Home Security Threat intelligence and AI work better together
McAfee senior vice-president and CTO Steve Grobman McAfee senior vice-president and CTO Steve Grobman

Humans and AI working in tandem can do better at spotting threats than either can alone, according to a McAfee executive.

McAfee has been investing in AI as a way of augmenting its threat intelligence activities, said senior vice-president and chief technology officer Steve Grobman, and has found that combining human analysts and AI amplifies their effectiveness.

Traditional threat intelligence gives very few false positives (good code misidentified as malware) but there are some false negatives (undetected malware). AI working alone gives fewer false negatives (less malware is missed) at the cost of a higher rate of false positives.

Combining the two approaches results in close to 100% malware detection with minimal false positives, he said.

McAfee has one billion sensors in the field, about half of them consumer PCs running the company's software. The advantage of the latter group is that they largely operate in the "wild west" of the Internet because nobody is telling their users to steer clear of known bad places.

These sensors generate 116 million telemetry events every five minutes. But "data by itself is not actionable", said Grobman. "What you really need is insight."

The company's global view of threat activity means it can provide insights that can help customers focus on the things that need particular attention at that time, such an ensuring that specific patches have been applied, or checking for certain types of misconfiguration.

It could also identify active campaigns targeting particular geographies or industry sectors so that affected customers could be alerted, he said.

The writer attended McAfee's Mpower Cyberecurity Summit as a guest of the company.

FREE SEMINAR

Site24x7 Seminars

Deliver Better User Experience in Today's Era of Digital Transformation

Some IT problems are better solved from the cloud

Join us as we discuss how DevOps in combination with AIOps can assure a seamless user experience, and assist you in monitoring all your individual IT components—including your websites, services, network infrastructure, and private or public clouds—from a single, cloud-based dashboard.

Sydney 7th May 2019

Melbourne 09 May 2019

Don’t miss out! Register Today!

REGISTER HERE!

LEARN HOW TO REDUCE YOUR RISK OF A CYBER ATTACK

Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has the high potential to be exposed to risk.

It only takes one awry email to expose an accounts’ payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 Steps to Improve your Business Cyber Security’ you’ll learn some simple steps you should be taking to prevent devastating and malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you’ll learn:

· How does business security get breached?
· What can it cost to get it wrong?
· 6 actionable tips

DOWNLOAD NOW!

Stephen Withers

joomla visitors

Stephen Withers is one of Australia¹s most experienced IT journalists, having begun his career in the days of 8-bit 'microcomputers'. He covers the gamut from gadgets to enterprise systems. In previous lives he has been an academic, a systems programmer, an IT support manager, and an online services manager. Stephen holds an honours degree in Management Sciences and a PhD in Industrial and Business Studies.

 

Popular News

 

Telecommunications

 

Guest Opinion

 

Sponsored News

 

 

 

 

Connect