sb-nz logo
Story image

Why machine learning is essential for cybersecurity

No matter where you look in the security world today, you’ll see the terms machine learning and artificial intelligence (AI).

There’s been a great deal of interest in machine learning and AI as security vendors and their customers look for better ways to improve their security posture and fight against advancing cyberattacks.

Machine learning and AI offer breakthroughs in solving problems in many other areas of our lives, so it’s only natural to try to use them to make similar breakthroughs in the field of security.

In a perfect world, machine learning would be the silver bullet for defeating your organisation’s security challenges.

It would enable full automation of security operations, eliminating the need for human involvement.

It would learn what every user, system, and application does in incredible detail, enabling immediate identification and handling of user impersonation, malicious intent, and other issues.

Applying AI to security via machine learning is frequently presented as an easy solution. It’s not.

Despite this, machine learning still offers a great deal of promise in improving security by greatly reducing human effort and lowering the time to detect, respond to, and recover from incidents.

That is if it is implemented correctly.

Fill in your details below to read the complete whitepaper on AI security.

Story image
OT networks warned of vulnerabilities in CodeMeter software
Manufacturers using the Wibu-Systems CodeMeter third-party licence management solution are being urged to remain vigilant and to urgently update the solution to CodeMeter version 7.10.More
Story image
Jamf extends Microsoft collaboration with iOS Device Compliance
Organisations will soon be able to use Jamf for Apple ecosystem management while using Azure Active Directory and Microsoft Endpoint manager to maintain conditional access.More
Story image
Proofpoint and CyberArk extend partnership to further safeguard high-risk users
“Our CyberArk partnership extension provides security teams with increased detection and enhanced adaptive controls to help prevent today’s most severe threats."More
Story image
Ripple20 threat could affect 35% of all IT environments – ExtraHop
The vulnerabilities have the potential to ‘ripple’ through complex software supply chains, enabling attackers to steal data or execute code.More
Story image
Shlayer malware proves Apple devices aren't as secure as you think
"Apple never talks about malware publicly, and loves to give the impression that its systems are secure. Unfortunately, the opposite has been proven to be the case with great regularity."More
Story image
The guide to digital security in unstable times
An increase in vulnerability across different sectors has meant that 2020 has seen more than its fair share of cybersecurity incidents. One of the most effective ways to combat the perils of today’s cyber-threats is to gain a better knowledge of the threat vectors looming over the heads of organisations. More