Accesso Secures Ticketing Solution on AWS with Alert Logic

Accesso, a global leader in the cloud ticketing and guest experience space, builds award winning SaaS solutions used in popular attractions, including theme parks, zoos, theaters, sports arenas, cultural venues, the ski industry, and more. After acquiring several new companies, Accesso realized that its outsourced security provider wasn’t checking all the necessary boxes. Accesso needed a scalable in-house security solution that could meet the company’s security and compliance needs via a single...

Log4Shell: A Tradecraft Tuesday Recap | Huntress

If you’re been living under a rock or have sworn off watching the news—and who could blame you?—you may not know that there’s a new software vulnerability in town.Log4j, which is developed and licensed by Apache, is a popular logging tool that touches a lot of software applications. This is no exaggeration. Those affected include Apple, Amazon, Cisco, Tesla, Minecraft and FileZilla FTP—and that’s the short list. Hundreds of other third-party applications also use Log4j.Java-based Log4j uses the...

Dollars and Sense: The True Value of Our Human ThreatOps Team

What do large enterprises, mid-market and small businesses all have in common? The answer: they’re all vulnerable to a cyberattack. Unfortunately, this reality isn’t likely to change in the foreseeable future. But that doesn’t mean that you can’t or shouldn’t fight back. Preventive measures like security awareness training, data hygiene best practices and comprehensive antivirus software are critical frontline defenses in your security strategy. But what happens when a threat gets past them?

Evolving the Hunt: Host Isolation for Smarter Defense

Will you be ready when the next attack happens? Cyberattacks are the new normal. It’s no longer a question of “if” an attack is going to occur, but “when.” Your ability—or lack thereof—to quickly respond to a malware incident can make or break your business and client relationships. To help you overcome this ongoing challenge to your network’s security, we’ve added a Host Isolation feature to The Huntress Security Platform.

Just the Facts: Why AI and Machine Learning Aren't the Same Thing

As more companies seek out forward-thinking approaches to data management and enterprise operations, they're likely to come across AI and machine learning. However, one of the biggest misconceptions about these powerful tools is that they are one in the same and capable of being freely exchanged as both concepts and terminologies. But this could not be more wrong and companies need to understand why if they want to correctly apply the right tool and achieve the results that they desire.

The Case for Symbolic AI in NLP Models

The promise of AI is, in some ways, already a reality. Thanks to natural language processing (NLP) we can successfully analyze language-based data and effectively communicate with virtual assistant machines. But these achievements often come at a high cost and require significant amounts of data, time and processing resources when driven by machine learning. Not to mention, you run the risk of less accurate results. However, these obstacles aren’t a given. In fact, with the right strategy, you could avoid them altogether. Known as symbolic approach, this method for NLP models can yield both lower computational costs as well as more insightful and accurate results.

Tech Fail: The Hidden Bias in Facial Recognition Systems

In less than twenty years, artificial intelligence has evolved from a vague concept to an indispensable tool with real-world applicability. The field has enjoyed significant advances in recent years - some of the most promising of which have occurred in the area of facial recognition. As a result, the technology is now more accurate than ever before, making it an attractive resource for both commercial and public sectors. However, the accuracy of facial recognition software can vary significantly, depending on the type of human subjects being analyzed.