article thumbnail

AI's Offensive & Defensive Impacts

Palo Alto Networks

We recently chatted with Michael Sikorski, the CTO of Unit 42 who leads Threat Intelligence and Engineering for the division. We're trying to actually create malware using LLMs and then feeding it and throwing it at our products to see how well they do," he notes about the proactive defense work of Palo Alto Networks.

article thumbnail

Register for 12 Jun 2014 Webinar: Automated Removal of Advanced Threats

CTOvision

Here are the details: If you’re trying to stay ahead of advanced persistent threats getting inside your network while working with shrinking budgets that impact headcount and training, then you know that defending your enterprise isn’t easy. Understand benefits of automated malware removal, not just remediation.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

12 Jun 2014 Webinar: Automated Removal of Advanced Threats

CTOvision

Here are the details: If you’re trying to stay ahead of advanced persistent threats getting inside your network while working with shrinking budgets that impact headcount and training, then you know that defending your enterprise isn’t easy. Understand benefits of automated malware removal, not just remediation.

article thumbnail

The Vital Zero Trust for Private Cloud Event

Palo Alto Networks

This event has been designed for you to make the most of the expertise of security visionaries and industry experts, including Founder and CTO Nir Zuk. How and why Palo Alto Networks Founder and CTO Nir Zuk envisions the need for applying a Zero Trust architecture for your private cloud’s digital transformation journey. Consider this.

Cloud 86
article thumbnail

The Future of Machine Learning in Cybersecurity

CIO

Not all that long ago, it was common for enterprises to rely on signature-based detection for malware, static firewall rules for network traffic and access control lists (ACLs) to define security policies. Challenge 2: The access to large amounts of training data, especially labeled data.

article thumbnail

Radar Trends to Watch: December 2022

O'Reilly Media - Ideas

Shutterstock will be collaborating with OpenAI to build a model based on DALL-E that has been trained only on art that Shutterstock has licensed. They will also put in place a plan for compensating artists whose work was used to train the model. The result is a robot that can perform tasks that it has not been explicitly trained to do.

article thumbnail

Cybersecurity Automation: Leveling the Playing Field

CIO

By Leonard Kleinman, Field Chief Technology Officer (CTO) ) Cortex for Palo Alto Networks JAPAC Many things challenge how we practice cybersecurity these days. It also enables a greater ROI on your current tools and technology, bringing them into play as part of the orchestration process.

CTO 357