Eclipse Integrated Systems Blog

Eclipse Integrated Systems has been serving the Bridgewater area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Hackers May Meet Their Match With AI

Hackers May Meet Their Match With AI

There are many organizations in the world that simply can’t have cybercriminals and hackers interfering with their data. One of these organizations, CERN (whose acronym translates to the European Laboratory for Particle Physics) has far too powerful of a computer grid to allow hackers to access it. To keep it safe, CERN has deployed what may be the future of cybersecurity: artificial intelligence.

The use of artificial intelligence in security makes a lot of sense for a few reasons. First and foremost, it gives us a chance of keeping up with the changes that malware undergoes. To combat this, the scientists at CERN have been busy teaching their AI to identify threats on their network and to take appropriate action against them.

This is no easy feat when one considers the resources that CERN requires to operate its Large Hadron Collider and Worldwide LHC Computing Grid. The LHC collects a truly vast amount of data--around 50 petabytes between the beginning of 2017 to June--and shares it across a network of 170 research facilities worldwide, also providing computing resources to these facilities as needed.

This creates a unique challenge to maintaining cybersecurity--how to maintain computing power and storage capabilities while keeping the global network secured.

As a result, CERN is turning to AI and machine learning to allow their security to identify between typical network activity and that of a more malicious nature. While CERN is still testing its new artificial intelligence, there are ways that businesses can leverage similar concepts to help protect their own networks.

As of right now, when we say AI, we’re not talking about machines with human-like qualities you’d see in movies today. CERN isn’t going to be teaching their security AI the concept of love and friendship anytime soon. Instead, it’s actually a very simple tool you probably use every day. Take Google, for example. When you do a Google search, you are getting results that are indexed and categorized without the direct influence of a human operator. Google’s computers crawl the Internet and use machine learning and hundreds of various factors to deliver the search results most relevant to what you need based on a whole slew of conditions.

The benefit of using this form of AI means results are delivered incredibly quickly, and a mind-numbing amount of data can be collated and delivered at the blink of an eye. If Google employed humans to deliver search results, the system would be flawed by human biases, the costs of employing so many people to meet demand, and it would simply be slow to get the results on-demand.

AI empowering security could quickly scan for flaws on a network, run ongoing penetration tests, and constantly patch vulnerabilities. It could work day and night to improve spam and firewall capabilities. AI would have access to a lot of security resources and be able to react much faster, making it harder for hackers to overcome. Although we’re a long way out from seeing something like this fully implemented, we’re already seeing a lot of virtually intelligent systems collating and delivering data, and we can’t wait to see more…

Just as long as we don’t flip the switch on Skynet.

Do you think that AI is a viable resource to keep business networks secure, or is the technology involved potentially too untested to have the reliability that modern enterprises need over time? Leave your thoughts in the comments section below.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, 20 April 2018

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Privacy Cloud Hackers Business Computing Internet Malware Software Google Network Security Business Management Microsoft Windows 10 Computer User Tips Backup Hosted Solutions Innovation Productivity Business Productivity Apps Email Windows Efficiency Hardware Smartphone Cybercrime Cybersecurity Mobile Devices Operating System Virtualization Browser Law Enforcement Disaster Recovery Managed IT Services IT Support Ransomware Small Business Business Continuity VoIP Data Security Android Server Microsoft Office Phishing Internet of Things Money communications Chrome Mobility Mobile Device Management Telephone Systems Data Backup Office 365 Smartphones Miscellaneous Passwords Quick Tips Holiday Tech Term Saving Money Update Health Communication Wi-Fi Information Technology Collaboration Password Best Practice Risk Management Unsupported Software Workplace Tips Social Gadgets Google Drive Outsourced IT App Government Application Cloud Computing Data Recovery Wireless Vulnerability IT Services Save Money Work/Life Balance Office tips USB Computers Alert Managed Service Provider Antivirus Upgrade User Error Data Management IT Support Politics Managed IT Facebook Data Current Events Social Media Spam Windows 10 BDR Shortcut Hacking Identity Theft Two-factor Authentication Humor Telephony Managed IT Services Cost Management Remote Computing Audit iPhone Cortana Proactive IT Going Green Apple Computer Care eWaste Artificial Intelligence Legal Fraud WiFi Search The Internet of Things Patch Management Streaming Media Flexibility Social Engineering Office Bandwidth Network Television Cleaning History End of Support Excel Private Cloud Sports Battery Users Employer-Employee Relationship Save Time Recovery Meetings HaaS Mobile Security Commerce Automation Tech Support Personal Information Blockchain Google Docs Hosted Solution Automobile DDoS Mobile Computing Transportation Internet Exlporer Wireless Technology Data Protection Data Storage Encryption OneNote Samsung VPN Device Security iOS Licensing Hiring/Firing Instant Messaging Storage Training Worker Commute IT Solutions Books Text Messaging FAQ Touchscreen Devices Operating Sysytem Travel Gmail Benefits Uninterrupted Power Supply Managing Stress Virus Settings Company Culture Budget Wearable Technology Electronic Medical Records Charger Video Games Spyware Computer Fan Avoiding Downtime Tablets Smart Technology Proactive Legislation Chromecast WIndows Server 2008 Safety Wireless Charging Emails WannaCry NFL Websites Comparison Running Cable SharePoint Data Breach Webinar Edge Word Virtual Reality Data Theft Specifications Entertainment Data storage Outlook Router Evernote IT solutions Scalability Ciminal Nanotechnology Windows Ink Scam Education Computing Sales Mobile Device Administrator Cast Teamwork Networking Windows 10s How To Project Management Root Cause Analysis Google Maps Employer Employee Relationship App store Retail Access BYOD Experience Sync Workers Solid State Drive IT budget Augmented Reality Data Loss Computer Accessories Point of Sale Advertising Conferencing SaaS Phone System Hard Disk Drive Hacker Updates Reputation Files Music Identity Gifts Unified Threat Management HBO Microsoft Word Laptop Adobe Trending Keyboard Black Market Identities Microsoft Excel Lithium-ion battery Vendor Management Distributed Denial of Service Analytics Bluetooth Data Privacy Credit Cards Upgrades Robot Maintenance Touchpad Applications Marketing Language File Sharing IT Management Big Data Fax Server Screen Mirroring PDF Consultant Relocation Cache Remote Monitoring Emergency Monitors Disaster Worker CrashOverride Hard Drive

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      Latest News

      Eclipse Integrated Systems launches new website!

      Eclipse Integrated Systems is proud to announce the launch of our new website at The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

      Read more ...

      Account login