Math vs. Malware: How Cylance Uses Math to Defeat Malware


Download This asset is brought to you by:

The information submitted is collected by both UBM and our sponsor. Click here to view our sponsor's privacy policy.

Enterprise security personnel are defending a castle riddled with holes, secret passageways, and protected by ineffective barriers. These weak points are a consequence of poor quality security software, inferior hardware, and backdoors planted by malicious insiders. The end result is a begrudging acceptance that the attackers are winning the cybersecuirty war.

In order to keep up with modern attackers, security technologies need to evolve without relying on human intervention. That's where math and machine learning have the advantage. If we can objectively classify "good" files from "bad" based on mathematical risk factors, then we can teach a machine to make the appropriate decisions on these files in real time, allowing the "good" files to run, and the "bad" files to be quarantined BEFORE they can cause harm.

In this report, Cylance demonstrates that a math and machine learning approach to computer security will fundamentally change the way we understand, categorize and control execution of every file. We'll also discuss how our products leverage this approach and demonstrate just how different they are from every other security offering on the market.

0 Comment

Leave a Reply

Captcha image


  • 5300c769af79e

    Pixel and Pixel XL: First 10 Things to Do

    Once your Google Pixel or Pixel XL arrives on Friday and you finish watching our Pixel unboxing, you’ll want to familiarize yourself with your new phone by walking through the setup process and maybe even use Google’s new transfer tools to bring over info from your old phone.After that completes, well, we have 10 things you should consider doing right away.
  • 5300c769af79e

    Tumblr Now Supports Apple 'Live Photos' on the Web

    Apple's Live Photos, which turn still photos into GIF-like animations when touched, are now more easily accessible on the Web thanks to Tumblr.Whenever you see that famous Live Photo icon, click and hold to make them swing," Tumblr said in a blog post.
  • 5300c769af79e

    Google for iOS Goes Incognito

    As it does in Chrome, the feature allows users to surf without having searches and browser history collected.For added security, Unni Narayanan, director of Google product management, suggests enabling Touch ID so only your unique fingerprint (or those of anyone whose prints are saved on your phone) can unlock an existing incognito session.
  • 5300c769af79e

    SwiftKey Neural Keyboard Prediction Gets a Boost

    One day, your phone's keyboard will know and understand you so well it'll predict entire text messages in your tone of voice.But until then, SwiftKey Neural Keyboard promises more accurate and useful next-word predictions.