Homepage Rankings and Research Companies Channelcast Marketing Matters CRNtv Events WOTC Cisco Partner Summit Digital 2020 NetApp Digital Newsroom HPE Zone The Business Continuity Center Enterprise Tech Provider Masergy Zenith Partner Program Newsroom HP Reinvent Digital Newsroom Hitachi Vantara Digital Newsroom IBM Newsroom Juniper Newsroom Intel Partner Connect 2021 Avaya Newsroom Experiences That Matter The IoT Integrator Intel Tech Provider Zone NetApp Data Fabric WatchGuard Digital Newsroom

Black Hat 2019: 12 Cybersecurity Myths That Could Put You At Risk

CRN asks 12 executives, sales and technical leaders attending Black Hat 2019 what they see as the top oft-repeated beliefs about cybersecurity that are foolishly accepted as fact.

Back 1   2   3   ... 13 Next

Data Models Can Identify Security Threats

Artificial intelligence today is really about automating the threat hunting process and training machines to look at data sets and identify potential risks within an organization that need to be addressed, said Mike Adler, vice president of the RSA NetWitness Platform. But the data models aren't mature enough today to definitely identify a security threat as opposed to merely pointing out suspicious activity, Adler said.

Many organizations don't share data well with vendors or with one another, which Adler said exacerbates the challenge around creating well-tuned models. Most organizations want these types of analytical calculations to run on-premises, but Adler said that takes a lot of computational resources and data storage space.

Resource availability issues as well as a lack of experience in building more accurate data models across the board have hampered their construction, Adler said. But Adler expects the analytical capabilities associated with AI and machine learning to evolve significantly over the next half-decade.

Back 1   2   3   ... 13 Next

sponsored resources