Veriato Blog

Tag Results

  • Five ways AI is being used in the cybersecurity industry

    by Veriato | Mar 21, 2019
    • Artificial Intelligence
    • AI
    . Businesses no longer have to spend hours sifting through financial records to detect fraud or manually investigating system logs in the wake of a cyber-attack. AI applications in security are making the lives of consumers, businesses, and today's cyber professionals much easier.
    Full story
  • What is artificial intelligence?

    by Veriato | Mar 19, 2019
    • veriato artificial intelligence
    • veriato ai
    • What is artificial intelligence
    • Artificial Intelligence
    • AI
    Artificial Intelligence is an umbrella term that is often used to describe the evolution of “smart” technology. To better understand the concept, consider the literal definitions of the words.
    Full story
  • What is Machine Learning?

    by Veriato | Mar 04, 2019
    • Artificial Intelligence
    • AI
    • Machine Learning
    Generally, artificial intelligence is the concept of making systems “smart” and empowering them to complete tasks humans may typically complete. Machine learning, one of many methods used to build artificial intelligence, leverages data and patterns to replicate human behavior with limited human direction.
    Full story
  • What Is an Insider Threat and the 5 Things You Should Know?

    by Veriato | Feb 22, 2019
    • Insider Threats
    • what is an insider threat
    • ueba
    • UBA
    • Insider Threat Detection
    • Insider Threat
    • Insider Attacks
    Gone are the days when our greatest inklings of insider threats were employees who never wanted to take vacation and did everything to avoid letting others see the financial records they were maintaining.
    Full story
  • Bad Password Management by Privileged Insiders Puts the Organization at Risk

    by Veriato | Feb 06, 2019
    • Insider Threat Intelligence
    • Insider Attacks
    • Insider Threat
    Ponemon’s 2019 State of Password and Authentication Security Behaviors Report highlights how inappropriate use of privileged password can give insiders the access they need.
    Full story
  • Dark Web Recruitment of Employees Puts Organizations at Risk

    by Veriato | Feb 05, 2019
    • cyber security
    • cyber criminals
    • Dark Web
    The idea of your employees being solicited on the Dark Web isn’t a hypothetical; it’s real, it’s tempting, and it’s lucrative.
    Full story
  • Apple Employee Steals Thousands of Confidential Files Related to Self-Driving Car Tech

    by Veriato | Feb 01, 2019
    • Insider Threat
    • Employee Monitoring
    • data theft
    No greater tech is at the forefront of cutting-edge technology than the self-driving car. With applications in the delivery, transportation, and consumer spaces, companies today are racing to ensure they have a place in this unfolding market of autonomous driving.
    Full story
  • How to Detect a Data Breach | Insider Threat Monitoring

    by Veriato | Jan 28, 2019
    • Employee Monitoring
    • Monitoring
    • Data Breach
    • Data Leaks
    • Insider Threat
    Many actions and user behavior may be signs of a breach. Here are a few to watch out for, as well as make sure your software is monitoring.
    Full story