Homepage Rankings and Research Companies Channelcast Marketing Matters CRNtv Events WOTC Jobs HPE Zone Masergy Zenith Partner Program Newsroom Intel Partner Connect Digital Newsroom Dell Technologies Newsroom IBM Newsroom Juniper Newsroom The IoT Integrator NetApp Data Fabric Intel Tech Provider Zone

12 Most Exciting Cybersecurity Technologies To Watch At Black Hat 2019

CRN asks 12 executives, sales and technical leaders attending Black Hat 2019 which cybersecurity technologies they're most excited to see come to fruition and how customers and solution providers will benefit.

Back 1 ... 6   7   8   9   10   ... 13 Next

Anomaly Detection For Applications

Anomaly detection for the application layer is likely to become the next billion-dollar cybersecurity market because it's very challenging from a technology perspective to baseline app behavior and identity app-based threats by using prior knowledge and machine learning, according to Steve Quane, Trend Micro's executive vice president of enterprise and hybrid cloud solutions.

The bread and butter of DevOps tools is identifying and calling out lines of incorrect code because, from a configuration and vulnerability question, an insecure piece of code makes the whole organization liable, Quane said.

The rapid pace of change has made this difficult, Quane said, because businesses are attempting to automate in a rapidly changing infrastructure. The challenges have brought practitioners from different parts of the IT organization together, Quane said, with container developers and microservices users now able to talk more freely about business logic and security experts now talking about OSes.

Back 1 ... 6   7   8   9   10   ... 13 Next

sponsored resources