• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH
Compliance

The New Weapon Against Cyber Threats – Machine Learning

Machine learning helps businesses and users keep sensitive data locked in, and cyber attackers out.

June 27, 2018 Jessica Messier 3 Comments

According to IT World Canada, machine learning is playing an important role in modern protection against cyberattacks. As a result, security companies are hopping on the bandwagon and developing and deploying machine learning solutions to keep sensitive data safe.

Machine learning is helping businesses keep one step ahead of cyberattackers, IT World Canada says. For example: Geoff McDonald, a cloud machine learning architect for Windows Defender, told IT World Canada that today’s spear-phishing incidents are created with different scripts within malicious code so that anti-malware won’t catch it.

This is where machine learning shines:  “However, these patterns are really good for machine learning models, because if you were to look at the code it would be highly suspicious,” McDonald said. “A machine learning model can look at it the way a human can and clearly identify that it is hiding malicious intent.”

IT World Canada also says that security vendors are incorporating plans and/or classes of “machine-learning algorithms into their solutions to focus on specific problem domains.” Machine learning solutions are also being used to develop “an optimal remediation response,” which will be created from lessons learned from past security breaches. Plus, these solutions will be able to be used to scan users, user roles, titles, and actual access, giving security administrators the chance to fine-tune hiccups as needed.

What decision makers should keep in mind:

While machine learning is becoming the go-to for protection against cyberattacks, relevant solutions aren’t fool proof yet. Avivah Litan, cybersecurity analyst for Gartner, said that machine learning is still in its infancy, and is “restricted to looking at suspicious files or network behavior;” this means it is not yet able to “scrutinize processes, such as what is running in memory.”

As a result, decision makers considering machine learning as a cybersecurity method should keep in mind that machine learning isn’t able to catch everything, is limited to only catching suspicious files, and might still throw off false positives. For example, “If a bad guy logs into a machine directly and starts writing routines in Powershell, machine learning isn’t going to see that,” Litan told IT World Canada.

If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our digital newsletters!

Tagged With: Cyber Security, Machine Learning

Related Content:

  • White House AI Regulations, ChatGPT, Generative AI 5 Things You Need to Know About the…
  • DDoS, NETSCOUT Arbor Insight 7 Layers of DDoS Attacks and How To…
  • cyber-attack-skull Spike in Cyberattacks Exposes Vulnerabilities in University Security…
  • Google, Bard Google: Bard Now 30% Better at Computation-Based Problems

Free downloadable guide you may like:

  • ChatGPT, generative AI, enterprise, workplaceBlueprint Series: ChatGPT and Generative AI in the Workplace

    This latest release of the TechDecisions Blueprint Series explores the new phenomenon of tools such as ChatGPT and how IT leaders should go about deploying generative AI in their organizations.

Reader Interactions

Trackbacks

  1. Human Touch or Artificial Intelligence—Which Handles More Tasks at the Factory? - My TechDecisions says:
    November 14, 2018 at 4:00 pm

    […] all of the buzz recently about machine learning, artificial intelligence, and robots, it would appear as if humans’ days are numbered on the […]

    Reply
  2. Sentryo Joins IBM Security App Exchange Community to Help Build a Unified Approach to IT and OT Cybersecurity - My TechDecisions says:
    February 21, 2019 at 4:00 pm

    […] cyber threats which make headlines every day are now targeting industrial networks and are impacting the real […]

    Reply
  3. eSentire Beefs Up its Managed Vulnerability Service by Adding Solutions from Tenable - My TechDecisions says:
    May 7, 2019 at 4:00 pm

    […] the IT landscape of your business continues to evolve, so does its vulnerability to cyber threats. A proactive approach is the best course of action to protect your data and assets, and companies […]

    Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest Downloads

Practical Design Guide for Office Spaces
Practical Design Guide for Office Spaces

Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-fa...

New Camera Can Transform Your Live Production Workflow
New Camera System Can Transform Your Live Production Workflow

Sony's HXC-FZ90 studio camera system combines flexibility and exceptional image quality with entry-level pricing.

Creating Great User Experience and Ultimate Flexibility with Clickshare

Working and collaborating in any office environment today should be meaningful, as workers today go to office for very specific reasons. When desig...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.