{"id":4689,"date":"2017-10-05T12:06:17","date_gmt":"2017-10-05T16:06:17","guid":{"rendered":"http:\/\/community.mis.temple.edu\/mis5211sec001fall17\/?p=4689"},"modified":"2017-10-05T12:06:17","modified_gmt":"2017-10-05T16:06:17","slug":"antivirus-is-dead-how-ai-and-machine-learning-will-drive-cybersecurity","status":"publish","type":"post","link":"https:\/\/community.mis.temple.edu\/mis5211sec001fall17\/2017\/10\/05\/antivirus-is-dead-how-ai-and-machine-learning-will-drive-cybersecurity\/","title":{"rendered":"Antivirus is dead: How AI and machine learning will drive cybersecurity"},"content":{"rendered":"<p>Traditional AV is still used widely everywhere, at home, in office. But there is a need for issues with new attack techniques, such as bots and other automated tools. making it nearly impossible for outdated solutions such as legacy antivirus (AV) to keep up.<\/p>\n<p>The article states that about 50% of file-based attacks are submitted to malware repositories. Of those submitted, only 20% had corresponding signatures from existing AV solutions\u2014in other words, typical endpoint\u00a0security solutions are flying blind 90% of the time.<\/p>\n<p>&nbsp;<\/p>\n<p>https:\/\/techbeacon.com\/antivirus-dead-how-ai-machine-learning-will-drive-cybersecurity<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Traditional AV is still used widely everywhere, at home, in office. But there is a need for issues with new attack techniques, such as bots and other automated tools. making it nearly impossible for outdated solutions such as legacy antivirus (AV) to keep up. The article states that about 50% of file-based attacks are submitted [&hellip;]<\/p>\n","protected":false},"author":14341,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[1],"tags":[],"class_list":{"0":"post-4689","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-uncategorized","7":"entry"},"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall17\/wp-json\/wp\/v2\/posts\/4689","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall17\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall17\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall17\/wp-json\/wp\/v2\/users\/14341"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall17\/wp-json\/wp\/v2\/comments?post=4689"}],"version-history":[{"count":1,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall17\/wp-json\/wp\/v2\/posts\/4689\/revisions"}],"predecessor-version":[{"id":4690,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall17\/wp-json\/wp\/v2\/posts\/4689\/revisions\/4690"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall17\/wp-json\/wp\/v2\/media?parent=4689"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall17\/wp-json\/wp\/v2\/categories?post=4689"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall17\/wp-json\/wp\/v2\/tags?post=4689"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}