Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

Machine behaviours that threaten enterprise security

Kacy Zurkus | Jan. 27, 2017
What to do when machine learning on the inside turns against the perimeter

"We need to understand what is going into our facilities and what is going out," said Black. "They're also going to see encrypted traffic that is not encrypted by companies and countries, but if they don’t have the keys, they're going to block the payload."

Simplifying and consolidating with fewer layers will also be a necessary part of the clean up process, said Black. "I’m more confident now than I have been in a really long time for several reasons. The number of technologies you need to layer on are being rapidly consolidated. Simplification is going to be critical."

 

Previous Page  1  2  3 

Sign up for CIO Asia eNewsletters.