Over the last couple of years, software and machines are taking up an increasingly large part of our lives. With the rise of Artificial Intelligence (AI) and Machine Learning (ML), new applications previously considered as science fiction are now possible, such as computerized diagnosticians, automated lawyers and autonomous vehicles. The cybersecurity field is going through a similar transition.
Roughly speaking, we could divide cybersecurity software evolution into two waves. The first wave was dominated by rule-based deterministic solutions. A classic example is the firewall. Firewalls apply simple policies, such as blocking inbound traffic, ports or protocols.
Register or login for access to this item and much more
All Information Management content is archived after seven days.
Community members receive:
- All recent and archived articles
- Conference offers and updates
- A full menu of enewsletter options
- Web seminars, white papers, ebooks
Already have an account? Log In
Don't have an account? Register for Free Unlimited Access