Government Technology Insider
  • About
  • State & Local
  • Civilian
  • Defense & IC
SUBSCRIBE
No Result
View All Result
  • Acquisition
  • AI & Data
  • Cybersecurity
  • CX
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • Technology Trends Shaping the Future of Government
    • World of Work
    • Your Digital Transformation Path Starts Here
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
Government Technology Insider
  • Acquisition
  • AI & Data
  • Cybersecurity
  • CX
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • Technology Trends Shaping the Future of Government
    • World of Work
    • Your Digital Transformation Path Starts Here
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
No Result
View All Result
Government Technology Insider
No Result
View All Result
Home Cybersecurity

Are AI and Machine Learning the Key to Improved Data Security for the Federal Government?

by Ryan Schradin
October 26, 2017
in Cybersecurity
Reading Time: 4 mins read
A A
The Low Code Download
Share on FacebookShare on Twitter

Although most people assume that retailers and financial services companies are at the largest risk of breach – and they certainly are some of the biggest targets for cyberattacks – the federal government is also in the crosshairs of both privately funded and nation-state backed malicious actors. In addition to those seeking to extract citizen data from the federal agencies that are privy to it, the military and intelligence communities are also under constant attack.

One of the key questions facing CISOs, CIOs, and information security managers in the federal government is if the cyber defenses they currently use are capable of defeating cyber threats, both today and in the future. While there’s always a case to be made for tried and trusted solutions, with the scale and sophistication of the threats being levied against the federal government, there’s a case for federal agencies to explore next generation solutions based on artificial intelligence (AI) and machine learning (ML)

 

To find out more about these next-gen tools we caught up with Finn Ramsland, Cylance’s Director of DoD and Special Programs at CSRA’s Emerging Tech Day. At the event he showcased how AI and ML are revolutionizing information security for federal agencies and what he shared is something our readers need to know more about.

Here is what Finn had to say:

Ryan Schradin (RS): Can you discuss the current state of the threat landscape facing federal agencies? Are the threats facing the government and military different than those facing private enterprise?

Finn Ramsland (FR): Many of the threat actors targeting the federal government share significant commonality with those targeting segments of the commercial sector.

Having said that, the US government has a significant set of high value systems and networks. This makes it a given that specialized or advanced adversaries will always endeavor to compromise and maintain a foot hold within these target sets. Unique threat actors and tools, techniques and procedures are common in these areas, within the government.

RS: How has the threat landscape facing government organizations evolved over the past few years?

FR: Much like the rest of the cyber security industry, the government has seen threats increase in sophistication and has seen the number of capable adversaries increase. We are also seeing much more prolific use of polymorphic malware and of the post-breach use of windows utilities like PowerShell and WMI.

RS: What network and technology trends are making the threat landscape and network defense more daunting and dangerous?

FR: The increasingly ubiquitous use of SSL encryption on networks is making defense more difficult for network based sensors. Additionally, rapidly increasing use of multi-part content delivery in browsers makes it much more difficult to re-assemble and analyze threats on the wire.

RS: What separates Cylance’s solutions from others on the market today?

FR: Cylance offers a new and much more advanced form of Anti-Malware technology. Put simply, Cylance emulates the way a human reverse engineer analyzes potential threats and implements that technique at machine speed and as an active defense and prevention component.

Unique value includes:

  • Significantly decreased cadence for detection/content updates (6+ months)
  • Minimal footprint (1-3% CPU)
  • DoD tested and proven efficacy rates exceeding 99%+
  • Works fully disconnected/air-gapped from the internet or even in headless operational modes

RS: How do AI and machine learning defeat malware?

FR: We apply our machine learning methods to static analysis of executables within Windows, Linux and Mac based operating environments. Essentially, Cylance is able to conduct a full bytecode analysis of every file we encounter, in a customer’s environment. Based on the structure and makeup of the executables, Cylance will take operational actions to protect the systems we are tasked with guarding.

 

Want to learn more about emerging threats? Download the latest Enterprise Strategy Group Survey to get a comprehensive view of top of mind threats and their impact on endpoint security.

 

 

Tags: AIArtificial IntelligenceCyber Defensecyber securitycybersecurityCylanceCylancePROTECTCylanceVESGFinn Ramslandinformation securityMachine LearningMLNetwork securitynext-gen security solutionsnext-gen security threats

RELATED POSTS

Automation Can Help Foster a Human-Centered Customer Experience
Connecting to the Customer

Automation Can Help Foster a Human-Centered Customer Experience

March 29, 2023
FedRAMP is the Foundation of Trusted and Secure Government
Acquisition

FedRAMP is the Foundation of Trusted and Secure Government

March 29, 2023
How Agencies Can Build a Cloud-Native Workforce
Civilian

How Agencies Can Build a Cloud-Native Workforce

March 28, 2023

TRENDING NOW

  • Advana

    Meet Advana: How the Department of Defense Solved its Data Interoperability Challenges

    9416 shares
    Share 3766 Tweet 2354
  • Exploring the New Department of Defense Zero Trust Strategy: A Podcast with Verizon and Zscaler

    82 shares
    Share 33 Tweet 21
  • FedRAMP is the Foundation of Trusted and Secure Government

    35 shares
    Share 14 Tweet 9
  • Why the Government Needs a Cloud-Native Workforce

    18 shares
    Share 7 Tweet 5

CONNECT WITH US

Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisment Banner Ad Advertisment Banner Ad Advertisment Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad

BECOME AN INSIDER

Get Government Technology Insider news and updates in your inbox.

Strategic Communications Group is a digital media company that helps business-to-business marketers drive customer demand through content marketing, content syndication, and lead identification.

Related Communities

Financial Technology Today
Future Healthcare Today
Modern Marketing Today
Retail Technology Insider
Today’s Modern Educator

Quick Links

  • Home
  • About
  • Contact Us

Become a Sponsor

Strategic Communications Group offers analytics, content marketing, and lead identification services. Interested?
Contact us!

© 2023 Strategic Communications Group, Inc.
Privacy Policy      |      Terms of Service

No Result
View All Result
  • Home
  • About Government Technology Insider
  • State & Local
  • Civilian
  • Defense & IC
  • Categories
    • Acquisition
    • AI & Data
    • Customer Experience
    • Cybersecurity
    • Digital Transformation
    • Hybrid Work
    • Public Safety
  • Contact Us