One of the most complex challenges in the world of cyber security is accurately identifying whether a file is good or bad. Take, for example, an executable file. Unlike Word or Excel files for instance, that function only within the context of a specific program, executables, by their very nature, need to operate in a…
The post Introducing CADET: AI Technology in Action appeared first on Check Point Blog.

http://blog.checkpoint.com/2018/06/13/introducing-cadet-ai-technology-in-action/