Artificial Intelligence & Machine Learning , Next-Generation Technologies & Secure Development

How to Block Advanced Threats

Focus on 'Total Cost of Control,' Says BlackBerry Cylance's John McClurg
John McClurg, vice president of security and trust, BlackBerry Cylance

After years of organizations being stuck in a reactive security posture, proactive prevention is finally possible thanks to machine learning backed by artificial intelligence math models, says John McClurg of BlackBerry Cylance.

See Also: Expel: Firms Still Threatened by Old Vulnerabilities

In a video interview at the recent Infosecurity Europe conference, McClurg discusses:

  • Gaining defense in depth while avoiding "expense in depth";
  • The increasing juxtaposition of physical security and cybersecurity, especially driven by IoT;
  • The promise of artificial intelligence math models and machine learning applications;
  • The latest on BlackBerry's acquisition of Cylance.

McClurg is vice president of security and trust at BlackBerry Cylance. He previously served as the CSO of Dell. Before that, McClurg served at Honeywell International; Lucent Technologies/Bell Laboratories; and at the FBI, where he held an assignment with the U.S. Department of Energy as a branch chief in charge of establishing a cyber counterintelligence program within the DOE’s newly created Office of Counterintelligence.


About the Author

Mathew J. Schwartz

Mathew J. Schwartz

Executive Editor, DataBreachToday & Europe, ISMG

Schwartz is an award-winning journalist with two decades of experience in magazines, newspapers and electronic media. He has covered the information security and privacy sector throughout his career. Before joining Information Security Media Group in 2014, where he now serves as the executive editor, DataBreachToday and for European news coverage, Schwartz was the information security beat reporter for InformationWeek and a frequent contributor to DarkReading, among other publications. He lives in Scotland.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.eu, you agree to our use of cookies.