Tuesday, July 24, 2018

How machine learning anomaly detection works inside SAP

TechTarget
Latest Technology News & Expert Advice     July 24, 2018
TechTarget
Issue Highlights:
How machine learning anomaly detection works inside SAP
Zero-trust model promises increased security, decreased risk
How cybersecurity risk fits into enterprise risk management
A security operations center for hire? Something to consider
How to use the OODA loop to improve network security
How machine learning anomaly detection works inside SAP
SAP CSO Justin Somaini discusses how SAP uses machine learning for security tasks, like anomaly detection, and compares supervised and unsupervised algorithms.
Zero-trust model promises increased security, decreased risk
The zero-trust model takes focused and sustained effort, but promises to improve most companies' risk posture. Learn what it takes to get the most out of zero trust.
How cybersecurity risk fits into enterprise risk management
In security, perfection is impossible, but risk management frameworks plus a range of strategies can significantly reduce your organization's risk.
A security operations center for hire? Something to consider
There are some good reasons your company should consider hiring a third party to provide SOC services, but certain aspects of security operations should be kept in-house.
How to use the OODA loop to improve network security
The OODA loop can be used to establish cyber deception against hackers to improve network security. Learn the OODA steps and how they can be applied to security with Kevin Fiscus.
This newsletter is published by TechTarget.

TechTarget Member Services, 275 Grove Street, Newton, MA 02466.
Contact: webmaster@techtarget.com

Copyright 2018 TechTarget. All rights reserved. Designated trademarks and brands are the property of their respective owners.

When you access content from this newsletter, your information may be shared with the sponsors or future sponsors of that content as described in our Privacy Policy.

Privacy Policy | Unsubscribe
TechTarget

No comments: