Remove CTO Remove Machine Learning Remove Malware
article thumbnail

The Future of Machine Learning in Cybersecurity

CIO

Machine learning (ML) is a commonly used term across nearly every sector of IT today. This article will share reasons why ML has risen to such importance in cybersecurity, share some of the challenges of this particular application of the technology and describe the future that machine learning enables.

article thumbnail

Cybersecurity Automation: Leveling the Playing Field

CIO

By Leonard Kleinman, Field Chief Technology Officer (CTO) ) Cortex for Palo Alto Networks JAPAC Many things challenge how we practice cybersecurity these days. Artificial Intelligence, IT Leadership, Machine Learning The result is a more efficient, cost-effective, and productive cyber workforce.

CTO 214
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

RedOwl Analytics Named “Most Innovative Company at RSA Conference”

CTOvision

Gerhard Eschelbeck, Chief Technology Officer and Senior Vice President, Sophos. Cylance PROTECT takes a mathematical approach to malware identification, utilizing patent-pending machine learning techniques instead of signatures and sandboxes. CTO Cyber Security DoD and IC George Hoyem RSA RSA Conference'

article thumbnail

Versa raises $120M for its software-defined networking and security stack

TechCrunch

They came from Juniper Networks, where Apurva Mehta was the CTO and chief architect of the mobility business unit and Kumar Mehta was the VP of engineering. . “We find ourselves in an extremely good place to have the right solution that meets the market needs.”

Security 193
article thumbnail

Build Endpoint Security into Your Zero Trust Strategy

Palo Alto Networks

Let’s start with a quick overview of Zero Trust: As described by Palo Alto Networks CTO Nir Zuk , “Zero Trust is an end-to-end cybersecurity strategy that spans the infrastructure. You should look for tools that apply machine learning to endpoint data to increase detection accuracy. How Cortex XDR Enables Zero Trust.

article thumbnail

Does Next-Generation Anti-Virus Solve the Fatal Flaws of Anti-Virus?

CTOvision

PCworld on Macrobased Malware. Microsoft on Macro Malware. Trendmicro on Macro Malware. Moreover, even in the context of attacks that are file-based, malware is increasingly encrypted or packed using obfuscation engines, and then unpacked or decrypted in memory when executed. See: Security Ledger on Fessleak.

Malware 126
article thumbnail

Register now: GenAI, risk & the future of security

CIO

Along with the promise is the peril of AI being used to cause harm by launching more efficient malware, creating sophisticated deepfakes, or by unintentionally disclosing code or trade secrets. Learn more about AI, security, and other pressing infosec issues at CSO’s Future of Cybersecurity Summit , a virtual event taking place June 8.

Malware 78