About
How AI, ML, and automation can improve cybersecurity protection
Traditional cybersecurity tools such as mere anti- malware software or login audits aren't going to be sufficient in 2020--additional resources will be needed to protect organizations and their employees from cyberthreats. Artificial intelligence (AI) and machine learning (ML) are making productive inroads in the cybersecurity space.
I spoke with Anish Joshi, vice president of technology at AI solutions provider Fusemachines, and Greg Martin, general manager of the Security Business Unit at Sumo Logic , a machine data analytics organization to get their input on the topic. The interviews have been lightly edited.
Scott Matteson: What are the common pain points with cybersecurity?
Anish Joshi: Security risks in applications are ever growing in number as well as complexity. With the advent of technology like web, mobile, and even the Internet of Things (loT), applications have pervaded personal and professional lives as they use tech for a variety of different purposes, potentially increasing its footprint for damage. There is probably no organization that doesn't have its own application. However, the number of applications that are vulnerable to threats has catapulted due to problems like a shortage in skilled technical manpower, whose expertise is necessary to build and protect such software. There is also a tendency to cut down application development costs through outsourcing , leading to the creation of software of low quality.
An even more dreadful fact is that application security and privacy is being overlooked by startups that lack the resources to address such concerns and are often bogged down by fierce competition in a cutthroat environment.
It all boils down to there being no in-depth cybersecurity strategy. Cybersecurity management becomes a very cumbersome and demanding task as technology pervades into every part of business. A lot of companies suffer from a lack of a reliable and systematic risk-based security strategy. Many also lack an application security program, with the exception of a few who have an updated backlog of their applications, processed data, and implemented security controls. It seems improbable to secure these applications without any proper knowledge.
Greg Martin: Attackers have learned to largely automate their attacks, increasing the frequency of attacks by an order of magnitude. Because of this, alert fatigue, false positive alerts, and the sheer volume of attacks and the amount of raw data available to analyze makes reacting accordingly a near-impossible task for humans. This is all magnified by the widely recognized skills gap/talent shortage in cybersecurity.
Scott Matteson: What are the most prevalent risks?
Anish Joshi: The most prevalent risk is the stealing of private and confidential information through phishing emails. When phishing emails are opened by employees of a company, this can cause malware to infiltrate the company's computer system, eventually causing it to lose a lot of money, trade secrets, as well as its name and reputation.
This does not just affect companies as a whole but also individuals, as their privacy is violated, and their information can be used to commit fraud. One example would be stealing money from their bank account.
Greg Martin: The sophistication of attacks advances daily, and we are seeing a notable rise in fileless attacks, which is increasingly enabling attackers to "live off the land," meaning they are leveraging existing scripting capabilities like PowerShell and existing network management tools to propagate and laterally move within enterprise networks.
A Business-oriented Approach to Data Modelling
Related
Register with your social profile:
Your email address will not be published. Required fields are marked *
Comment
Disclaimer
© 2015 7wData. All Rights Reserved | site by four eyes
/* ----------------------------------------- */ /* Content Template: Single Post with Sidebar v3 - start */ /* ----------------------------------------- */ /* remove the left overs from the inline related posts IRPP_ruby. It adds an extra div to add bottom space below the irrp */ #upcoming-events DIV[style="clear:both; margin-top:0em; margin-bottom:1em;"] {display: none;} /* ----------------------------------------- */ /* Content Template: Single Post with Sidebar v3 - end */ /* ----------------------------------------- */ /* ----------------------------------------- */ /* Content Template: Author Box - start */ /* ----------------------------------------- */ .ath-image{ margin: 0 auto; } .single-post #ath-box{ font-size: 0.75em; } .single-post #ath-box .IRPP_ruby { // display:none; } /*----- Genral Classes start ------*/ body { background: #2C303C; font-family: 'Source Sans Pro', sans-serif; font-size: 100%; margin: 0; padding: 0; } //h1 { text-align: center; color: #999; background: rgba(0, 0, 0, 0.36); margin: 0; padding: 5px; } //h2 { text-align: center; color: #999; margin: 0; padding: 5px; font-size: 1.8em; margin-bottom: 30px; } .wrapper,.copyright { padding: 20px; text-align: center; } hr{ margin: 30px 20px; border-top:2px solid #1C1E26 ; border-bottom:2px solid #38404D; } .list-unstyled { padding-left: 0; list-style: none; } .list-inline li { display: inline-block; padding-right: 0px; padding-left: 0px; margin-bottom: 10px; } /*---- Genral classes end -------*/ /*Change icons size here*/ .social-icons .fa { font-size: 1em; } /*Change icons circle size and color here*/ .social-icons .fa { width: 30px; height: 30px; line-height: 30px; text-align: center; color: #FFF; color: rgba(255, 255, 255, 0.8); -webkit-transition: all 0.3s ease-in-out; -moz-transition: all 0.3s ease-in-out; -ms-transition: all 0.3s ease-in-out; -o-transition: all 0.3s ease-in-out; transition: all 0.3s ease-in-out; } .social-icons.icon-circle .fa{ border-radius: 50%; } .social-icons.icon-rounded .fa{ border-radius:5px; } .social-icons.icon-flat .fa{ border-radius: 0; } .social-icons .fa:hover, .social-icons .fa:active { color: #FFF; -webkit-box-shadow: 1px 1px 3px #333; -moz-box-shadow: 1px 1px 3px #333; box-shadow: 1px 1px 3px #333; } .social-icons.icon-zoom .fa:hover, .social-icons.icon-zoom .fa:active { -webkit-transform: scale(1.1); -moz-transform: scale(1.1); -ms-transform: scale(1.1); -o-transform: scale(1.1); transform: scale(1.1); } .social-icons.icon-rotate .fa:hover, .social-icons.icon-rotate .fa:active { -webkit-transform: scale(1.1) rotate(360deg); -moz-transform: scale(1.1) rotate(360deg); -ms-transform: scale(1.1) rotate(360deg); -o-transform: scale(1.1) rotate(360deg); transform: scale(1.1) rotate(360deg); } .social-icons .fa-adn{background-color:#504e54;} .social-icons .fa-apple{background-color:#aeb5c5;} .social-icons .fa-android{background-color:#A5C63B;} .social-icons .fa-bitbucket,.social-icons .fa-bitbucket-square{background-color:#003366;} .social-icons .fa-bitcoin,.social-icons .fa-btc{background-color:#F7931A;} .social-icons .fa-css3{background-color:#1572B7;} .social-icons .fa-dribbble{background-color:#F46899;} .social-icons .fa-dropbox{background-color:#018BD3;} .social-icons .fa-facebook,.social-icons .fa-facebook-square{background-color:#3C599F;} .social-icons .fa-flickr{background-color:#FF0084;} .social-icons .fa-foursquare{background-color:#0086BE;} .social-icons .fa-github,.social-icons .fa-github-alt,.social-icons .fa-github-square{background-color:#070709;} .social-icons .fa-google-plus,.social-icons .fa-google-plus-square{background-color:#CF3D2E;} .social-icons .fa-html5{background-color:#E54D26;} .social-icons .fa-instagram{background-color:#A1755C;} .social-icons .fa-linkedin,.social-icons .fa-linkedin-square{background-color:#0085AE;} .social-icons .fa-linux{background-color:#FBC002;color:#333;} .social-icons .fa-maxcdn{background-color:#F6AE1C;} .social-icons .fa-pagelines{background-color:#241E20;color:#3984EA;} .social-icons .fa-pinterest,.social-icons .fa-pinterest-square{background-color:#CC2127;} .social-icons .fa-renren{background-color:#025DAC;} .social-icons .fa-skype{background-color:#01AEF2;} .social-icons .fa-stack-exchange{background-color:#245590;} .social-icons .fa-stack-overflow{background-color:#FF7300;} .social-icons .fa-trello{background-color:#265A7F;} .social-icons .fa-tumblr,.social-icons .fa-tumblr-square{background-color:#314E6C;} .social-icons .fa-twitter,.social-icons .fa-twitter-square{background-color:#32CCFE;} .social-icons .fa-vimeo-square{background-color:#229ACC;} .social-icons .fa-vk{background-color:#375474;} .social-icons .fa-weibo{background-color:#D72B2B;} .social-icons .fa-windows{background-color:#12B6F3;} .social-icons .fa-xing,.social-icons .fa-xing-square{background-color:#00555C;} .social-icons .fa-youtube,.social-icons .fa-youtube-play,.social-icons .fa-youtube-square{background-color:#C52F30;} /* ----------------------------------------- */ /* Content Template: Author Box - end */ /* ----------------------------------------- */ /* ----------------------------------------- */ /* Content Template: Loop item in related events v2 - start */ /* ----------------------------------------- */ .wp-caption { position: relative; //padding: 0; //margin: 0; } .wp-caption img { display: block; max-width: 100%; //height: auto; } .wp-caption:after { content: ""; position: absolute; display: block; left: 0; top: 0; width: 100%; height: 100%; background: rgba(0, 0, 0, 0) linear-gradient(to bottom, rgba(0, 0, 0, 0) 0px, rgba(0, 0, 0, 0.6) 100%) repeat 0 0; z-index: 1; } .wp-caption-text { display: block; position: absolute; width: 100%; color: #fff; left: 0; bottom: 0; padding: 1em; font-weight: 700; z-index: 2; -webkit-box-sizing: border-box; box-sizing: border-box; text-transform: none; padding-bottom: 10px; } .evnt-gal { -webkit-text-stroke: 1px grey; /*color: orange;*/ text-shadow: 1px 1px 0 #000, -1px -1px 0 #000, 1px -1px 0 #000, -1px 1px 0 #000, 1px 1px 0 #000; /*line-height: 1.5;*/ font-size: 40px; } .wp-caption>.wp-caption-text:last-child { font-size:30px; text-transform:none; } .evnt-gal-code { font-size:20px; font-weight:900; } .evnt-lbl{font-weight:800} .evnt-date { position: relative; width: 70px; /* font-family: Georgia, serif; */ /* color: #999; */ margin: 0 auto; } .evnt-day, .evnt-month, .evnt-year { position: absolute; } .evnt-day { font-size: 30px; top: 15px; } .evnt-month { top: 0; left: 0; font-size: 18px; } .evnt-year { top: 19px; right: 0; font-size: 20px; rotation: -90deg !important; /* ** Hacks ** */ -webkit-transform: rotate(-90deg); -moz-transform: rotate(-90deg); } .hangingindent { padding-left: 22px ; text-indent: -22px ; } /* ----------------------------------------- */ /* Content Template: Loop item in related events v2 - end */ /* ----------------------------------------- */ /* ----------------------------------------- */ /* Content Template: Loop item in related events v2 – bottom - start */ /* ----------------------------------------- */ .row.fh-2em { min-height: 4em; } /* ----------------------------------------- */ /* Content Template: Loop item in related events v2 – bottom - end */ /* ----------------------------------------- */