Taking Advantage Of AI In Cyber Security Strategies

Deploying AI into cyber security solutions for better enterprise protection

Add bookmark

There is no shortage of new and modern technologies entering the market that display the potential to change cyber security as we know it. For example, artificial intelligence and machine learning have already shown promise across different industries. And while it is imperative for enterprises to have security built into the new technologies they are leveraging, some of the new tech can also be used to help boost security standards for even stronger defense strategies.  

According to a Forbes article titled, “Can AI Become Our New Cybersecurity Sheriff?”:

Continuous research and development in AI is helping the technology grow exponentially. Hence, applications that use AI for cyber security will become mainstream soon too. Additionally, AI will be integrated with other advanced technologies such as Blockchain to ensure better security protocols.

As cyber-attacks have become the most significant risk facing today’s businesses, smart cities, and critical infrastructure, with the total cost of online crime projected to surpass one trillion dollars in 2019. At the heart of this crisis is none other than the traditional approach to cyber defense, which relies on rules and signatures to detect known threats at a time when cyber-criminals launch never-before-seen attacks on a daily basis.

To keep pace with the ever-evolving threat landscape, solutions such as those rooted in artificial intelligence, can  learns a unique ‘pattern of life’ for every user, device, and network that it safeguards, rather than attempt to predefine what the next attack will look like. By being able to detect the subtly anomalous behavior indicative of both known and unknown attacks, AI can allow defenders to finally fight back against their online adversaries.

During the 2019 Cyber Security Digital Summit, Darktrace’s Director of Enterprise Cyber Security David Masson, explained how using AI can help enterprises find threats that get inside. He gave examples of the thousands of in-progress threats detected every day, such as:

  • Indiscriminate worms, Trojans, ransomware
  • Exfiltration of sensitive data by insiders
  • Hacked IoT devices, including HVAC, video conferencing, internet-connected fish tanks
  • Irregular VPN access from remote users and sites
  • Compromises of industrial control systems
  • Attacks on physical security, such as biometric scanners and badge readers
  • Long-term criminal campaigns and infrastructure hijacking

Masson also reveals where cyber-criminals have found weaknesses in legacy approaches to security, why only self-learning security tools can parry never-before-seen attacks and how to protect your network from machine-speed attacks. He also talks about what gaining 100% network visibility of your entire digital estate can reveal about the largely uncharted vulnerabilities that attackers are targeting today.

Listen to the full Digital Summit session on demand.