{"id":26373,"date":"2016-11-30T20:30:00","date_gmt":"2016-11-30T20:30:00","guid":{"rendered":"http:\/\/cloudcomputing.sys-con.com\/node\/3939439"},"modified":"2016-11-30T20:30:00","modified_gmt":"2016-11-30T20:30:00","slug":"machine-learning-may-be-the-solution-to-enterprise-security-woes-cloudexpo-ml-cloud-security","status":"publish","type":"post","link":"https:\/\/icloud.pe\/blog\/machine-learning-may-be-the-solution-to-enterprise-security-woes-cloudexpo-ml-cloud-security\/","title":{"rendered":"Machine Learning May Be the Solution to Enterprise Security Woes | @CloudExpo #ML #Cloud #Security"},"content":{"rendered":"<p>For large enterprise organizations, it can be next-to-impossible to identify attacks and act to mitigate them in good time. That\u2019s one of the reasons executives often discover security breaches when an external researcher \u2014 or worse, a journalist \u2014 gets in touch to ask why hundreds of millions of logins for their company\u2019s services are freely available on hacker forums.<br \/>\nThe huge volume of incoming connections, the heterogeneity of services, and the desire to avoid false positives leave enterprise security teams in a difficult spot. Finding potential security breaches is like finding a tiny needle in a very large haystack \u2014 monitoring millions of connections over thousands of servers is not something that can be managed by a team of humans. <\/p>\n<p><a href=\"http:\/\/cloudcomputing.sys-con.com\/node\/3939439\" >read more<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>For large enterprise organizations, it can be next-to-impossible to identify attacks and act to mitigate them in good time. That&rsquo;s one of the reasons executives often discover security breaches when an external researcher &mdash; or worse, a journalist &mdash; gets in touch to ask why hundreds of millions of logins for their company&rsquo;s services are freely available on hacker forums.<br \/>\nThe huge volume of incoming connections, the heterogeneity of services, and the desire to avoid false positives leave enterprise security teams in a difficult spot. Finding potential security breaches is like finding a tiny needle in a very large haystack &mdash; monitoring millions of connections over thousands of servers is not something that can be managed by a team of humans. <\/p>\n<p><a href=\"http:\/\/cloudcomputing.sys-con.com\/node\/3939439\" target=\"_blank\">read more<\/a><\/p>\n","protected":false},"author":143,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-26373","post","type-post","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/26373","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/users\/143"}],"replies":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/comments?post=26373"}],"version-history":[{"count":3,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/26373\/revisions"}],"predecessor-version":[{"id":26817,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/26373\/revisions\/26817"}],"wp:attachment":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/media?parent=26373"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/categories?post=26373"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/tags?post=26373"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}