AI in cybersecurity: what works and what doesn't

Email not displaying correctly? View it in your browser.

IDG’s Top Enterprise Stories

Our top picks from IDG's editors
Aug 15, 2018
IDG
Featured Image
INSIDER

Cloud computing 2018: How enterprise adoption is taking shape

Research: Nine out of ten companies will have some part of their applications or infrastructure in the cloud by 2019, and the rest expect to follow by 2021. Here’s how they’re making the shift Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

AI in cybersecurity: what works and what doesn't
3 CRM use cases: Which is right for you?
15 APIs every developer should know
Why you should consider crowdsourcing IT security services
12 signs your strategic partnership has gone wrong
Blockchain phase 2: Will it scale?
Looking to upskill IT staff? An LMS may be key

White Paper: Hitachi ID Systems, Inc.

Securing Privileged Access with Hitachi ID Privileged Access Manager (PAM)

Privileged accounts, like their name suggests, are accounts designed to provide broad access to systems and data. They are an integral part of every IT infrastructure and play a key role in a large variety of day-to-day operations. Read More

Thumbnail Image
INSIDER

AI in cybersecurity: what works and what doesn't

Much of what we hear about artificial intelligence and machine learning in security products is steeped in marketing, making it hard to know what these tools actually do. Here's a clear-eyed look at the current state of AI & ML in security. Read More

Thumbnail Image
INSIDER

3 CRM use cases: Which is right for you?

Let's look at the big three CRM use cases from 50,000 feet so you can see where your organization’s processes and people fit. Read More

Thumbnail Image
INSIDER

15 APIs every developer should know

From AI and AR to transportation and telephony, these web APIs open up all kinds of intriguing possibilities to developers Read More

Thumbnail Image

Why you should consider crowdsourcing IT security services

Whether you need a pentesting team, a bug bounty program, or a vulnerability disclosure plan, several crowdsourcing platforms can take the risk and pain from the process. Read More

Thumbnail Image
INSIDER

12 signs your strategic partnership has gone wrong

The most successful IT partnerships are continuously evaluated. Here’s how to tell a strategic IT relationship is on the rocks — and how to get it back on track. Read More

Thumbnail Image
INSIDER

Blockchain phase 2: Will it scale?

As blockchain grows in popularity, so does the conundrum of how to scale it while maintaining or boosting performance so it can compete with today's transaction networks. Read More

Thumbnail Image
INSIDER

Looking to upskill IT staff? An LMS may be key

Learning management systems (LMS) are moving out of the academic realm and finding a niche within enterprise IT departments to improve skills acquisition and boost engagement. Read More

White Paper: Bronze Drum Consulting

How Powerful New Technologies are Powering a Real-Time Revolution in Capital Markets

Discover how machine learning, informed by rich, streaming data, is helping business leaders transform financial services is this white paper from Bronze Drum Consulting. By leveraging cloud services, financial service firms now have the power to put real-time streaming data to work. Read More

Get more from the experts at these enterprise websites from IDG:

CIO | Computerworld | CSO | InfoWorld | Network World

You are currently subscribed to IDG’s Top Enterprise Stories as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Privacy Policy

Learn more about INSIDER

Copyright © 2018 IDG Communications, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.