Effective IoT Security Requires Machine Learning

From csoonline.com

sd post 3 image 0
Aruba

The legacy security model is based on the concept of a well-defined perimeter and the use of tools such as signatures, rules, and statistical analysis. While that model has provided significant value for a very long time, the limitations are highlighted by that fact that large-scale security breaches which are designed to evade traditional defenses have recently become commonplace.

One measure of the frequency and breadth of security breaches comes IBM, which predicts that by 2019 cybercrime will become a $2.1 trillion problem. One measure of the expanding effect security breaches have is the impact on a company’s profitability, competitiveness, brand, and stock price. In many instances, cybersecurity has become both a CEO and a Board-level issue.