Safer Content Handling: Extract Information, Leave the RestDeep Secure's Simon Wiseman on the Business Case for Content Threat Removal
Numerous threats continue to target organizations via email, as well as email attachments. So why not analyze all of these types of information, extract the known good pieces and deliver it to users while discarding the rest, thus helping to blunt spear-phishing attacks, malware campaigns and more?
See Also: AI's Impact on SOC Maturity
That's the business case for content threat removal, says Simon Wiseman of Deep Secure.
In a video interview at the recent Infosecurity Europe conference in London, Wiseman discusses:
- Content-borne threats;
- Information extraction versus sanitization;
- How information extraction works in practice.
Wiseman is CTO of Deep Secure. His career in cybersecurity started in 1979 when he joined the U.K. team working on the internet at the U.K. Ministry of Defense's computer research center. He also worked at QinetiQ, among other roles.
At Deep Secure, Wiseman led pioneering work on the use of data transformation to defeat attacks in digital content, taking the company in a new direction, providing unique cyber defenses delivering content threat removal through commercially focused products and services. His current research is looking at the application of the technology in mobile and industrial environments, with a view to providing the internet of things with some security before it is too late.