Cybersecurity

See how SparkPredict® can protect your infrastructure.

  • DeepArmor Enterprise

    DeepArmor Enterprise

    Read More
  • Using AI/Machine Learning to Protect Against Phishing and Weaponized Documents31:39

    Using AI/Machine Learning to Protect Against Phishing and Weaponized Documents

    Phishing is a term well known to those with connected devices. But what about less common threats, such as weaponized documents? Join SparkCognition's Director of Cybersecurity, Rick Pither, as

    Watch Video
  • DeepArmor: Endpoint Protection, Built from AI1:50

    DeepArmor: Endpoint Protection, Built from AI

    DeepArmor: Endpoint Protection, Built from AI.The DeepArmor endpoint protection platform uses the power of big data and our patented machine learning algorithms to prevent the most advanced, modern...

    Watch Video
  • How AI Stops Fileless Attacks

    How AI Stops Fileless Attacks

    A new kind of cyber attack is on the rise. Fileless attacks were involved with up to 77% of all successful cyber attacks in 2017. But what are fileless attacks, and how can you defend against...

    Read More
  • DeepArmor Endpoint Protection Testing

    Read More
  • Dispelling the Myths on Fileless Attacks

    Dispelling the Myths on Fileless Attacks

    While there are increasing amounts of information being written about fileless attacks, a surprising percentage of it is misleading or incorrect. Many vendors are peddling misinformation on what

    Read More
  • DeepArmor Endpoint Protection Testing

    DeepArmor Endpoint Protection Testing

    With cyber threats shifting their focus away from the heavily defended and protected server infrastructure and moving towards the endpoint, it is more important than ever to have robust endpoint

    Read More
  • Cyber Physical Security for the Automotive Industry Jan 2018

    Cyber Physical Security for the Automotive Industry Jan 2018

    Cars are an integral part of modern society, but they are not without their issues. Maintenance problems and breakdowns ranging in severity from inconvenient to dangerous have long plagued car owners.

    Read More
  • Increasing Use of Cyber Insurance Requirements in Contracts

    Increasing Use of Cyber Insurance Requirements in Contracts

    Author: John L. Watkins Thompson Hine LLP As the risk of cyber threats to all businesses grows, there is a corresponding interest in managing and shifting cyber risks by contract...

    Read More
  • Machine Learning Anti-Virus Turns Traditional Approach On Its Head

    Machine Learning Anti-Virus Turns Traditional Approach On Its Head

    Read More
  • DeepArmor Catches Cyber Attack Culprit CyrptoMix

    DeepArmor Catches Cyber Attack Culprit CyrptoMix

    Once again ransomware has found a way to shed its skin, bypassing vigilant malware solutions and administrators alike. In this case, CryptoMix (a combination of the ransomeware families CyrptXXX...

    Read More
  • Detecting the Difference Between Word Docs and Weaponized Docs

    Detecting the Difference Between Word Docs and Weaponized Docs

    With every new innovation in technology comes the need for protection to match it. In recent years, weaponized documents, or files that appear to victims as everyday Microsoft Office files...

    Read More
  • GandCrab Caught in DeepArmor’s Net

    GandCrab Caught in DeepArmor’s Net

    One of the toughest security challenges for any organization is the balance between what applications should be allowed and which should not. Documents are almost universally allowed and...

    Read More
  • Cognitive Analytics Securing OT Systems for Oil & Gas2:01

    Cognitive Analytics Securing OT Systems for Oil & Gas

    Cognitive Analytics Securing OT Systems for Oil & Gas. The oil and gas industry has sensors on everything, which is good for data collection but bad for security. Each sensor acts as an endpoint that

    Watch Video
  • A Cognitive Approach to System Protection

    A Cognitive Approach to System Protection

    Cybercrime is an exponentially growing threat to the world’s businesses, governments and citizens making sophisticated anti-malware more vital to security than ever. For perpetrators, there is a...

    Read More
  • How to Compare Cybersecurity Products3:06

    How to Compare Cybersecurity Products

    How to Compare Cybersecurity Products.Today there are too many antivirus programs to count. So how do you know which one is the best one? Follow our three step guide to understand which AV is best for

    Watch Video
  • DeepArmor Endpoint Protection Testing

    DeepArmor Endpoint Protection Testing

    Read More
  • Antivirus vs. Malware: Testing Your Protection

    Antivirus vs. Malware: Testing Your Protection

    Read More
  • Helping the Utility Industry: How AI Can Aid Failure Prediction and Prevention, Downtime, and Cybersecurity

    Helping the Utility Industry: How AI Can Aid Failure Prediction and Prevention, Downtime, and Cybersecurity

    The industry is experiencing a new operating environment where equipment is outfitted with sensors and communications devices. While all the data collected by this smart equipment presents great...

    Read More
  • Board Member General Allen on Cybercrime in Counties43:27

    Board Member General Allen on Cybercrime in Counties

    SparkCognition board member General John Allen (Ret.) at the 2017 NACo Conference: "There's no cyber cavalry system coming over the hill to help your compromised system." Learn more from General John

    Watch Video
  • U.S. Chamber of Commerce Cybersecurity Summit 2017 - SparkCognition Recap1:04

    U.S. Chamber of Commerce Cybersecurity Summit 2017 - SparkCognition Recap

    SparkCognition was proud to be a sponsor of the Sixth Annual Cybersecurity Summit, held in Washington D.C. The summit included expert speakers from organizations such as the CIA, FBI, and USAF coveri

    Watch Video
  • loading
    Loading More...