{"id":395,"date":"2017-04-11T18:33:49","date_gmt":"2017-04-11T18:33:49","guid":{"rendered":"https:\/\/eset-blog.aist.fun\/fighting-post-truth-with-reality-in-cybersecurity\/"},"modified":"2019-05-29T12:16:28","modified_gmt":"2019-05-29T12:16:28","slug":"fighting-post-truth-with-reality-in-cybersecurity","status":"publish","type":"post","link":"https:\/\/blog.eset.ee\/et\/en\/2017\/04\/11\/fighting-post-truth-with-reality-in-cybersecurity\/","title":{"rendered":"Fighting post-truth with reality in cybersecurity"},"content":{"rendered":"<p class=\"wls-paragraph\">The world is changing in front of our eyes. Where facts, truth and honesty were once our most valuable assets, nowadays alternative-facts, post-truths and outright lies reign. Unfortunately, the cybersecurity business is no exception to this trend.<\/p>\n<p class=\"wls-paragraph\">Even worse, with all the recent advances in the field of artificial intelligence (AI) and machine learning (ML), cybersecurity is all the more complicated and confusing \u2013 opening opportunities for some players who like to inflate their abilities and ignore the limitations.<\/p>\n<p class=\"wls-paragraph\">Machine learning algorithms as a cybersecurity silver bullet? No need for updates, or the downplayed importance of false positives; those are just a few of the often used marketing tricks from the toolbox of these \u201cnext-gen\u201d \u2013 or as we call them \u2013 \u201cpost-truth\u201d vendors.<\/p>\n<p class=\"wls-paragraph\">These false claims, however, go against the fact-based experience of established vendors such as ESET, which has fought the cybersecurity fight for almost three decades and know the possible downsides.<\/p>\n<p class=\"wls-paragraph\">To bring more clarity to the murky waters of post-truth marketing, we at WeLiveSecurity have decided to release a series of short articles focused on the currents state of AI, all the ins and outs of ML, and ML as it affects cybersecurity.<\/p>\n<p class=\"wls-paragraph\">Committed to the values of truth and honesty, we will explain how machine learning in cybersecurity works, what the limits of this recently rediscovered technology are in real-world environments and why it is still not mature enough to be the only layer standing between you and cyberattackers.<\/p>\n<p class=\"wls-paragraph\">Just to give you an overview of what you can read over the next few weeks:<\/p>\n<ol>\n<li><a href=\"https:\/\/www.welivesecurity.com\/2017\/04\/11\/fighting-post-truth-reality-cybersecurity\/\" target=\"_blank\" rel=\"noopener noreferrer\">Editorial: Fighting post-truth with reality in cybersecurity<\/a><\/li>\n<li>What is machine learning and artificial intelligence?<\/li>\n<li>Most frequent misconceptions about ML and AI<\/li>\n<li>Why ML-based security doesn\u2019t scare intelligent adversaries<\/li>\n<li>Why one line of cyberdefense is not enough, even if it\u2019s machine learning<\/li>\n<li>Chasing ghosts: The real costs of high false positive rates in cybersecurity<\/li>\n<li>How updates make your security solution stronger<\/li>\n<li>We know ML, we\u2019ve been using it for over a decade<\/li>\n<\/ol>\n<p class=\"wls-paragraph\">We hope you\u2019ll enjoy it.<\/p>\n<p class=\"wls-paragraph\"><strong><em>With contribution of Jakub Debski &amp; Peter Kosinar<\/em><\/strong><\/p>\n<p>Source: <a id=\"community-tab\" class=\"publisher-nav-color\" href=\"https:\/\/www.welivesecurity.com\/2017\/04\/11\/fighting-post-truth-reality-cybersecurity\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-action=\"community-sidebar\" data-forum=\"welivesecurity\"><span class=\"community-name\"><strong>WeLiveSecurity<\/strong><\/span><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The world is changing in front of our eyes. Where facts, truth and honesty were once our most valuable assets, nowadays alternative-facts, post-truths and outright lies reign. Unfortunately, the cybersecurity business is no exception to this trend. Even worse, with all the recent advances in the field of artificial intelligence (AI) and machine learning (ML),<\/p>\n","protected":false},"author":5,"featured_media":1797,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[162,163,166],"tags":[],"class_list":["post-395","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","category-opinion","category-press-release"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.2 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Fighting post-truth with reality in cybersecurity - ESET Eesti Blogi<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.eset.ee\/et\/en\/2017\/04\/11\/fighting-post-truth-with-reality-in-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Fighting post-truth with reality in cybersecurity\" \/>\n<meta property=\"og:description\" content=\"The world is changing in front of our eyes. Where facts, truth and honesty were once our most valuable assets, nowadays alternative-facts, post-truths and outright lies reign. Unfortunately, the cybersecurity business is no exception to this trend. Even worse, with all the recent advances in the field of artificial intelligence (AI) and machine learning (ML),\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.eset.ee\/et\/en\/2017\/04\/11\/fighting-post-truth-with-reality-in-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"ESET Eesti Blogi\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/www.facebook.com\/antiviirus\" \/>\n<meta property=\"article:published_time\" content=\"2017-04-11T18:33:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-05-29T12:16:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/shutterstock_597956915-623x410.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"623\" \/>\n\t<meta property=\"og:image:height\" content=\"410\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ESET Blog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ESET Blog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/04\\\/11\\\/fighting-post-truth-with-reality-in-cybersecurity\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/04\\\/11\\\/fighting-post-truth-with-reality-in-cybersecurity\\\/\"},\"author\":{\"name\":\"ESET Blog\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\"},\"headline\":\"Fighting post-truth with reality in cybersecurity\",\"datePublished\":\"2017-04-11T18:33:49+00:00\",\"dateModified\":\"2019-05-29T12:16:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/04\\\/11\\\/fighting-post-truth-with-reality-in-cybersecurity\\\/\"},\"wordCount\":353,\"image\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/04\\\/11\\\/fighting-post-truth-with-reality-in-cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/shutterstock_597956915-623x410.jpg\",\"articleSection\":[\"news\",\"opinion\",\"press-release\"],\"inLanguage\":\"en-US\",\"copyrightYear\":\"2017\",\"copyrightHolder\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/04\\\/11\\\/fighting-post-truth-with-reality-in-cybersecurity\\\/\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/04\\\/11\\\/fighting-post-truth-with-reality-in-cybersecurity\\\/\",\"name\":\"Fighting post-truth with reality in cybersecurity - ESET Eesti Blogi\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/04\\\/11\\\/fighting-post-truth-with-reality-in-cybersecurity\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/04\\\/11\\\/fighting-post-truth-with-reality-in-cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/shutterstock_597956915-623x410.jpg\",\"datePublished\":\"2017-04-11T18:33:49+00:00\",\"dateModified\":\"2019-05-29T12:16:28+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/04\\\/11\\\/fighting-post-truth-with-reality-in-cybersecurity\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/04\\\/11\\\/fighting-post-truth-with-reality-in-cybersecurity\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/04\\\/11\\\/fighting-post-truth-with-reality-in-cybersecurity\\\/#primaryimage\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/shutterstock_597956915-623x410.jpg\",\"contentUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/shutterstock_597956915-623x410.jpg\",\"width\":623,\"height\":410},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/04\\\/11\\\/fighting-post-truth-with-reality-in-cybersecurity\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Fighting post-truth with reality in cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/\",\"name\":\"ESET Eesti Blogi\",\"description\":\"Uudised IT maailmast\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\",\"name\":\"ESET Blog\",\"sameAs\":[\"http:\\\/\\\/eset.ee\"],\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/author\\\/allankinsigo\\\/\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/04\\\/11\\\/fighting-post-truth-with-reality-in-cybersecurity\\\/#local-main-organization-logo\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"ESET EESTI\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Fighting post-truth with reality in cybersecurity - ESET Eesti Blogi","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.eset.ee\/et\/en\/2017\/04\/11\/fighting-post-truth-with-reality-in-cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"Fighting post-truth with reality in cybersecurity","og_description":"The world is changing in front of our eyes. Where facts, truth and honesty were once our most valuable assets, nowadays alternative-facts, post-truths and outright lies reign. Unfortunately, the cybersecurity business is no exception to this trend. Even worse, with all the recent advances in the field of artificial intelligence (AI) and machine learning (ML),","og_url":"https:\/\/blog.eset.ee\/et\/en\/2017\/04\/11\/fighting-post-truth-with-reality-in-cybersecurity\/","og_site_name":"ESET Eesti Blogi","article_publisher":"http:\/\/www.facebook.com\/antiviirus","article_published_time":"2017-04-11T18:33:49+00:00","article_modified_time":"2019-05-29T12:16:28+00:00","og_image":[{"width":623,"height":410,"url":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/shutterstock_597956915-623x410.jpg","type":"image\/jpeg"}],"author":"ESET Blog","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ESET Blog","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/04\/11\/fighting-post-truth-with-reality-in-cybersecurity\/#article","isPartOf":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/04\/11\/fighting-post-truth-with-reality-in-cybersecurity\/"},"author":{"name":"ESET Blog","@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88"},"headline":"Fighting post-truth with reality in cybersecurity","datePublished":"2017-04-11T18:33:49+00:00","dateModified":"2019-05-29T12:16:28+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/04\/11\/fighting-post-truth-with-reality-in-cybersecurity\/"},"wordCount":353,"image":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/04\/11\/fighting-post-truth-with-reality-in-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/shutterstock_597956915-623x410.jpg","articleSection":["news","opinion","press-release"],"inLanguage":"en-US","copyrightYear":"2017","copyrightHolder":{"@id":"https:\/\/blog.eset.ee\/et\/#organization"}},{"@type":"WebPage","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/04\/11\/fighting-post-truth-with-reality-in-cybersecurity\/","url":"https:\/\/blog.eset.ee\/et\/en\/2017\/04\/11\/fighting-post-truth-with-reality-in-cybersecurity\/","name":"Fighting post-truth with reality in cybersecurity - ESET Eesti Blogi","isPartOf":{"@id":"https:\/\/blog.eset.ee\/et\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/04\/11\/fighting-post-truth-with-reality-in-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/04\/11\/fighting-post-truth-with-reality-in-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/shutterstock_597956915-623x410.jpg","datePublished":"2017-04-11T18:33:49+00:00","dateModified":"2019-05-29T12:16:28+00:00","author":{"@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88"},"breadcrumb":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/04\/11\/fighting-post-truth-with-reality-in-cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.eset.ee\/et\/en\/2017\/04\/11\/fighting-post-truth-with-reality-in-cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/04\/11\/fighting-post-truth-with-reality-in-cybersecurity\/#primaryimage","url":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/shutterstock_597956915-623x410.jpg","contentUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/shutterstock_597956915-623x410.jpg","width":623,"height":410},{"@type":"BreadcrumbList","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/04\/11\/fighting-post-truth-with-reality-in-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.eset.ee\/et\/en\/"},{"@type":"ListItem","position":2,"name":"Fighting post-truth with reality in cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/blog.eset.ee\/et\/en\/#website","url":"https:\/\/blog.eset.ee\/et\/en\/","name":"ESET Eesti Blogi","description":"Uudised IT maailmast","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.eset.ee\/et\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88","name":"ESET Blog","sameAs":["http:\/\/eset.ee"],"url":"https:\/\/blog.eset.ee\/et\/en\/author\/allankinsigo\/"},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/04\/11\/fighting-post-truth-with-reality-in-cybersecurity\/#local-main-organization-logo","url":"","contentUrl":"","caption":"ESET EESTI"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts\/395","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/comments?post=395"}],"version-history":[{"count":0,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts\/395\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/media\/1797"}],"wp:attachment":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/media?parent=395"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/categories?post=395"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/tags?post=395"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}