NSFOCUS Recognized in Groundbreaking AI Security Industry Map
September 18, 2024
Beijing, China, September 18, 2024 – At the National Cybersecurity Awareness Week, the Cloud Security Alliance (CSA) Greater China Region unveiled the industry’s first-ever AI-empowered security map: AI Security Industry Map, 2024. This comprehensive map delineates four major categories and eighteen sub-categories, offering a clear depiction of the “AI+Security” ecosystem and the landscape of innovative […]
NSFOCUS Recognized as a Leading Innovator in AI-driven Cybersecurity Solutions at WAIC 2024
July 12, 2024
SANTA CLARA, Calif., July 12, 2024 — NSFOCUS is honored to announce that its Large Model Empowered Security Operations case has been featured in the 2024 Case Studies of Demonstration Application for Foundation Models at the World Artificial Intelligence Conference (WAIC). This prestigious recognition highlights NSFOCUS’s pioneering efforts in AI-driven cybersecurity solutions. The Case Studies, […]
AISecOps Development Trend
November 10, 2021
As an old saying goes, “Rome was not built in a day”, it is impossible to build AISecOps capabilities simply by following the example of other businesses. In fact, the most topical and mature AI technology is widely applied, but needs to be delved a little deeper. For instance, typical intelligence services like intelligence speech […]
AISecOps Technology and System
November 3, 2021
Core Connotations Literally, AISecOps is composed of three core technologies, i.e. AIOps, AISec, and SecOps. AISec-enabled technology fusion brings new expectations to the industry. Both AI security and AI-based security applications have become hot topics in academia and industry. AI has been successfully applied in multiple single-point security technologies and specified scenarios, such as malware […]
SecOps Development: Brief History, Outlook and Challenges
October 20, 2021
With the boom of the global digital economy, cybersecurity is converging with the Internet of Things (IoT), industrial Internet, cloud computing, and 5G, bringing about disruptive changes to security in various aspects, including traditional physical security, biological security, public security, and national security. Meanwhile, the attack surface keeps expanding in cyberspace as malicious attackers, larger […]
Attack Path Visualization in Security Operations
October 7, 2021
Cyberattacks are becoming increasingly sophisticated, usually involving multiple steps. This necessitates corresponding protections. Attack path analysis is a process of analyzing detected attacks from the network attributes, alerts, vulnerabilities, and assets, finding out the attack logic, and identifying attack paths. Such analysis can inform security operations personnel in their event and risk analysis so that […]