Remove CTO Remove Infrastructure Remove Machine Learning Remove Malware
article thumbnail

Register now: GenAI, risk & the future of security

CIO

Along with the promise is the peril of AI being used to cause harm by launching more efficient malware, creating sophisticated deepfakes, or by unintentionally disclosing code or trade secrets. Learn more about AI, security, and other pressing infosec issues at CSO’s Future of Cybersecurity Summit , a virtual event taking place June 8.

Malware 130
article thumbnail

The Future of Machine Learning in Cybersecurity

CIO

Machine learning (ML) is a commonly used term across nearly every sector of IT today. This article will share reasons why ML has risen to such importance in cybersecurity, share some of the challenges of this particular application of the technology and describe the future that machine learning enables.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Build Endpoint Security into Your Zero Trust Strategy

Palo Alto Networks

Let’s start with a quick overview of Zero Trust: As described by Palo Alto Networks CTO Nir Zuk , “Zero Trust is an end-to-end cybersecurity strategy that spans the infrastructure. You should look for tools that apply machine learning to endpoint data to increase detection accuracy. How Cortex XDR Enables Zero Trust.

article thumbnail

RedOwl Analytics Named “Most Innovative Company at RSA Conference”

CTOvision

Gerhard Eschelbeck, Chief Technology Officer and Senior Vice President, Sophos. Cylance PROTECT takes a mathematical approach to malware identification, utilizing patent-pending machine learning techniques instead of signatures and sandboxes. CTO Cyber Security DoD and IC George Hoyem RSA RSA Conference'

article thumbnail

Beyond Visibility: Proactive Cloud Workload Security in the Real World

Prisma Clud

That number speaks for itself, showcasing the increasing reliance on the public cloud as the infrastructure of choice. As the CTO of Prisma Cloud, I'm thrilled to share our insights and the learnings gained from witnessing the rise of cloud-native technologies and the rapid adoption of the public cloud.

Cloud 105
article thumbnail

Cybersecurity Snapshot: A Look Back at Key 2023 Cyber Data for GenAI, Cloud Security, Vulnerability Management, OT, Cyber Regulations and more

Tenable

Yes, cyberattackers quickly leveraged GenAI for malicious purposes, such as to craft better phishing messages , build smarter malware and quickly create and spread misinformation. To prevent this, you need visibility into your cloud's identity infrastructure,” he wrote.

article thumbnail

Risk IQ Launches Groundbreaking Security Intelligence Services Product That Enables Automated Defenses

CTOvision

Attackers use automation and can launch sophisticated attacks at very low cost by rotating and reusing undetected infrastructure. RiskIQ has provided defenders with access to Internet datasets, advanced analytics and machine learning to stay one step ahead. Bob Gourley. Phishing, spear phishing and whaling. Email abuse.