croom new

Hackers May Meet Their Match With AI

Hackers May Meet Their Match With AI

There are many organizations in the world that simply can’t have cybercriminals and hackers interfering with their data. One of these organizations, CERN (whose acronym translates to the European Laboratory for Particle Physics) has far too powerful of a computer grid to allow hackers to access it. To keep it safe, CERN has deployed what may be the future of cybersecurity: artificial intelligence.

The use of artificial intelligence in security makes a lot of sense for a few reasons. First and foremost, it gives us a chance of keeping up with the changes that malware undergoes. To combat this, the scientists at CERN have been busy teaching their AI to identify threats on their network and to take appropriate action against them.

This is no easy feat when one considers the resources that CERN requires to operate its Large Hadron Collider and Worldwide LHC Computing Grid. The LHC collects a truly vast amount of data--around 50 petabytes between the beginning of 2017 to June--and shares it across a network of 170 research facilities worldwide, also providing computing resources to these facilities as needed.

This creates a unique challenge to maintaining cybersecurity--how to maintain computing power and storage capabilities while keeping the global network secured.

As a result, CERN is turning to AI and machine learning to allow their security to identify between typical network activity and that of a more malicious nature. While CERN is still testing its new artificial intelligence, there are ways that businesses can leverage similar concepts to help protect their own networks.

As of right now, when we say AI, we’re not talking about machines with human-like qualities you’d see in movies today. CERN isn’t going to be teaching their security AI the concept of love and friendship anytime soon. Instead, it’s actually a very simple tool you probably use every day. Take Google, for example. When you do a Google search, you are getting results that are indexed and categorized without the direct influence of a human operator. Google’s computers crawl the Internet and use machine learning and hundreds of various factors to deliver the search results most relevant to what you need based on a whole slew of conditions.

The benefit of using this form of AI means results are delivered incredibly quickly, and a mind-numbing amount of data can be collated and delivered at the blink of an eye. If Google employed humans to deliver search results, the system would be flawed by human biases, the costs of employing so many people to meet demand, and it would simply be slow to get the results on-demand.

AI empowering security could quickly scan for flaws on a network, run ongoing penetration tests, and constantly patch vulnerabilities. It could work day and night to improve spam and firewall capabilities. AI would have access to a lot of security resources and be able to react much faster, making it harder for hackers to overcome. Although we’re a long way out from seeing something like this fully implemented, we’re already seeing a lot of virtually intelligent systems collating and delivering data, and we can’t wait to see more…

Just as long as we don’t flip the switch on Skynet.

Do you think that AI is a viable resource to keep business networks secure, or is the technology involved potentially too untested to have the reliability that modern enterprises need over time? Leave your thoughts in the comments section below.

The Voting Machine You Use May Have Serious Securi...
Tip of the Week: Cortana Can Help You Cheer On You...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, July 18 2018

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Privacy Cloud Business Computing Hackers Network Security Internet Google Business Management Software Malware Microsoft Computer Innovation Windows 10 Backup Productivity User Tips Hosted Solutions Productivity Cybersecurity Business Tech Term Apps Email Mobile Devices Windows Managed IT Services Efficiency Cybercrime Smartphone Hardware Small Business Law Enforcement communications Smartphones Operating System Virtualization Browser VoIP Internet of Things Disaster Recovery Saving Money Collaboration IT Support Business Continuity Android Data Security Data Recovery Data Backup Ransomware Mobility Miscellaneous Passwords Phishing Holiday Workplace Tips Office 365 Chrome Wireless Quick Tips Microsoft Office Money Server Mobile Device Management Telephone Systems IT Support Communication Cloud Computing Password Outsourced IT Best Practice Risk Management Wi-Fi Google Drive Health Gadgets Social Data BDR Cost Management Employer-Employee Relationship Application Vulnerability Unsupported Software Network App Social Media Government IT Services Information Technology Update Computers Two-factor Authentication Hacking Work/Life Balance Upgrade Managed IT Streaming Media Facebook Data Management User Error Current Events Office tips Save Money USB Sports Spam Artificial Intelligence Antivirus Windows 10 Managed Service Provider Users Shortcut Identity Theft Patch Management Alert Politics The Internet of Things eWaste End of Support Battery Wireless Technology Managed IT Services Mobile Computing DDoS WiFi Hosted Solution Private Cloud Audit Save Time Excel Networking Company Culture iPhone Managing Stress Bandwidth HaaS VPN Telephony Humor Devices Social Engineering Commerce Television Automobile Computer Care Cortana Proactive IT Personal Information Remote Computing Legal Recovery Wireless Charging Search Google Docs Blockchain Office Fraud Automation Flexibility Tech Support Meetings Gmail Data Storage Cleaning Going Green Samsung OneNote Mobile Security Data Protection Encryption Apple Router Transportation History Internet Exlporer Maintenance Windows 10s Business Intelligence Outlook Evernote Training Identity File Sharing Language Books Connectivity IT Management Instant Messaging Employer Employee Relationship Root Cause Analysis Websites Amazon Windows Ink Ciminal Experience Robot Touchscreen Cast Sales How To Touchpad Benefits Hybrid Cloud Licensing Device Security Text Messaging Value Running Cable Data storage Solid State Drive Unified Communications SharePoint Point of Sale Trending Settings Data Privacy Storage Electronic Medical Records Downloads Bluetooth Distributed Denial of Service IT Solutions FAQ Computer Accessories Augmented Reality Data Theft Virtual Assistant Google Maps Project Management Phone System Lithium-ion battery BYOD Retail Smart Technology Computer Fan Managed IT Service Travel Administrator SaaS Hacker Hard Disk Drive RAM Sync Workers Advertising Hard Drive Marketing Video Games Safety Emails Trends Fax Server Charger Computing Data Loss IT budget Music Conferencing Reputation Uninterrupted Power Supply Operating Sysytem WannaCry Cables Tablets Spyware Access Unified Threat Management Internet Explorer Keyboard Microsoft Teams Teamwork Updates Budget Chromebook Legislation Webinar A.I. WIndows Server 2008 Virtual Reality Vendor Management App store Analytics HBO Gifts Black Market Avoiding Downtime Virus Voice over Internet Protocol NFL Entertainment Upgrades Threat G Suite Adobe Microsoft Word Chromecast Printing Wearable Technology Comparison IT solutions Movies Data Breach Education Files Microsoft Excel Identities Big Data PowerPoint Credit Cards Scam Nanotechnology Proactive Information Word Edge Consultant Specifications Scalability Laptop Hiring/Firing iOS Bring Your Own Device Applications PDF Worker Commute Mobile Device Google Assistant Screen Mirroring Worker Relocation Disaster Twitter Cache Plug-In Remote Monitoring Emergency CrashOverride Remote Monitoring and Management Monitors

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      Latest News

      Eclipse Integrated Systems launches new website!

      Eclipse Integrated Systems is proud to announce the launch of our new website at The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

      Read more ...

      Account login