Artificial Intelligence & Machine Learning , Black Hat , Events

Using AI to Find Novel Attacks - A 'Radical New Approach'

Matt Shea of MixMode Discusses Generative AI-Powered Threat Detection and Response
Matt Shea, chief strategy officer, MixMode

The bad guys are using ChatGPT. There has been a rise in the number of novel attacks meant to bypass legacy rules and IOC-based systems, including zero-day nation-state attacks, insider threats, "living off the land" attacks, model poisoning of AI/ML solutions, and prompt injection for LLM-based systems.

See Also: User Entity & Behavior Analytics 101: Strategies to Detect Unusual Security Behaviors

In the new world of workloads in the cloud, hybrid systems, shadow IT and microservices, the legacy approach to threat detection no longer works, said Matt Shea, Chief Strategy Officer at MixMode. "Data is too big," he said, and "a radical new approach" is required.

In this video interview with Information Security Media Group at Black Hat 2023, Shea discussed:

  • Using generative AI-powered threat detection methods to find novel attacks;
  • How MixMode leverages patented third-wave, self-supervised AI;
  • How MixMode uses dynamical systems instead of a neural networks approach to revolutionize threat detection and response.

Shea oversees product strategy and development. Prior to MixMode, he was president and CEO and executive vice president of product development and technology for WildTangent. He oversaw the development of platforms adopted by companies including AT&T, HP and Dell that were distributed on hundreds of millions of phones and PCs. Shea holds numerous software patents and was selected for Puget Sound Business Journal's "40 Under 40."


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.