Author: Jenny Adams

About: Jenny Adams

Bio:

Posts by Jenny:

BluVector Awarded Additional Patent for Machine Learning in Cybersecurity
Posted on: November 28, 2018

In-situ Capabilities Deliver Moving Defenses for BluVector Customers ARLINGTON, Va., Nov. 28, 2018 – BluVector, a leader in AI-driven network security, today announced that it has been issued a new patent for “System and method for in-situ classifier retraining for malware identification and model heterogeneity” (U.S. Patent 10,121,108). The recently awarded patent is the company’s… Read more »

Case Study: Managed Threat Detection
Posted on: October 24, 2018

Healthcare providers obtain and maintain vast quantities of personally identifiable information (PII) as well as protected health information (PHI). Having access to both PHI and PII comes with a long list of responsibilities and regulations to secure that information. Unlike other industries, healthcare providers must offer the right access to that information to ensure that they… Read more »

Case Study: Destructive Malware
Posted on: October 23, 2018

Destructive malware takes the already cunning ways in which polymorphic malware enters and hides within system and melds it with a payload that will destroy your network and data with the precision. Most organizations have implemented a layered, defense-in-depth security approach that encompasses signature-based anti-virus, sandboxes, endpoint protection and network anomaly detection. But none of… Read more »

Case Study: Ransomware
Posted on: October 23, 2018

IBC Bank (IBC), one of Texas’ largest holding companies, was looking to improve its cybersecurity detection and response capabilities for advanced targeted attacks, especially ransomware. In an effort to combat these advanced threats, IBC turned to BluVector Cortex to deliver fast and accurate malware detection that didn’t rely upon rules or signatures. As a result of… Read more »

Case Study: Protecting PII
Posted on: October 23, 2018

One state government agency was tasked with supplying IT services and security to more than 100,000 users, and protecting the Personally Identifiable Information (PII) of millions of citizens. Battling budgets and limited funds, this organization was looking for the latest in threat detection to address the volume, velocity and polymorphic nature of today’s advanced threats… Read more »

Case Study: SOC Automation
Posted on: October 23, 2018

The goal of any Security Operations Center (SOC) team is to optimize the tools they have, reduce the noise from their tools to manageable levels, and automate as much of the process as possible.  Their hope is that they can focus on the projects that will continue to enhance the security of the organization through… Read more »