enterprisesecuritymag

How AI can be used in Cybersecurity

Kennedi Gross, Manager, Cyber Security, Valvoline

Kennedi Gross, Manager, Cyber Security, ValvolineKennedi Gross, Manager, Cyber Security, Valvoline

Cybercrime is a huge business that uses sophisticated technology to make a profit. Artificial intelligence is providing solutions to almost all segments of our daily lives like healthcare, smart cities, defense, education, transport, cybersecurity etc. Cybersecurity protects software infrastructure from cybercriminal threats but AI can be used by cybercriminals to search vulnerabilities and attack also. Attackers can also enlist AI techniques to supercharge criminal activities. Attackers might attempt to hijack artificial intelligence by tampering the information in datasets or the physical environment. This is called adversarial machine learning where data has been modified to trick a neural network and fool systems to misclassifying objects entirely. A few factors which can affect cybersecurity in near future are

Cybersecurity is more important than ever

With a continuously growing number of IoT devices, it is expected that every person might own more than six interconnected devices. This will provide wide opportunities for criminals to attack.

AI to protect

Anything connected to the internet can be targeted by a cybercriminal. AI equipped IT infrastructure, detects malware on the network, create a response, and detect intrusions even before they happen. AI security systems learn more with time. AI offers organizations protection by automating complex processes for recognizing hacks, investigating attacks, and addressing security breaches.

Monitor Usage

Cloud platforms offer monitoring capabilities that can reduce the risk of malicious resources. IT staff should be explained about cloud security as part of any cybersecurity awareness training provided to district employees.

Use a Secure Runtime Monitor In case of attack, the runtime monitor ensures that the attacker can’t identify your data. If IT community becomes more aware of resources and at monitoring them, criminals won’t be able to steal.

Check out: Top Cybersecurity Solution Providers

5G

 5G adoption will increase the attack area in the future. Attackers may even exploit home-based Wi-Fi routers and poorly secured IoT devices. The attacker may replace a legitimate software update with malicious content; any user receiving the update will get their computer infected.       

Weekly Brief

Read Also

In-Depth Network Visibility and Security Intelligence

In-Depth Network Visibility and Security Intelligence

Mike Potts, President and CEO, Lancope, Inc.
Threat Intelligence: The New Frontier

Threat Intelligence: The New Frontier

Wes Spencer, CIO, FNB Bank Inc.
Getting In Front: Thinking Differently about Threat Intelligence

Getting In Front: Thinking Differently about Threat Intelligence

Tim Callahan, SVP, Global Security, & Global CSO, Aflac [NYSE:AFL]
The Great Threat Intelligence Debate

The Great Threat Intelligence Debate

Dan Holden, Director-Security Research, Arbor Networks
Operationalizing Threat Intelligence

Operationalizing Threat Intelligence

Chuck Fishman, Media Entertainment and publishing Director, Acquia
Introduction to Security Video Analytics and Advancements

Introduction to Security Video Analytics and Advancements

David Waldron, CPP, Associate Principal and Project Executive, IMEG Corp