• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • COVID-19 Update
  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Downloads
  • Podcasts
  • Subscribe
  • Project of the Week
  • About Us
    SEARCH
Compliance

The New Weapon Against Cyber Threats – Machine Learning

Machine learning helps businesses and users keep sensitive data locked in, and cyber attackers out.

June 27, 2018 Jessica Messier 3 Comments

According to IT World Canada, machine learning is playing an important role in modern protection against cyberattacks. As a result, security companies are hopping on the bandwagon and developing and deploying machine learning solutions to keep sensitive data safe.

Machine learning is helping businesses keep one step ahead of cyberattackers, IT World Canada says. For example: Geoff McDonald, a cloud machine learning architect for Windows Defender, told IT World Canada that today’s spear-phishing incidents are created with different scripts within malicious code so that anti-malware won’t catch it.

This is where machine learning shines:  “However, these patterns are really good for machine learning models, because if you were to look at the code it would be highly suspicious,” McDonald said. “A machine learning model can look at it the way a human can and clearly identify that it is hiding malicious intent.”

IT World Canada also says that security vendors are incorporating plans and/or classes of “machine-learning algorithms into their solutions to focus on specific problem domains.” Machine learning solutions are also being used to develop “an optimal remediation response,” which will be created from lessons learned from past security breaches. Plus, these solutions will be able to be used to scan users, user roles, titles, and actual access, giving security administrators the chance to fine-tune hiccups as needed.

What decision makers should keep in mind:

While machine learning is becoming the go-to for protection against cyberattacks, relevant solutions aren’t fool proof yet. Avivah Litan, cybersecurity analyst for Gartner, said that machine learning is still in its infancy, and is “restricted to looking at suspicious files or network behavior;” this means it is not yet able to “scrutinize processes, such as what is running in memory.”

As a result, decision makers considering machine learning as a cybersecurity method should keep in mind that machine learning isn’t able to catch everything, is limited to only catching suspicious files, and might still throw off false positives. For example, “If a bad guy logs into a machine directly and starts writing routines in Powershell, machine learning isn’t going to see that,” Litan told IT World Canada.

Tagged With: Cyber Security, Machine Learning

Related Content:

  • building safety Many Workers Still Nervous About the Office: These…
  • COVID Test Vending Machines at university UC San Diego Adopts COVID Test Vending Machines
  • Bosch AI Skin Temperature Detection system AI Skin Temperature Detection Solution Introduced by Bosch
  • SolarWinds Hack affected Microsoft Source Code, The FBI warns that hackers are carrying out “swatting attacks” via compromised smart devices to make hoax calls to emergency services. SolarWinds Hackers Viewed Microsoft Source Code; Victim List…

Free downloadable guide you may like:

  • Top 9 Reasons Enterprise IT Leaders Are Moving Their Video Surveillance to the Eagle Eye Cloud

    Working in IT has enough challenges without adding in the complications of surveillance video. Things like total cost of maintenance, how the VMA manages bandwidth, what cameras are supported, what level of cybersecurity is provided, and what integrations are available to use are important factors IT managers have to think about when assessing a video […]

Reader Interactions

Trackbacks

  1. Human Touch or Artificial Intelligence—Which Handles More Tasks at the Factory? - My TechDecisions says:
    November 14, 2018 at 4:00 pm

    […] all of the buzz recently about machine learning, artificial intelligence, and robots, it would appear as if humans’ days are numbered on the […]

    Reply
  2. Sentryo Joins IBM Security App Exchange Community to Help Build a Unified Approach to IT and OT Cybersecurity - My TechDecisions says:
    February 21, 2019 at 4:00 pm

    […] cyber threats which make headlines every day are now targeting industrial networks and are impacting the real […]

    Reply
  3. eSentire Beefs Up its Managed Vulnerability Service by Adding Solutions from Tenable - My TechDecisions says:
    May 7, 2019 at 4:00 pm

    […] the IT landscape of your business continues to evolve, so does its vulnerability to cyber threats. A proactive approach is the best course of action to protect your data and assets, and companies […]

    Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Get the FREE Tech Decisions eNewsletter

Sign up Today!

Latest Downloads

9 Technology Products to Help Combat COVID-19 Spread in the Workplace

As the Coronavirus continues on and leads us further into uncertainty, the question remains, “when do we return to the office?” For some the answer...

Top 9 Reasons Enterprise IT Leaders Are Moving Their Video Surveillance to the Eagle Eye Cloud

Working in IT has enough challenges without adding in the complications of surveillance video. Things like total cost of maintenance, how the VMA m...

Using Live Chats and Chatbots to Increase Customer Engagement

There's a lot to consider when building out a chatbot experience to ensure that it delivers a seamless experience and meet your business goals.

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!
Sharp Microsoft Collaboration HQ Logo

Learn More About the
Windows Collaboration Display

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Subscribe to the Newsletter
  • Contact Us
  • Media Solutions & Advertising
  • Comment Guidelines
  • RSS Feeds
  • Terms of Use
  • Privacy Policy
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!

© 2021 Emerald X, LLC. All rights reserved.