Traditional approaches to finding and stopping threats have ceased to be appropriately effective. One reason is the scope of ways an attacker can enter a system and do damage have proliferated as the interconnections between apps and systems have proliferated. Applying AI to the problem seems like a natural choice but this in some sense broadens the data problem. A typical user may interact��
]]>