Monthly archives: April, 2017

Chuck Leaver – The Importance Of Edit Difference Second Part

Written By Jesse Sampson And Presented By Chuck Leaver CEO Ziften   In the very first about edit distance, we took a look at hunting for destructive executables with edit distance (i.e., how many character edits it requires to make two matching text strings). Now let’s take a look at how we can utilize edit

Chuck Leaver – An Infrastructure That Is Not Totally Secure Cannot Be Well Managed

Written by Chuck Leaver Ziften CEO   If your business computing environment is not effectively managed there is no possibility that it can be totally protected. And you cannot effectively manage those intricate business systems unless there’s a good sense that they are secure. Some might call this a chicken-and-egg scenario, where you do not

Chuck Leaver – Constant Endpoint Visibility Required Even For Offline Devices

Written By Roark Pollock And Presented By Chuck Leaver Ziften CEO   A study recently finished by Gallup discovered that 43% of US citizens that were employed worked remotely for a few of their employment time in 2016. Gallup, who has actually been surveying telecommuting patterns in the United States for practically a decade, continues

Chuck Leaver – There Will Be Security Consequences With Machine Learning

Written By Roark Pollock And Presented By Ziften CEO Chuck Leaver   If you study history you will observe numerous examples of severe unintended consequences when new technology has been presented. It typically surprises people that brand-new technologies may have dubious purposes in addition to the positive purposes for which they are launched on the