Blog | G5 Cyber Security

Catching a RAT by the tail

Last month I examined how machine learning could be used to detect low and slow insider threats. In this, the final installment of my trilogy on real-world use cases from the recent Verizon Data Breach Digest, Ill discuss how remote access threats can be exposed with machine learning techniques. The Identity Theft Resource Center (ITRC) has been tracking security breaches since 2005, looking for patterns, new trends and information to educate businesses and consumers on the importance of protecting identities. In addition to monitoring how identities are being used and managed, other critical data sources within an organizations computing environment should be examined to provide more context beyond who and what.”]

Source: https://www.csoonline.com/article/3086965/remote-access-threats.html

Exit mobile version