Turning Zero-Day into D-Day for Cybersecurity Threats

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next Turning Zero-Day into D-Day for Cybersecurity Threats-5 Next

Deep Learning: Combating Zero-Day Threats

In deep learning, raw data on millions of malicious and legitimate files are utilized for training the technology to learn to differentiate between the file types on its own. As opposed to machine learning, this learning process is entirely independent and does not involve any human intervention or manual feature engineering. The result of the training process is the instant ability to predict (identify) first-seen malware with high accuracy compared to existing solutions on the market, even those that apply machine learning. The ability to detect zero-day threats in real time enables nearly instant prevention capability, blocking threats before they can cause harm.

"Zero-day" is a term used to describe the culprit behind many of the security breaches we hear about almost daily  in the news. But what exactly does it mean? Zero-day — the first or "zeroth" day — refers to the point in time a security hole in code is revealed to hackers or cybersecurity professionals (e.g., a developer, researcher, software programmer).

The term comes from the Warez scene (warez being slang for wares — an abbreviation for computer software) where computer underground circles distribute unauthorized releases of copyrighted work on the same day as (or even before) the original product is released.

While that is the basic definition, zero-day threat is commonly used to describe two cases:

  • Zero-Day Vulnerability: This refers to a security flaw in software, an application or operating system that has yet to be revealed to the software maker or antivirus vendors, though the vulnerability may be known to attackers. Because zero-day vulnerabilities have yet to be discovered, the vulnerability is not yet protected by a known signature or patch, leaving companies vulnerable to attacks.
  • Zero-Day Exploit: This refers to code that attackers use to trigger the zero-day vulnerability to execute their malicious action into the vulnerable software, application or operating system. Since this is done unbeknownst to the victim, it is a critical cybersecurity threat.

In this slideshow, Guy Caspi, CEO of Deep Instinct, takes a closer look at the explosion of zero-day threats and how deep learning can help organizations better protect their valuable cyber assets.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

Privacy rollback Security Pros Give Their Opinions on ISP Data Privacy Rollback

IT staff, organization leaders, and the average citizen have all expressed levels of concern over the FCC about-face in regard to ISP privacy. Here’s what the security experts say. ...  More >>

IT security skills 7 Top Skills for Security Pros

Executives at several top tech firms outline the skills they need now and in the near future, including IaaS and IoT security expertise. Other skills listed may surprise you. ...  More >>

IT security careers The Most In-Demand Security Jobs and How to Get Them

Security professionals are in demand right now, and entry-level security jobs generally fall into either an engineer or analyst role. Find out more about required skills and career paths. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.