Why Artificial Intelligence is Crucial to Cyber Security

Blog Date:  8/30/2017
Author:  Ray Coulombe

AI Security Strategies
We are all aware of the importance of having a robust, multi-layered security strategy. Defense in depth is a staple of all cyber defenses, but each layer of defense has its limitations. When properly deployed, AI has the potential to strengthen each layer and perhaps add additional layers by looking for anomalous behavior. It will be a valuable tool moving forward but, unfortunately, those who are quickly becoming the most advanced when it comes to AI cyber security are the ones on the offensive: cyber criminals.

How can one beat them to the punch? Solid products, knowledgeable technical staff, and end-user training are a great start. According to CIO online, this should include social engineering training and the use of AI/machine learning in your environment. As an example, on top of your traditional firewall and IPS (Intrusion Prevention System), add an industry-proven endpoint monitoring system, preferably one that uses machine learning to identify and prevent bad code from executing. Then, add a tool that gives you a holistic view of your entire network in real time that identifies advanced threats, including those stealthy, unconventional, silent attackers. Be sure that your end-user security training is inclusive, given regularly, and updated often as trends change around social engineering and phishing.

Additionally, many security companies are trying to embrace more technologically-advanced ways of protecting important data. At the heart of these developing tools is an advanced algorithm that can adapt and learn normal patterns of life for every user and device in a network and find anomalies, according to CIO online.

Lately, according to Forbes, big data—or the ability to collect, monitor and analyze ever-increasing volumes of data—has been deployed in the ongoing battle to stay one step ahead of hackers and malicious attempts. AI helps to automate the distillation and analysis of copious or complex data in ways that human beings simply can't. While big data can be a good starting point for decreasing cyber threats, inevitably a machine learning strategy will need to follow, which is exactly what we're seeing: advanced analytics and cutting-edge technology trying to tackle vast streams of data available via company networks, the Internet, and connected machines.


Resource Blogs

Most Recent Blog List for Blog Author: Ray Coulombe

Security Specifier Blog List Image for  Stay Safe! While Traveling This Summer

Stay Safe! While Traveling This Summer

It’s summer vacation time! The last thing you need to worry about it is getting your identity stolen while you’re sitting on a beach somewhere exotic. In 2016, more than 15 million Americans were victims of identity theft, up 16 percent from the previous year, according to Experian. Plus, about 33 percent of that fraud took place when people were traveling. Here’s a few tips to staying safe all summer while traveling...
read more -->

Security Specifier Blog List Image for Rethinking Cabling

Rethinking Cabling

Cat 5e became an ANSI/TIA/EIA standard in 2001, Cat 6 in 2002, and Cat 6a in 2008. However, it may be extremely useful to consider taking advantage of other existing cabling infrastructure in lieu of running new. Read more to learn how to approach cabling.
read more -->

Security Specifier Blog List Image for Off the Beaten Path at ISC West

Off the Beaten Path at ISC West

This year at ISC (the International Security Conference and Exposition), I was determined to try to see the latest iStechnologies hiding in the nooks and crannies—literally! I visited booths in the back, the basement, small kiosks hidden inside larger vendor books, and throughout the Emerging Technology Zone.

In case you missed the show, I’ll round up some of the best new technologies and companies to keep an eye on. Read more.
read more -->

Security Specifier Blog List Image for Cyber Crime Taking Down Cities

Cyber Crime Taking Down Cities

Earlier this year, in March, the City of Atlanta’s nearly 8,000 employees heard words they never thought they would hear: “It’s okay to turn your computers on.” Their computers were powered off for five days. In those five days Atlanta residents could not pay traffic tickets, water bills, or report city issues. Read how ransomware impacted this metropolitan area.
read more -->

Security Specifier Blog List Image for A Few Thoughts on K-12 School Security

A Few Thoughts on K-12 School Security

There is no one size fits all when it comes to K-12 school security. Schools vary in so many ways: size, age, local environment, affluence, culture, governance, and more. Read some helpful tips and resources that might just help your school be better prepared.
read more -->

Copyright Ⓒ 2010 SecuritySpecifiers™