Latest news with #VerizonDataBreachInvestigationsReport


Techday NZ
03-07-2025
- Business
- Techday NZ
Ransomware threats surge as phishing grows, damages may hit $275 billion
KnowBe4 has highlighted the growing threat posed by ransomware, particularly through social engineering tactics, urging organisations to strengthen their human defences during Ransomware Awareness Month. Recent research from KnowBe4 indicates a 57.7% increase in ransomware payloads delivered through phishing attacks between 1 November 2024 and 15 February 2025 when compared to the previous three months. This finding emphasises the significance of phishing as a primary method for ransomware to gain initial access to organisational systems. The impact of ransomware on organisations remains severe, with global damages forecasted to reach USD $275 billion annually by 2031. Data from the 2025 Verizon Data Breach Investigations Report further reveals that ransomware was involved in 44% of all analysed breaches, a marked rise from 31% in the prior year. Social engineering, and phishing specifically, has been increasingly exploited by cybercriminals to distribute ransomware. KnowBe4 notes that as these attack methods evolve, organisations must focus on mitigating the human risk inherent to their operations. Five steps to reduce risk To support efforts to minimise ransomware exposure, KnowBe4 has outlined five strategies for organisations to bolster their human layer of defence: First, organisations are encouraged to tailor cybersecurity training by role. Providing timely, role-specific and personalised training helps address the unique threats and responsibilities of different departments, which can lead to a reduction in employee behaviours often targeted by ransomware attackers. Second, running realistic phishing simulations is recommended. Regular simulations model current threat tactics, which can assist in building employees' critical thinking skills and foster instinctive resistance to phishing-based ransomware attacks. Third, promoting a no-blame reporting culture is suggested. Encouraging employees to immediately report any suspicious emails or activities, regardless of whether they have made an error, enables more effective and quicker ransomware response and containment. Fourth, maintaining a focus on ransomware awareness is essential. Organisations should run continuous awareness campaigns, utilising ongoing reminders, visuals, and regular communication, so that ransomware threats remain prominent and vigilance across the workforce is reinforced. Finally, deploying advanced anti-phishing technology can complement human defences. Solutions powered by artificial intelligence and machine learning are increasingly able to identify and neutralise sophisticated phishing attacks, including those carrying zero-day ransomware payloads, often before they reach employee inboxes. Social engineering and workforce vigilance As ransomware attacks rise in prevalence and sophistication, KnowBe4 is calling attention to the important role social engineering plays in making organisations susceptible to compromise. "Ransomware remains one of the largest cyber threats an organization can face–and it all starts with social engineering," said Roger Grimes, Data-Driven Defence Evangelist at KnowBe4. "As reports continue to highlight the varied forms of phishing as the most prevalent access vector for ransomware-related attacks, organizations must prioritize reducing human risk first and foremost. This Ransomware Awareness Month, it is crucial for every organization to understand their strongest defense against ransomware is actually their workforce." The escalation in both the volume and the impact of ransomware cases through 2025 points to the critical need for organisations to address human factors in their cybersecurity strategies. The combination of tailored training, realistic testing, supportive internal cultures, ongoing awareness campaigns, and advanced technical defences forms a comprehensive approach against social engineering-led ransomware attacks.


Techday NZ
26-06-2025
- Business
- Techday NZ
Most firms unprepared for rising supply chain cyber threats
A new report has found that 88% of cybersecurity leaders are concerned about supply chain cyber risks, with most organisations using supply chain risk management approaches that are not keeping pace with the threat landscape. The 2025 Supply Chain Cybersecurity Trends Survey, published by SecurityScorecard, draws on responses from nearly 550 CISOs and security professionals worldwide. The report highlights a significant increase in breaches involving third parties and a concentration of risk across technology and infrastructure providers. Increasing third-party risks According to the survey, third-party involvement in security breaches has doubled, with incidents rising from 15% to nearly 30%, as also detailed in the 2025 Verizon Data Breach Investigations Report. The reliance on a small group of external providers has resulted in what the report describes as an "extreme concentration of risk," with the potential for a single provider's compromise to affect thousands of organisations at once. Ryan Sherstobitoff, Field Chief Threat Intelligence Officer at SecurityScorecard, addressed the evolving nature of these risks by stating: Supply chain cyberattacks are no longer isolated incidents; they're a daily reality. Yet breaches persist because third-party risk management remains largely passive, focused on assessments and compliance checklists rather than action. This outdated approach fails to operationalize the insights it gathers. What's needed is a shift to active defense: supply chain incident response capabilities that close the gap between third-party risk teams and security operations centers, turning continuous monitoring and threat intelligence into real-time action. Static checks won't stop dynamic threats—only integrated detection and response will. Survey findings The report details several key statistics. More than 70% of organisations reported experiencing at least one material third-party cybersecurity incident in the past year, while 5% said they had suffered ten or more such incidents. Coverage of nth-party risk remains low, with fewer than half of organisations monitoring cybersecurity across even half of their supply chain tiers. A substantial 79% reported that less than half of their nth-party supply chain is covered by cybersecurity programmes. Only 26% of organisations include incident response in their supply chain cybersecurity frameworks, with most relying on periodic vendor assessments or cyber insurance instead. Respondents cited difficulty managing large volumes of data and prioritising issues as a major challenge, with 40% identifying this as their leading concern. Recommendations for supply chain security The findings led to several recommendations for organisations seeking to strengthen supply chain cyber risk management. SecurityScorecard advises integrating threat intelligence throughout the vendor ecosystem, allowing for real-time identification and assessment of risks such as ransomware and zero-day threats. The report also suggests the establishment of a dedicated supply chain incident response workflow. This would include clear role definitions and communication pathways, with regular testing and refinement of processes as part of a broader incident response strategy. Additionally, implementing vendor tiering is advised, prioritising high-risk dependencies and identifying single points of failure to enable more targeted mitigation. The report emphasises the need for a shared approach across business functions. Apportioning responsibility for supply chain cybersecurity beyond the remit of IT teams alone, organisations are encouraged to embed security considerations into procurement, legal, operations, and leadership decision-making. Research methodology The findings are derived from survey responses by 546 IT Directors and above, hailing from a range of industries and representing businesses with annual revenue from under $200 million to more than $5 billion. The research focused on quantitative analysis, with qualitative insights also provided by participants. SecurityScorecard's report underlines that attackers seek to exploit any single vulnerability within increasingly interconnected supply chains, while defenders must strive to secure all connections within often complex vendor networks. The report concludes that a transition to integrated, proactive supply chain monitoring and response is necessary to address persistent gaps between risk assessments and operational security outcomes.


Express Tribune
01-06-2025
- Express Tribune
Cracks in Pakistan's digital armour
A shocking global data breach has compromised the Internet user credentials for over 180 million Pakistanis, according to a recent advisory from the National Cyber Emergency Response Team of Pakistan (PKCERT), exposing serious vulnerabilities and systemic gaps within the country's cybersecurity, law enforcement and legal frameworks. The exposed data includes usernames, passwords, emails, and URLs linked to widely used online services, noted the advisory issued Monday. The services affected range from global tech giants like Google, Apple, Microsoft, Facebook, Instagram and Snapchat, to critical platforms including government portals, banks, educational institutions and healthcare providers. The breach originated from info-stealer malware, a type of malicious software that silently extracts sensitive information from infected devices and transmits it back to cybercriminals. Alarmingly, the stolen data was left completely unencrypted and openly accessible online, providing a goldmine for hackers. This exposure immediately places millions of Pakistani Internet users at risk of identity theft, financial fraud, account takeovers and targeted phishing attacks. It highlights users' widespread habit of password reuse — with just one compromised password, attackers can potentially access multiple accounts across different platforms. The fallout is already fueling a surge in 'credential stuffing' attacks, an automated technique in which hackers test stolen username-password combinations across various websites to hijack accounts. As this data circulates freely online, the scale and speed of such attacks are expected to rise, compounding the threat to Pakistan's digital ecosystem. Data breaches are occurring with increasing frequency and severity around the world. The 2023 Verizon Data Breach Investigations Report found that over 80 per cent of breaches involved compromised credentials, one of the most common and effective cyberattack vectors. While this is a global trend, Pakistan faces additional challenges due to its limited cybersecurity infrastructure and low levels of public awareness. As highlighted in Trends in Cyber Breaches Globally, the country mirrors international patterns in terms of threats but lacks the institutional resilience and public preparedness necessary to respond effectively. This latest breach pulls back the curtain on the recurring and alarming vulnerabilities within Pakistan's digital ecosystem. Between 2019 and 2023, over 2.7 million citizens' records from the National Database and Registration Authority (NADRA) were compromised. When a Joint Investigation Team uncovered the NADRA leak, they found personal information of citizens gathered from Karachi, Multan and Peshawar, underscoring how key parts of the country remain highly susceptible to cyber threats. Such incidents not only compromise individual privacy but also erode public confidence in digital governance, making the need for strong security measures even more urgent. In the wake of the breach, Pakistan's digital security has come under intense international scrutiny. Global partners and investors are questioning the country's capacity to safeguard sensitive data in the face of repeated large-scale leaks. Cybersecurity risks are a key part of international due diligence, and a poor track record significantly diminishes Pakistan's appeal to foreign direct investment (FDI). Digital insecurity doesn't just deter investment, it also jeopardises international partnerships, technology transfers and broader participation in the global digital economy. The reputational damage from such incidents is not easily reversed, and demands wide-ranging reforms and demonstrable improvements. PKCERT has advised the public to immediately change their passwords, ensuring they are strong and unique for each online account. It also recommends enabling multi-factor authentication (MFA) wherever possible. MFA adds an extra layer of security by requiring an additional form of verification — such as a one-time password (OTP), biometric scan or hardware token — alongside the standard password, all but eliminating the risk of unauthorised access, even if a user's password is compromised. That said, cybersecurity responsibility should not fall solely on individuals. The recent breach of a local news channel's databases illustrates a more serious systemic problem: the profound disconnect between rapid advances in technology and the ability of Pakistan's law enforcement, judiciary and legal practitioners to keep up. Investigating cybercrime to an acceptable degree requires a unique blend of technical, legal and forensic skillsets. Digital forensics, malware analysis and cyberthreat intelligence are areas where Pakistan's investigation officers are often inadequately trained and resource-deficient. Unlike traditional crimes that cross geography and national boundaries slowly, cybercrimes can propagate instantly. Tracing the electronic trail they leave behind requires specialists with the right skills and technology. Lack of it leads to poor evidence gathering, resulting in weak prosecution. Lawyers and judicial officers face challenges too. Judges hearing cybercrime cases need to understand complex technical evidence and means used to obtain it. Prosecutors and defence lawyers must, likewise, be familiar with the technicalities of digital evidence, which requires constant multidisciplinary study. Often the divide between technological complexity and legal capacity means justice is delayed or denied, a vulnerability cybercriminals exploit with impunity. The Prevention of Electronic Crimes Act (PECA) 2016 more or less covers cyber offences like unauthorised access, data breaches, electronic fraud and forgery, and cyberterrorism. It also provides outlines the framework for digital evidence and the investigation procedure. However, implementation remains challenging. Law enforcement is still developing awareness and capacity to address crimes under PECA, even as they must stay updated on rapidly evolving threats. Meanwhile, dedicated cybercrime courts and specialised prosecution units remain in early stages of development. Cyber law is rapidly evolving worldwide to address issues related to data privacy, protection, and cross-jurisdictional enforcement. A leading example is the European Union's General Data Protection Regulation, which has set a global benchmark with its stringent requirements on data handling and breach notifications. Pakistan's lawmakers and regulators can learn from such models to develop strong data protection frameworks that mandate encryption of sensitive information and require prompt disclosure of data breaches. Academic institutions and educational programmes have a vital role to play as bridges between technology developers, legal experts and law enforcement agencies. Pakistani universities are increasingly offering degrees and diplomas in cyber-related fields, equipping professionals to tackle cyber threat from multiple perspectives. By integrating computer science, criminology and legal studies, scholars and educators are crafting interdisciplinary curricula that prepare a new generation of experts fluent in both technological systems and regulatory frameworks. While demand for skilled cyber law professionals continues to grow, the current supply remains insufficient. To bridge this gap, universities and research institutions must expand their role by prioritizing applied research, interdisciplinary training, and partnerships with law enforcement. These collaborations should focus on hands-on training programmes, internships, and joint research initiatives tailored to Pakistan's specific cybercrime landscape. International journals such as the Journal of Cybersecurity and Digital Forensics, along with policy guidance from the International Telecommunication Union (ITU), consistently stress the importance of integrated approaches. Such collaboration fosters synergy that enhances the consistency of cybercrime investigations, ensures the admissibility of forensic evidence in court, and contributes to the development of technologically informed, practically enforceable legal frameworks. Moreover, cyber literacy efforts must extend beyond universities to schools, workplaces, and public awareness campaigns. A significant portion of Pakistani society remains vulnerable due to limited basic knowledge of cybersecurity. This gap is frequently exploited through social engineering tactics, phishing attacks, and misinformation campaigns. Cultivating a national culture of cybersecurity is essential for building digital resilience and safeguarding the broader digital ecosystem. From a law enforcement perspective, Pakistan must invest in specialised cybercrime units equipped with advanced forensic tools, malware analysis software, blockchain investigation capabilities, and AI-driven threat detection systems. Continuous training programmes are essential to keep pace with evolving cyber threats and digital investigative techniques. Collaboration with international cybercrime task forces can facilitate knowledge exchange and improve operational effectiveness. Equally important is capacity building within the judiciary to ensure the fair interpretation of often complex digital evidence. Establishing dedicated cyber courts with judges trained in cyber law and digital forensics would streamline case management and potentially improve conviction rates. To support these efforts, stronger public-private partnerships are vital for reinforcing Pakistan's cyber defence ecosystem. Private companies and critical infrastructure providers are frequent targets of cyber incidents. Therefore, government-led initiatives should promote information sharing, conduct joint cybersecurity drills, and coordinate responses to cyberattacks. Such collaboration is key to building a resilient and secure digital environment. International cooperation is another critical pillar of effective cyber governance. Cybercriminals often operate from foreign jurisdictions, making cross-border collaboration essential. Pakistan's active engagement in global frameworks — such as the Budapest Convention on Cybercrime — and the formation of bilateral cyber law enforcement agreements will enhance its ability to track, apprehend, and prosecute offenders across borders. Technological safeguards must also be standardised and legally mandated. Core security practices — such as robust encryption, mandatory multi-factor authentication, continuous vulnerability assessments, and a secure software development lifecycle — should be non-negotiable. Data protection must be a legal obligation, especially for organizations in finance, healthcare, and government sectors. These entities must be held accountable for safeguarding user data and reporting breaches swiftly and transparently. Emerging technologies bring both unprecedented threats and powerful opportunities. Cybercriminals are increasingly weaponising artificial intelligence to execute highly targeted attacks, perpetrate social engineering scams, and create convincing deepfakes for misinformation campaigns. At the same time, AI-driven cybersecurity tools can proactively detect anomalies in network traffic, identify zero-day vulnerabilities, and autonomously respond to threats. To stay ahead of such risks, Pakistan's cybersecurity strategy must prioritise investment in AI and machine learning. These technologies can also enhance data security and privacy through innovations such as blockchain and decentralised identity management, reducing dependence on traditional passwords and mitigating the risk of credential leaks. The recent breach affecting 180 million Pakistani users is a stark reminder of the urgency for comprehensive reform. Cybersecurity is not merely a technical issue — it is a societal challenge requiring multidisciplinary solutions, coordinated public policy, legal reform, and active public participation. Bridging the divides between technology, law enforcement, the judiciary, and academia is essential to building a resilient and secure digital future. By constructing such an integrated ecosystem, Pakistan can protect citizen privacy, strengthen national security, foster digital economic growth, and uphold justice in the digital era. This future is within reach — but it demands vision, commitment, and sustained collaboration. The massive data leak is not just a crisis; it is a clarion call. Ignoring it would be perilous. Rising to meet it could position Pakistan as a regional leader in cyber resilience. Ayaz Hussain Abbasi is a researcher and PhD scholar in the field cyber security and cybercrime All facts and information are the sole responsibility of the writer


Time Business News
27-05-2025
- Business
- Time Business News
Layer 2 Computers Strengthens Cybersecurity Solutions for Local Homes and Businesses
As cyber threats grow more sophisticated each year, reliable and affordable cybersecurity has become a necessity—not a luxury. With data breaches, phishing scams, ransomware, and online fraud on the rise, individuals and businesses in Centerville and the surrounding areas are searching for ways to protect their digital lives. That's where Layer 2 Computers comes in. Known for delivering high-quality IT support with a personal touch, Layer 2 Computers has expanded its focus on cybersecurity services, offering proactive solutions that defend clients against modern threats. With the company's commitment to clear communication, fast response times, and long-term protection, local customers are now turning to Layer 2 not just for tech support—but as a trusted digital security partner. Gone are the days when antivirus software alone was enough to keep your system safe. Today, cybercriminals use complex tactics such as: Social engineering and phishing scams Ransomware attacks Keyloggers and spyware Credential stuffing Fake software updates and rogue browser extensions Whether it's a small business with valuable customer data or a home computer filled with personal information, every device connected to the internet is a potential target. Layer 2 Computers takes a proactive approach to cybersecurity—focusing on prevention, detection, and rapid response. Instead of waiting for problems to appear, the company offers layered protection that includes real-time monitoring, threat analysis, software patching, and education for safer digital behavior. Layer 2 Computers provides a wide range of cybersecurity services tailored to the needs of both residential and commercial clients. These services include: Firewall configuration and management Real-time antivirus and anti-malware solutions Email filtering to prevent spam and phishing attempts Secure remote access solutions for businesses and remote workers Operating system and software update management Data backup and disaster recovery planning Network security assessments and vulnerability testing These solutions help minimize downtime, protect sensitive information, and prevent a cyberattack's financial and emotional toll. Layer 2 works closely with clients to assess risk, identify weak spots, and build personalized cybersecurity strategies—without unnecessary services or inflated costs. Small businesses are particularly vulnerable to cyber threats. According to the Verizon Data Breach Investigations Report, over 40% of cyberattacks target small businesses, and many don't recover from the financial loss. Layer 2 Computers understands small businesses' unique challenges and offers affordable, scalable protection that grows with the company. Whether securing a point-of-sale system, protecting client records, or creating a reliable backup strategy, Layer 2 helps businesses stay operational and compliant with evolving industry standards. Small business owners trust Layer 2 to secure their digital assets and keep their operations running smoothly, from local retail shops to law offices and contractors. Technology is only as secure as the person using it. That's why Layer 2 Computers focuses not only on protecting devices—but also on educating users. Clients learn to recognize phishing emails, avoid risky websites, and create strong, unique passwords. The company regularly provides tips and insights on staying safe online, helping customers take an active role in their protection. This human-first approach builds trust and equips clients with the knowledge they need to navigate today's digital landscape more confidently. Sometimes, the first sign of a cybersecurity issue is a sluggish or misbehaving computer. Viruses, spyware, and bloatware can quietly degrade performance or open backdoors for cybercriminals to exploit. Layer 2 Computers offers diagnostics and clean-up services that improve performance and identify and remove hidden security threats. These services are part of their broader PC Repair offerings, which include virus removal, hardware upgrades, and operating system optimization. By starting with a clean, secure foundation, users can feel confident that their systems are protected and running at their best. As a locally owned business, Layer 2 Computers provides Centerville and nearby communities with practical, accessible, and easy-to-understand cybersecurity services. Unlike national chains or remote tech support, clients get fast, personal service from a genuinely caring team. Whether answering a quick question, scheduling a home visit, or implementing enterprise-grade security for a growing business, the Layer 2 team is known for its friendly attitude and dedication to helping people feel secure. Visit Layer 2 Computers—Tech Support, Computer Repairs, and IT Services to explore cybersecurity services, request support, or connect with a technician. In an era when nearly everything is online—from banking and health records to work documents and personal memories—cybersecurity is essential. The stakes are high, but the proper support can make all the difference. Layer 2 Computers is committed to helping its clients stay one step ahead of cyber threats with innovative, reliable, and local protection. Whether securing a home network, preparing for remote work, or upgrading your company's defenses, Layer 2 offers the tools and experience to keep your digital life safe. Don't wait until something goes wrong. Take the first step toward stronger security and peace of mind by contacting Layer 2 Computers today. TIME BUSINESS NEWS


Forbes
29-04-2025
- Business
- Forbes
How Machine Learning Is Helping Prevent Data Breaches In Web Apps
Melkon Hovhannisyan is a tech entrepreneur and the CTO and cofounder of Direlli, providing outsourcing and outstaffing services. As web applications become more sophisticated to meet our daily needs, such as shopping and communication, they also become more vulnerable to data breaches. In 2024, web applications were the target of nearly 50% of all data breaches, according to the Verizon Data Breach Investigations Report (DBIR). Cybercriminals see our increasing reliance on web applications as an opportunity to steal sensitive data for financial gain and other selfish motives. Web application owners must invest in and integrate advanced technologies like machine learning into their security systems. The use of machine learning in security started gaining popularity in the 2010s, thanks to advancements in cloud computing and big data. Today, machine learning is integrated into several security tools, including popular ones like Splunk and Microsoft Sentinel. Let's discuss how machine learning is advancing web app security. Machine learning-capable security systems use algorithms that learn from data to detect and respond to security threats instead of relying solely on predefined rules like traditional security solutions. Here are some of the key advantages of ML-driven security systems: • Proactive Threat Detection: This allows security systems to identify emerging threats before they cause harm. • Faster Response Time: ML-capable security systems automate incident detection and response, reducing reaction time and the impact of any potential damage. • Reduced False Positives: ML-capable systems learn to differentiate between normal and suspicious activities, which reduces false positives. • Scalability: Security systems that use machine learning can analyze vast amounts of security data in real time, making them ideal for modern web applications. • Adaptability: ML-capable systems continuously learn and evolve to recognize new attack patterns, making it harder for attackers to trick them. Modern security systems use ML algorithms to analyze user and system behavior to detect deviations from normal patterns. Changes in the behavior of the systems or users may indicate potential security threats such as unauthorized access, data exfiltration or DDoS attacks. Some common examples of behavior changes that these algorithms look out for include: • Unusual login patterns, such as logging in from a new location • Repeated incorrect password attempts • Sudden increase in data transfers • A user accessing sensitive files they don't usually open • Running unusual command-line scripts • A sudden surge in outbound traffic • Abnormal interactions with APIs Security systems that use machine learning can also identify and classify malware, including new and previously unseen versions of the malware. To detect previously unseen malware, ML models analyze system behaviors to detect unusual occurrences such as high CPU usage, unexpected network traffic, frequent crashes and more. In addition to detecting previously unseen malware, ML systems analyze malware behavior, code and execution to classify threats and suggest responses. Phishing is typically the initial step in an attempt to breach data. Machine learning enhances the detection rates for phishing by analyzing email patterns, URLs and sender behavior to identify phishing attempts. ML-powered tools like Microsoft Defender for Office 365 are used to analyze email patterns, attachments and URLs to prevent phishing attacks. One of the ways web app admins can minimize the damage of a data breach in case it happens is by responding as quickly as possible. Security orchestration, automation and response (SOAR) platforms use machine learning for faster and more efficient threat mitigation. Modern SOAR platforms like Splunk Phantom use machine learning to: • Isolate infected devices or block malicious IP addresses. • Reduce response times by prioritizing critical threats. • Lower false positives. The effectiveness of ML models largely depends on the size and quality of the data set used to train them. Poor-quality or biased data can lead to inaccurate threat detection, making security systems unreliable. Popular security platform vendors such as Microsoft and Splunk generally have an advantage in this area because their tools have access to more data. While ML automates many security processes, human oversight is still necessary. Over-reliance on automation can lead to overlooked security risks or incorrect responses to some threats that might go unseen or be misinterpreted by ML systems that are always learning. Machine learning-powered security systems should be used as a tool, not as a replacement for security teams for web apps. Cybersecurity is usually a game of who is ahead (between attackers and the security teams). Attackers will always try and look for security loopholes in any system, including those that use machine learning. Today, attackers can manipulate some machine learning models by feeding them misleading data to evade detection. It is common for ML models to generate false positives or false negatives. Too many false positives can overwhelm security teams, while false negatives can lead to undetected breaches. To minimize false positives and negatives: • High-quality and regularly updated data should be used to train models. • Optimize models with fine-tuning and ensemble methods. • Implement adaptive learning with feedback loops. • Balance detection sensitivity with accuracy. Training and deploying machine learning-based security solutions requires significant computing power and expertise. Security platform vendors will always pass these costs on to the end users. This makes modern security tools that utilize the latest and most powerful models a huge expense that small and medium-sized businesses may struggle to afford. AI and machine learning have gradually become a core part of several security tools over the last 15 years, with many platform vendors integrating these capabilities into their solutions. As web applications become more sophisticated and handle more sensitive user data, there has never been a better time for them to utilize these modern security tools. Despite the limitations discussed in this article, ML-powered security tools are still a much better option than traditional security solutions that rely on pre-configured rules. Forbes Technology Council is an invitation-only community for world-class CIOs, CTOs and technology executives. Do I qualify?