Remove cybersecurity-analytics
article thumbnail

CyberSecurity Breakthrough Awards Recognizes DTEX as “User Behavior Analytics Platform of the Year”

Security Boulevard

We are thrilled to announce that DTEX’s Workforce Cyber Intelligence & Security platform was named User Behavior Analytics Platform of the Year in the 2022 CyberSecurity Breakthrough Awards, an industry awards program that recognizes the world’s best information security companies, products, and people.

article thumbnail

Cybersecurity and Data Analytics: Double Dipping on Two Hot Trends

CompTIA on Cybersecurity

As data analysis techniques are becoming more widely adopted, cybersecurity analytics is seen as a more advanced field straddling the line between cybersecurity and data.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Study Finds Significant Correlation Between BitSight Analytics and Cybersecurity Incidents

Dark Reading

The Marsh McLennan Cyber Risk Analytics Center conducted independent analysis of BitSight's Security Rating and risk vectors and cybersecurity incident data.

article thumbnail

Google offers certificate in cybersecurity, no dorm room required 

Tech Republic Security

Google adds a Cybersecurity Certificate to its Career Certificates program, which offers paths to such enterprise tech fields as data analytics, IT support and business intelligence. The post Google offers certificate in cybersecurity, no dorm room required appeared first on TechRepublic.

article thumbnail

CISA says Sisense hack impacts critical infrastructure orgs

Bleeping Computer

Cybersecurity and Infrastructure Security Agency (CISA) is investigating the recent breach of data analytics company Sisense, an incident that also impacted critical infrastructure organizations. [.]

Hacking 91
article thumbnail

Black Hat Fireside Chat: Deploying ‘AI’ as a weapon to win the ‘attack surface management’ war

The Last Watchdog

Short-handed cybersecurity teams face a daunting challenge. Related: ‘ASM’ is cybersecurity’s new centerpiece. In short, attack surface management has become the main tent pole of cybersecurity. In short, attack surface management has become the main tent pole of cybersecurity.

article thumbnail

Facebook spied on Snapchat users to get analytics about the competition

Malwarebytes

The IAAP program, used an adversary-in-the-middle method called to intercept and decrypt Snapchat’s—and later YouTube’s and Amazon’s—SSL-protected analytics traffic to provide information for Facebook’s competitive decision making. On June 9, 2016, Facebook CEO Mark Zuckerberg complained about the lack of analytics about competitor Snapchat.