croom new

Hackers May Meet Their Match With AI

Hackers May Meet Their Match With AI

There are many organizations in the world that simply can’t have cybercriminals and hackers interfering with their data. One of these organizations, CERN (whose acronym translates to the European Laboratory for Particle Physics) has far too powerful of a computer grid to allow hackers to access it. To keep it safe, CERN has deployed what may be the future of cybersecurity: artificial intelligence.

The use of artificial intelligence in security makes a lot of sense for a few reasons. First and foremost, it gives us a chance of keeping up with the changes that malware undergoes. To combat this, the scientists at CERN have been busy teaching their AI to identify threats on their network and to take appropriate action against them.

This is no easy feat when one considers the resources that CERN requires to operate its Large Hadron Collider and Worldwide LHC Computing Grid. The LHC collects a truly vast amount of data--around 50 petabytes between the beginning of 2017 to June--and shares it across a network of 170 research facilities worldwide, also providing computing resources to these facilities as needed.

This creates a unique challenge to maintaining cybersecurity--how to maintain computing power and storage capabilities while keeping the global network secured.

As a result, CERN is turning to AI and machine learning to allow their security to identify between typical network activity and that of a more malicious nature. While CERN is still testing its new artificial intelligence, there are ways that businesses can leverage similar concepts to help protect their own networks.

As of right now, when we say AI, we’re not talking about machines with human-like qualities you’d see in movies today. CERN isn’t going to be teaching their security AI the concept of love and friendship anytime soon. Instead, it’s actually a very simple tool you probably use every day. Take Google, for example. When you do a Google search, you are getting results that are indexed and categorized without the direct influence of a human operator. Google’s computers crawl the Internet and use machine learning and hundreds of various factors to deliver the search results most relevant to what you need based on a whole slew of conditions.

The benefit of using this form of AI means results are delivered incredibly quickly, and a mind-numbing amount of data can be collated and delivered at the blink of an eye. If Google employed humans to deliver search results, the system would be flawed by human biases, the costs of employing so many people to meet demand, and it would simply be slow to get the results on-demand.

AI empowering security could quickly scan for flaws on a network, run ongoing penetration tests, and constantly patch vulnerabilities. It could work day and night to improve spam and firewall capabilities. AI would have access to a lot of security resources and be able to react much faster, making it harder for hackers to overcome. Although we’re a long way out from seeing something like this fully implemented, we’re already seeing a lot of virtually intelligent systems collating and delivering data, and we can’t wait to see more…

Just as long as we don’t flip the switch on Skynet.

Do you think that AI is a viable resource to keep business networks secure, or is the technology involved potentially too untested to have the reliability that modern enterprises need over time? Leave your thoughts in the comments section below.

The Voting Machine You Use May Have Serious Securi...
Tip of the Week: Cortana Can Help You Cheer On You...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, October 16 2018

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Cloud Business Computing Network Security Google Hackers Internet Malware Business Management Software User Tips Microsoft Hosted Solutions Productivity Tech Term Computer Innovation Windows 10 Efficiency Backup Browser Cybersecurity Productivity Business Apps Smartphones Saving Money Managed IT Services Windows Email Mobile Devices Cybercrime VoIP Virtualization Smartphone Hardware Communication Small Business Workplace Tips communications Android Data Backup Operating System Disaster Recovery Internet of Things Collaboration Data Recovery Passwords Law Enforcement Business Continuity Data Security Ransomware Microsoft Office IT Support Miscellaneous Network Gadgets Office 365 BDR Wireless IT Support Users Data Quick Tips Chrome Money Social Media Phishing Mobile Device Management Telephone Systems Server Update Mobility Cloud Computing Holiday Unsupported Software Health Vulnerability Google Drive Mobile Device Social Cost Management Employer-Employee Relationship IT Services Outsourced IT Application Government App Information Technology Windows 10 Password Best Practice Wi-Fi Risk Management USB Shortcut Proactive IT Save Money Artificial Intelligence Antivirus Sports Blockchain Managed IT Services Identity Theft Managed IT Automation Patch Management Politics Alert Computers Work/Life Balance Spam Two-factor Authentication Facebook Managed Service Provider Hacking Upgrade Streaming Media Bandwidth Current Events Office tips Data Management User Error Telephony Marketing Humor Cortana Social Engineering Television Personal Information Cleaning Samsung OneNote Legal Mobile Security Remote Computing Analytics Information Search Wireless Charging Recovery Google Docs Flexibility Touchscreen Fraud Business Intelligence Audit Data Storage Meetings Tech Support Encryption Save Time Gmail Going Green Router Company Culture Apple History Compliance Data Protection SaaS Commerce Maintenance End of Support Battery Transportation Internet Exlporer eWaste Computer Care The Internet of Things WiFi Private Cloud Wireless Technology Mobile Computing DDoS Hosted Solution Excel Networking iPhone Managing Stress Storage HaaS Devices Automobile Office VPN Music Virus Voice over Internet Protocol Sync Workers Threat Access Control Administrator Charger Reputation IT solutions Printing Medical IT Data Loss IT budget Fax Server G Suite Consultant Analysis Tablets Spyware Scam Nanotechnology Movies Conferencing Proactive Updates Uninterrupted Power Supply Operating Sysytem Virtual Reality Hiring/Firing iOS PowerPoint Authentication Legislation Access Teamwork WIndows Server 2008 Black Market Windows 10s Google Assistant GDPR Budget Entertainment Training Bring Your Own Device Identity Managed Service NFL Employer Employee Relationship Root Cause Analysis HBO Gifts Big Data Websites Amazon Adobe Microsoft Word Avoiding Downtime Wearable Technology Education Benefits Connectivity Authorization Comparison Hybrid Cloud Data Breach Solid State Drive Value Dark Web Microsoft Excel Identities Chromecast Settings Scalability Electronic Medical Records Data Privacy Word Edge Files PDF Worker Commute Computer Accessories Augmented Reality Unified Communications Credit Cards Books Data Theft Virtual Assistant Applications Smart Technology Computer Fan Downloads Screen Mirroring Specifications Managed IT Service Outlook Evernote Laptop Instant Messaging Hacker Hard Disk Drive Error File Sharing Language Experience How To Safety Emails Hard Drive Windows Ink Ciminal Text Messaging RAM IT Management Unified Threat Management Computing Plug-In Licensing Device Security Running Cable Point of Sale WannaCry Trends Troubleshooting Cast Sales Robot Cables Touchpad Keyboard Internet Explorer Microsoft Office 365 SharePoint Phone System FAQ Data storage Webinar Chromebook Reporting Google Maps Project Management Trending Bluetooth Distributed Denial of Service Vendor Management Microsoft Teams IT Solutions Video Games Upgrades App store Remote Monitoring and Management Travel Advertising A.I. BYOD Retail Lithium-ion battery Worker Printers Cache Relocation Twitter Regulation Disaster Remote Monitoring Emergency CrashOverride Monitors

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      Latest News

      Eclipse Integrated Systems launches new website!

      Eclipse Integrated Systems is proud to announce the launch of our new website at www.eisystems.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

      Read more ...

      Account login