Here we are again. Man versus machine. On one corner, we have the machine capable of reading huge amounts of data in so little time, and on the other, an employee who knows nothing but to do his or her job to the best of their effort.

 

But against malware, who will fare better?

 

What is malware?

 

Malware has made it to the new vocabulary of “enemy files.” They’re not exactly viruses in that they have no specific signature. Instead, they have their own instruction, their own code that may or may not be intrusive at all, and sometimes (in fact, most of the time) they are not in the computer at all.

 

What is machine learning?

 

Machine learning is simple: If the computer sees it do something wrong once, it will learn that it is bad from then on. Say, for example, if I were a computer virus and I do something bad, even though the machine-learning antivirus doesn’t recognize me yet, as soon as I do something bad, the antivirus changes its stance against me , and voila! The antivirus has learned. Machine learning is magnificent, and in every way, effective.

 

Then again, only to a certain point.

 

What is Employee Vigilance?

 

Now here comes the other end of the ring: the employee. This is why companies hire tech personnel, sometimes even blue-hat hackers themselves to prove the antivirus wrong. You see, the antivirus can only see files, and ONLY files. What if the enemy is not in a file, but is instead in a code? An example of this is a simple batch file that downloads a malicious code, which in itself is also not very bad. However, the download mechanism creates a cascade, causing a denial of service in the CPU of the computer, causing it to crash.

 

There, that is where the tech team and the blue-hats come in.

 

Since antiviruses cannot discern wrong from right straight away, they only see the inner workings of the file. They only see the “signature” of the file, which, in the case of a virus, the “signature” of being a virus, may it be a Trojan, a worm, or spyware.

 

An employee sees far more than that. The employee and the blue-hat hacker sees the commands themselves, and from there, moves forward to a new set of instructions, ultimately preventing an attack. In our example given, this would mean saving the computer from a total denial of service.

 


RECOMMENDED ARTICLE FOR TECHWORLD


 
Fortinet Predicts Highly Destructive and Self-Learning “Swarm” Cyber Attacks in 2018
Techworld Date Posted: 13 December 2017 4:02 PM | 218 Views
Fortinet® (NASDAQ: FTNT), the global leader in high-performance cybersecurity solutions, today unveiled predictions from the Fortinet FortiGuard Labs global research team about the threat landscape for 2018. The trends reveal the methods and strategies.... See More
 
Fortinet Predicts Highly Destructive and Self-Learning “Swarm” Cyber Attacks in 2018
Techworld Date Posted: 4:02 PM | 218 Views
Fortinet® (NASDAQ: FTNT), the global leader in high-performance cybersecurity solutions, today unveiled predictions from the Fortinet FortiGuard Labs global research team about the threat landscape for 2018. The trends reveal the methods and strategies...See More

 
Transcend Wins Good Design Award 2018 in Japan
Techworld Date Posted: 16 October 2018 4:22 PM | 132 Views
Transcend Information, Inc. (Transcend®), a worldwide leader in storage and multimedia products, today announced that its JetDrive™ 855 SSD upgrade kit for Mac has won the "Good Design Award 2018" for its practical and.... See More
 
Transcend Wins Good Design Award 2018 in Japan
Techworld Date Posted: 4:22 PM | 132 Views
Transcend Information, Inc. (Transcend®), a worldwide leader in storage and multimedia products, today announced that its JetDrive™ 855 SSD upgrade kit for Mac has won the "Good Design Award 2018" for its practical and...See More

 
Four Skills CISOs Should Develop to Succeed in 2019
Techworld Date Posted: 15 March 2019 3:01 PM | 65 Views
As cyber-risks became a business issue, the role of the CISO in an organization has changed. The modern CISO is not just a head of department, responsible for implementation and management of security controls. See More
 
Four Skills CISOs Should Develop to Succeed in 2019
Techworld Date Posted: 3:01 PM | 65 Views
As cyber-risks became a business issue, the role of the CISO in an organization has changed. The modern CISO is not just a head of department, responsible for implementation and management of security controlsSee More

 
2018 Cyber Security Predictions
Techworld Date Posted: 16 December 2017 12:00 PM | 580 Views
This past year, cyber criminals caused major service disruptions around the world, using their increasing technical proficiency to break through cyber defenses. See More
 
2018 Cyber Security Predictions
Techworld Date Posted: 12:00 PM | 580 Views
This past year, cyber criminals caused major service disruptions around the world, using their increasing technical proficiency to break through cyber defensesSee More

 
Moto E4 Plus Empowers Gamers to Level Up
Techworld Date Posted: 3 October 2017 8:52 AM | 294 Views
Gaming, mobile or otherwise, continues to be a huge part of today's digital experience. Not just millennials but even Gen Xers as well are very much engaged in the digital gaming world, mostly through.... See More
 
Moto E4 Plus Empowers Gamers to Level Up
Techworld Date Posted: 8:52 AM | 294 Views
Gaming, mobile or otherwise, continues to be a huge part of today's digital experience. Not just millennials but even Gen Xers as well are very much engaged in the digital gaming world, mostly through...See More

 
Smart Offers Groundbreaking OPPO Find X at Php2,799 per Month with Exclusive Freebies
Techworld Date Posted: 21 September 2018 9:26 AM | 158 Views
Getting hold of the world's first panoramic designed phone is easier than ever with Smart, which offers the groundbreaking OPPO Find X under the data-packed GigaX Plans for Php2,799 per month.. See More
 
Smart Offers Groundbreaking OPPO Find X at Php2,799 per Month with Exclusive Freebies
Techworld Date Posted: 9:26 AM | 158 Views
Getting hold of the world's first panoramic designed phone is easier than ever with Smart, which offers the groundbreaking OPPO Find X under the data-packed GigaX Plans for Php2,799 per month.See More

 
A Safer Future Awaits at WOCEE and WOSAS 2018
Techworld Date Posted: 5 December 2018 5:30 PM | 102 Views
Following the success of its debut presentation, the groundbreaking World of Safety and Security Exposition (WOSAS) and World of Consumer Electronics Exposition (WOCEE) return with a bigger and bolder installment for its 2nd edition.. See More
 
A Safer Future Awaits at WOCEE and WOSAS 2018
Techworld Date Posted: 5:30 PM | 102 Views
Following the success of its debut presentation, the groundbreaking World of Safety and Security Exposition (WOSAS) and World of Consumer Electronics Exposition (WOCEE) return with a bigger and bolder installment for its 2nd edition.See More

 
APAC IT Leaders Should Cultivate Situational Awareness to Thwart Cyber Threats
Techworld Date Posted: 26 July 2017 2:56 PM | 235 Views
Fortinet, a global leader in high-performance cyber security solutions, today advised IT leaders in Asia Pacific to hone their situational awareness skills in order to better defend their organizations against cyber threats. Human beings are.... See More
 
APAC IT Leaders Should Cultivate Situational Awareness to Thwart Cyber Threats
Techworld Date Posted: 2:56 PM | 235 Views
Fortinet, a global leader in high-performance cyber security solutions, today advised IT leaders in Asia Pacific to hone their situational awareness skills in order to better defend their organizations against cyber threats. Human beings are...See More

 
Notes on Intel®’s Tick-Tock Model
Techworld Date Posted: 30 March 2017 10:59 AM | 326 Views
Though Intel has scrapped the previous “Tick-Tock” CPU production model, it is still good to note how well it has gone through the years.. See More
 
Notes on Intel®’s Tick-Tock Model
Techworld Date Posted: 10:59 AM | 326 Views
Though Intel has scrapped the previous “Tick-Tock” CPU production model, it is still good to note how well it has gone through the years.See More

 
Redefining the Food-And-Drink Business, One Print at a Time
Techworld Date Posted: 1 March 2019 4:36 PM | 72 Views
  Making siopao buns for her family and friends is a regular affair for Nelly Co. One day in a typical gathering at home in 1994, as she watches the familiar faces smile, laugh,.... See More
 
Redefining the Food-And-Drink Business, One Print at a Time
Techworld Date Posted: 4:36 PM | 72 Views
  Making siopao buns for her family and friends is a regular affair for Nelly Co. One day in a typical gathering at home in 1994, as she watches the familiar faces smile, laugh,...See More


Power by

Download Free AZ | Free Wordpress Themes