One Article Review

Accueil - L'article:
Source AlienVault.webp AlienVault Blog
Identifiant 814040
Date de publication 2018-09-18 13:00:00 (vue: 2018-09-18 16:03:39)
Titre AI and ML; Key Tools in Emerging Cybersecurity Strategy and Investment
Texte Recently, the Defense Advanced Research Project Agency (DARPA) announced a multi-year investment of more than $2 billion in new and existing programs in artificial intelligence called the “AI Next campaign. Agency director, Dr. Steven Walker, explained the implications of the initiative: “we want to explore how machines can acquire human-like communication and reasoning capabilities, with the ability to recognize new situations and environments and adapt to them.” Indeed, artificial intelligence (AI) and correlating machine learning (ML) applications have emerged as hot topics in the emerging technology and cybersecurity communities. They are about recognizing “new situations and environments” and adapting to them. According to KPMG, in 2017, AI was a major focus areas of global VC investments -over $12B and doubling the volume of 2016. Many of those investments included aspects relating to information security.  Now that the DARPA investment (that is directed to much more than cybersecurity uses) has been added to the investment money trail, there is no doubt AI will be part of our cybersecurity future. There is evidence that AI and ML can be valuable tools to help us navigate the cybersecurity landscape. Specifically it is being used to help protect against increasingly sophisticated and malicious malware, ransomware, and social engineering attacks. AI’s capabilities in contextual reasoning can be used for synthesizing data and predicting threats. AI and ML may become new paradigms for automation in cybersecurity. They enable predictive analytics to draw statistical inferences to mitigate threats with fewer resources.  In a cybersecurity context, AI and ML can provide a faster means to identify new attacks, draw statistical inferences and push that information to endpoint security platforms. This is especially important because of the major shortage of skilled cybersecurity workers and growing attack surface. According to Cybersecurity Ventures CEO Steve Morgan, the Human attack surface is to reach 6 billion people by 2022 and Cyber-crime damage costs to hit $6 trillion annually by 2021, AI and ML cybersecurity capabilities are very important and increasingly valuable. Former White House Cybersecurity Coordinator Rob Joyce said in a 2016 presentation at USENIX: “If you really want to protect your network,” he advised, “you have to know your network, including all the devices and technology in it.” A successful attacker will often “know networks better than the people who designed and run them.” With the right combination of data, computing power, and algorithms, artificial intelligence can help defenders gain far greater mastery over their own data and networks, detect anomalous changes (whether from insider threats or from external hackers), and quickly address configuration errors and other vulnerabilities.” To provide more depth to his insights, Both AI and ML can be integral aspects of automation and adaptive networks. Applications for automated network security in
Envoyé Oui
Condensat $12b “if “know “new “we “you  small  thankfully 2016 2017 2021 2022 a 2016 ability about according accuracy acquire actors adapt adapting adaptive added address advanced adversarial advised afford against agencies agency ahead ai was ai’s algorithms all allow already also analysis analytics to draw announced annually anomalies anomalous anti applications are areas artificial aspects associated attack attacker attacks automated automatic automation bad base because become been behavioral being better billion both business called campaign can cannot capabilities capitalists ceo changes chess cognitive combating combination comes communication communities competitive computing configuration constantly context contextual coordinator correlating costs countermeasure create crime criminals cryptocurrencies cyber cybersecurity damage darpa data deception defenders defense defensive demanding depend depth designed detect detection deviations devices diagnostic digital directed direction director doubling doubt draw driven drives edged effective emerged emerging employing enable predictive encrypting endpoint engineering enhance environments environments” errors especially evade even evidence evolving existing explained exploit explore external extortion far faster fewer find firewalls focus fool forensics former fortify framework from future gain game global going government greater growing growth guys hacker hackers has have healing healthcare help help us navigate his hit horizon hot house how human humans identify implications important include included includes including increasingly indeed industry inferences information initiative: innovative insider insights institutions integral intelligence interested internet investment investments itself joyce key know kpmg landscape layers learning like likely machine machines major malicious malware many mastery may means methods mimic mitigate ml; models modifies money monitoring more morgan morphing most much multi nations need nefarious network networks new next now of automation often one organizations other over own paradigms part patterns payload payment people persistent phishing pieces platforms potential power predict predicting preferred presentation proactive programs project protect provide push quality quickly ransomware rapidly reach real really reasoning recently recognize recognizing relating report requires research resources right rob run said scanning security self shortage showing significant situations skilled social sophisticated specifically speed statistical step steve steven strategy subvert successful such supporting surface survive sword synthesizing systems targets tech technologies technology testing than the “ai them these things those threat threats thrive through time tools tools to topics trail trends trillion two understand updating urgency used usenix: uses using valuable variety venture ventures very victims’ vigilant virus volume vulnerabilities vulnerable walker want ways when whether white who why will wonder workers year your
Tags Ransomware Malware Threat
Stories
Notes
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: