Blindspotter Uses Machine Learning to Detect Network Breach Attempts

NEWS ANALYSIS: The use of machine learning to identify suspicious online activity is a new and important capability in securing the network, but privileged users were the weak point until now. BUDAPEST—There is a consistent factor that will often be discovered in the aftermath of many of today’s data breaches and network breach attempts. It’s the first phase of the attacks that few notice, because it starts as a phishing email that attempts to get the login credentials for a privileged network user.In many cases, the attack proceeds deliberately, perhaps hitting an employee who has access to information needed to get credentials with higher privileges. This continues until the hackers behind the phishing attack gain what they’re really after, the credentials for someone with complete access to the network.These initial…


Link to Full Article: Blindspotter Uses Machine Learning to Detect Network Breach Attempts