Remove CTO Remove Leadership Remove Malware Remove Network
article thumbnail

What is AI’s current impact on cybersecurity?

CIO

In our inaugural episode, Michael “Siko” Sikorski, CTO and VP of Engineering and Threat Intelligence at Unit 42 answers that question and speaks to the profound influence of artificial intelligence in an interview with David Moulton, Director of thought leadership for Unit 42. What’s Sikorski’s critical concern?

article thumbnail

Register now: GenAI, risk & the future of security

CIO

Along with the promise is the peril of AI being used to cause harm by launching more efficient malware, creating sophisticated deepfakes, or by unintentionally disclosing code or trade secrets. Careers, IT Leadership, Security Practices Chris Hughes, CISO and co-founder of Aquia Inc. Check out the full summit agenda here.

Malware 130
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

25 Feb Cloudera Federal Forum in Tysons Corner: Amazing agenda filled with lessons learned and best practices

CTOvision

Attendees will have the opportunity to attend expert briefings, learn from and network with experienced practitioners, and ask questions to advance their agency data analytics initiatives and save their organization’s time, funding, and staff resources. Registration & Networking Breakfast. Technology Insights Keynote.

article thumbnail

The Future of Machine Learning in Cybersecurity

CIO

Users are no longer mostly in the office, as remote work is widely accepted. Not all that long ago, it was common for enterprises to rely on signature-based detection for malware, static firewall rules for network traffic and access control lists (ACLs) to define security policies.

article thumbnail

Join Architects, Planners, Program Managers, Data Scientists at 4th Annual Cloudera Federal Forum in DC 25 Feb

CTOvision

Attendees will have the opportunity to attend expert briefings, learn from and network with experienced practitioners, and ask questions to advance their agency data analytics initiatives and save their organization’s time, funding, and staff resources. Registration & Networking Breakfast. Technology Insights Keynote.

article thumbnail

Cybersecurity Automation: Leveling the Playing Field

CIO

By Leonard Kleinman, Field Chief Technology Officer (CTO) ) Cortex for Palo Alto Networks JAPAC Many things challenge how we practice cybersecurity these days. Aim to gather data from all aspects of your business environment, such as endpoint, network, and cloud.

CTO 350
article thumbnail

Enhance Your Security Posture: Doing Four Things Can Reduce Unauthorized Penetrations by 85%

CTOvision

Malware Defenses. href="[link] Control 5: Malware Defenses. Secure Configurations for Network Devices such as Firewalls, Routers, and Switches. href="[link] Control 10: Secure Configurations for Network Devices such as Firewalls, Routers, and Switches. Limitation and Control of Network Ports, Protocols, and Services.