Cuelogic Blog Icon
Cuelogic Career Icon
Home > Blog > Cybersecurity
Evaluation of Machine Learning Algorithms for Intrusion Detection Systems

Evaluation of Machine Learning Algorithms for Intrusion Detection System

The last decade has seen rapid advancements in machine learning techniques enabling automation and predictions in scales never imagined before. This further prompts researchers and engineers to conceive new applications for these beautiful techniques. It wasn’t long before machine learning techniques were used in reinforcing network security systems. The most common risk to a network’s …

Advanced threat detection methods

Unraveling Detection Methodologies: Indicators vs. Anomalies vs. Behaviors

In the information age we live in, online computing, transacting and storage of all data or information related to any field and work is the expected norm. With all businesses moving to the cloud, security of the data held in terms of authentication and authorization become key. Several companies have lost their credibility overnight due …

Walking-the-tightrope-between-protecting-consumer-privacy-and-utilising-generated-data

Walking the tightrope : Balancing between Consumer Privacy & Utilizing Generated Data

Data Utilization vs Consumer Privacy Walking the tightrope has been challenging for many companies that are using legacy systems. They’re unable to handle consumer privacy issues and control the generated data the right way. They’re also looking towards other companies within the industry to analyze how they are working with data. Companies should be looking …

Healthcare_cybersecurity

Healthcare Cybersecurity: The Solution is Security & Operations Center (SOC)

As the security of data becomes one of the most serious issues, a robust Security and Operations (SOC) team could be the solution to cybersecurity in the Healthcare industry. In the last two years, almost 90% of hospitals in the United States have reported a security breach. Cyber attacks cost the United States healthcare system …

AI-in-Cybersecurity-Pitting-Algorithms-vs-Algorithms

AI in Cybersecurity : Pitting Algorithms vs Algorithms

The Cure that is Artificial Intelligence  AI in cybersecurity has been revolutionizing the way we view defending against dark hat hackers and penetrators that have malicious intent. That’s why it’s essential to have a dedicated approach when it comes to  cybersecurity. From a technology standpoint, it’s necessary to have a holistic approach, when companies understand …