5 Unsettling cyberthreats

Cyberthreats are typically boring, repetitive, and require a reasonably predictable remediation process. A SQL injection is a SQL injection, no matter who’s trying it.  But what about the outliers? What about threats that impact you, but you can’t remediate, or establish a policy to cover? Here are 5 cyberthreats that if you’re not frightened by,…

Explained: Bayesian spam filtering

Bayesian spam filtering is based on Bayes rule, a statistical theorem that gives you the probability of an event. In Bayesian filtering it is used to give you the probability that a certain email is spam. Named after the statistician Rev. Thomas Bayes who provided an equation that basically allows new information to update the…

BrandPost: Desperately seeking cybersecurity help

Security executives desperate to fill cybersecurity openings face the worst IT skills shortage in memory with the workforce gap in the information security field expected to reach 1.5 million cybersecurity job openings by 2019. The White House grew so concerned that it introduced the Cybersecurity National Action Plan earlier this year. The government’s investment to…