMG. As 2021 draws to a close, we see a world still challenged by COVID-19, necessitating new business models, new channels and a shift (perhaps for the long term) to remote and hybrid working. But one t...

Securing Data Lakes in a Data Centric World
Published: 01/14/2022

Written by Dr. Diane Murphy, Marymount University and Oliver Forbes, NTT DATA Data allows the business of today to optimize performance, investigate fraud and discover solutions to problems that we didn't even know the question to. At the heart of such are the inner workings of expansive data lak...

You Can’t Detect What You Can’t See – In Real-Time. The Modern Cloud Security Edition
Published: 08/06/2021

This blog was originally published by Blue Hexagon here.Written by Arun Raman, Blue Hexagon.There is an old maxim in cybersecurity: “You cannot detect what you cannot see.” While we hold the need for security visibility as a self-evident truth, there are implications for a cloud security architec...

3 Key DevSecOps Trends for 2021
Published: 07/29/2021

This blog was originally published by Blue Hexagon here.Written by Saumitra Das, Blue Hexagon.DevSecOps is a term that means different things to different people. I see it as primarily as an umbrella term for “continuous security” or security that is built into the process of building, shipping, ...

Machine Learning in Identity and Access Management
Published: 07/14/2021

This blog was originally published by ZTEdge hereWritten by Leo Versola, ZTEdge In recent years, artificial intelligence and machine learning have been quietly transforming industries from agriculture and education to healthcare, marketing, and customer service. In 2018 over 60,000 US patent app...

Proposed Principles for Artificial Intelligence Published by the White House
Published: 02/19/2020

By Francoise Gilbert, Data & Privacy Expert, DataMinding.comThis blog originally appeared on Francoise Gilbert's blog here, read more updates around privacy by going to here website DataMinding.com.A draft memorandum outlining a proposed Guidance on Regulation of Artificial Intelligence Applicati...

Browse by Topic
Write for the CSA blog
Submit your blog proposal

Sign up to receive CSA's latest blogs

This list receives 1-2 emails a month.