Remove CTO Remove Data Remove Machine Learning Remove Malware
article thumbnail

The Future of Machine Learning in Cybersecurity

CIO

Machine learning (ML) is a commonly used term across nearly every sector of IT today. And while ML has frequently been used to make sense of big data—to improve business performance and processes and help make predictions—it has also proven priceless in other applications, including cybersecurity.

article thumbnail

Cybersecurity Automation: Leveling the Playing Field

CIO

By Leonard Kleinman, Field Chief Technology Officer (CTO) ) Cortex for Palo Alto Networks JAPAC Many things challenge how we practice cybersecurity these days. It also enables a greater ROI on your current tools and technology, bringing them into play as part of the orchestration process. Where to start?

CTO 296
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Meet ‘misinfosec’: Fighting fake news like it’s malware

The Parallax

How Facebook fights fake news with machine learning and human insights. CrowdStrike CEO on political infosec lessons learned (Q&A). ”—Sara-Jayne Terp, data scientist and strategist, founder of Bodacea Light Industries. “Sometimes, the newspapers improve,” he says; often, they do not.

Malware 189
article thumbnail

Register now: GenAI, risk & the future of security

CIO

Along with the promise is the peril of AI being used to cause harm by launching more efficient malware, creating sophisticated deepfakes, or by unintentionally disclosing code or trade secrets. Learn more about AI, security, and other pressing infosec issues at CSO’s Future of Cybersecurity Summit , a virtual event taking place June 8.

Malware 130
article thumbnail

Versa raises $120M for its software-defined networking and security stack

TechCrunch

According to data from PitchBook, venture capital investments have reached about $13.66 They came from Juniper Networks, where Apurva Mehta was the CTO and chief architect of the mobility business unit and Kumar Mehta was the VP of engineering. He demurred when asked what percentage of the financing was equity versus debt.

Security 193
article thumbnail

Build Endpoint Security into Your Zero Trust Strategy

Palo Alto Networks

Endpoints play an important role, as they store and access data all around the world, making them vulnerable entry points for cyberattackers. With data and applications being accessed from distributed devices, the prevention-first approach and security policy should be consistent and coordinated between your endpoints and your network.

article thumbnail

RedOwl Analytics Named “Most Innovative Company at RSA Conference”

CTOvision

Gerhard Eschelbeck, Chief Technology Officer and Senior Vice President, Sophos. Cylance PROTECT takes a mathematical approach to malware identification, utilizing patent-pending machine learning techniques instead of signatures and sandboxes. CTO Cyber Security DoD and IC George Hoyem RSA RSA Conference'