Cylance is Using Mathematics To Protecting Your Computer

Cylance has been able to apply mathematics to the decision-making of good or bad on a computer system. So they’re able to detect and prevent brand new attacks new zero-days advanced persistent threats any new viruses worms Trojans anything that affects an endpoint. They can actually detect it prevent it in real time and all through mathematics and the reason why you develop this is that traditional antivirus solutions just don’t really work anymore. That’s right you’ve been building a lot of technologies that have gone after, what we’ve seen in the past but the problem is, of course, if somebody changes something does something a little different of course your technologies, your techniques become blinded and that was just unacceptable to many of the bad guys have taken these techniques. Now just bypassed every single security layer that they’ve been building out there in the world.

Cylance is Using Mathematics To Protecting Your Computer

Cylance is Using Mathematics To Protecting Your Computer

So how do you predict that something’s bad? What does it mean to have better security through mathematics? Well just like we as human beings learn that certain things are good for us and bad for us. You can actually train machines, train computers to do the same exact thing you just have to get a large enough data to give it and feed it as well as a large enough features about what is either good or bad and it can learn and then make decisions on all on its own an idea is that a customer of yours a bank that once they’re running the software you can kind of let your employees do whatever your they want on their computers and it will protect them from themselves. Exactly if they like to click on a link that they’re not specifically exactly I, unfortunately, did not win the bet if I wanted a t-shirt for blackhat this year that said double-click it baby right it’s just a chat challenge people double click it I don’t care what you think it is double click it because we will be protected with our technology and that’s the exact idea so for your own personal security.

Also Read: Top 3 Best FREE Video Players In The World

I mean do you run this like how do you protect yourself from well you know people in the security space often become targets that’s right so and that’s my kind of my best story is that I’ve always been asked that in the industry ever since they first wrote hacking expose 1.0 back in 99 it’s always the question of what luck you must be pretty big get people on hack you so how do you prevent you know getting hacked what do you use and I initially always old so embarrassed like well I don’t use anything I just used my brain and like I just make the right choices do the right things but it does take a very large data set of experiences thatyou have to go through to figure out okay what is really okay healthy to use and run on your computer system versus not and malicious so it does take a long time so this is the first product in my entire career that I actually have running on my own box simply because that’s exactly what it does it actually learns like a human to determine what is good or bad and then blocks that which is bad so now I just say I just use my product it’s that powerful and you’re gonna show us a demo of how it works I am this goes back to a very very old-school but very simple technique for getting users to try and click on something that you want to click on and that’s by putting an icon on the file that makes it look like it’s a PDF file so if I were to send this to a user or my target and the user would look at the icon and see that’s an Adobe PDF well then it must be okay it must be a PDF fileso what I’m going to do is I’m going to open this up and it just takes a few seconds it’s gonna open up drop that executable protect our technology should detect it and protect it prevent it from executing but it’ll still allowthe data to be viewed so other solutions out there would blacklist the whole file so you’d never even actually be able to open the file itself and look at the data so here I go open up the file sure enough boom it blocks it right in the background as you can see and this file is totally blocked with with the data being in the background and of course I disclosed it because I we don’t need to see it anymore and there you have it completely blocked you.

Add a Comment

Your email address will not be published. Required fields are marked *