article thumbnail

From Phishing to Firewalls: Solving Security with AI

Palo Alto Networks

Billy’s journey in the field of AI for security began when he first programmed AI systems to protect innocent players from trolls in popular video games, like World of Warcraft ®. Billy explains that the number of unique malware samples has skyrocketed from around 85 million in 2012 to over a billion today.

article thumbnail

Cybersecurity Q&A with Dave Elfering, VP information security at Werner Enterprises

Sailpoint

Dave Elfering, currently Vice President of information security has also witnessed a considerable amount of growth and change over his career when it comes to information security. In 1997, Elfering began working at Werner as a project manager to help the company build its online presence and secure its data.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Chernobyl’s lessons for critical-infrastructure cybersecurity

The Parallax

What’s clear is that cyberattacks against all critical-infrastructure operations are on the rise, and nuclear-power facilities are not exempt, according to a 2016 report by the nuclear-security nonprofit Nuclear Threat Initiative. There were at least two other cybersecurity incidents at U.S. Layered security to stop hackers.

article thumbnail

What Is cloud security?

Lacework

At this time, establishing server securing meant focusing on physical measures and preventing unauthorized individuals from accessing the hardware. The 1990s also saw the rise of firewalls and antivirus programs, as organizations (and individuals) began storing and sharing more personal information online.

Cloud 98
article thumbnail

The importance of Softwares in securing websites.

Xebia

In 2012, Apple lost $8.3 From the earlier listed website types, it secures the final website product. It is widely used by many casinos and online betting websites over the world, making secured and high quality worldwide websites are characterized by day-to-day data posting and are prone to cyberattacks because of that.

article thumbnail

This Is How We Do It — Season One Recap

Palo Alto Networks

Our blog and video series, “ This is How We Do It, ” offers a behind-the-scenes, candid exposé of how Palo Alto Networks protects its security operations center (SOC) using its own solutions. It touches on the significance of artificial intelligence in cybersecurity and the ongoing concern of adversarial attacks.

article thumbnail

CIO as enabler: Building an ecosystem of innovation partners

CIO

There’s significant debate about the future of the CIO role , but one thing is clear: Digital leaders who want to be successful must look beyond the firewall and link up with an ecosystem of vendor partners, startups, and other organizations to ensure the enterprise thrives. What are we doing about cybersecurity?