Computerware

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Leveraging AI Might Be What Stops Hackers

Leveraging AI Might Be What Stops Hackers

There are times that hackers can’t interfere with data, and then there are times that hackers really can’t interfere with data. CERN, the Conseil Européen pour la Recherche Nucléaire (European Council for Nuclear Research) maintains far too powerful of a computer grid to risk it falling into the control of hackers. To protect it, CERN leverages the cutting edge of security to protect its European Laboratory for Particle Physics: artificial intelligence.

There are a few reasons that using AI as a part of security is a solid strategy. First, it gives users a fighting chance to stay abreast of the changes that malware makes. As a means of fighting threats, the scientists at the European Laboratory for Particle Physics are teaching their AI to identify, extract, and eliminate threats on the network.

This is saying something, especially considering the resources needed to operate CERN’s famous Large Hadron Collider and Worldwide LHC Computing Grid. The LHC collected around 50 petabytes of data between January and June of 2017--and all of the data it collects is shared to a network of 170 research facilities across the globe. These facilities can even be supported by the vast computing resources within this network as needed.

This setup provides a few challenges for those responsible for maintaining CERN’s cybersecurity. First, maintaining computing power and data storage capabilities, while second, securing their global network against threats.

To accomplish this, CERN has turned to AI and machine learning so their security systems can differentiate between usual network activity and activity from a malicious source. Their AI is still being tested, but that doesn’t mean that there aren’t similar solutions that you can’t leverage to protect your business.

To clarify, we aren’t talking about sentient androids with human qualities and behaviors as one would see in a movie. CERN’s security AI probably isn’t going to find itself feeling unrequited love for a break room toaster. Rather, we’re discussing a tool that is much more accessible than you might initially realize. For instance, Google. Each time you press ‘Enter’ to run a search, the results are compiled, indexed, and categorized without the immediate involvement of a human being. Through machine learning and hundreds of other factors, Google can draw the most relevant results it can for you, specifically.

This allows search results to be delivered faster than the eye can blink, and millions of results to be balanced and compiled just as quickly. Imagine the difference we would see if human beings delivered search results: biases would influence the results, Google would be bankrupted by the staffing costs, and the speed of return would slow to a crawl.

AI’s capabilities are also extremely well-suited for security needs, as it can tirelessly run penetration tests, patch vulnerabilities, and scan for flaws. Improving defenses, like spam blockers and firewalls, can continue at all hours without the human need for a break. With the ability to draw upon and utilize security resources at inhuman speeds, hackers and other malicious actors will have a much harder time.

While true AI is still in the realm of science fiction, we’re getting much closer to making it fact.

What do you think? Is AI the way we will secure a business’ network in the near future? Sound off in the comments section with your thoughts!

Are These 3 Challenges Holding Your Patch Implemen...
Tip of the Week: It’s Easy to Color-Code Your Goog...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 20 January 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Microsoft Hackers Software Managed Service Provider Workplace Tips Business Computing Productivity Backup Data Hardware Saving Money Business Malware Email IT Support IT Services Hosted Solutions Google Efficiency Quick Tips Smartphones Small Business Gadgets Network Security User Tips Business Continuity Mobile Devices Disaster Recovery Computer Mobile Office Network Virtualization Microsoft Office Server VoIP Social Media Mobile Device Management Windows 10 Miscellaneous Upgrade Android Unified Threat Management Windows Ransomware Smartphone Innovation Passwords Holiday Operating System Remote Computing WiFi Vendor Management Remote Monitoring BYOD Mobile Computing Communication The Internet of Things Marketing Collaboration Apps Facebook Users Firewall Analytics History Managed IT services Alert IT Support Data Management Apple Cybersecurity Managed IT Services Phishing Outsourced IT IT Consultant Save Money Health Content Filtering Bring Your Own Device Productivity Automation Gmail Office App Big data Tech Support Artificial Intelligence Best Practice Spam Going Green BDR Outlook Hiring/Firing Wireless Technology Virus Search Managed IT Browser Lithium-ion Battery Windows 8 communications Hard Drives Budget Printer Antivirus Internet of Things Bandwidth Encryption Information Technology IBM Mobile Device Money Office 365 Maintenance Recovery Update Phone System Employer-Employee Relationship Cost Management Data Backup Help Desk SaaS Computers Customer Service Travel Education It Management Hard Drive Networking Save Time Document Management Administration Running Cable Saving Time Law Enforcement Government Data storage Risk Management Legal Proactive IT Humor Two-factor Authentication Hosted Solution VPN Twitter Wireless Robot Avoiding Downtime Website Current Events iPhone Black Market Business Intelligence Excel Mobility Hacking Business Growth Windows 10 Telephone Systems Computer Repair Training User Disaster End of Support Intranet DDoS Securty Data Recovery Solid State Drive Word Flexibility Digital Payment Cortana Password Hacker Comparison Fax Server Project Management PowerPoint Tablet Social Networking Computing Virtual Desktop Text Messaging Distributed Denial of Service Documents Programming Public Cloud IT service Heating/Cooling Compliance Social Engineering Pain Points Computing Infrastructure Net Neutrality Retail eWaste User Error Experience Automobile Scam Telephony Monitors How To Gaming Console Trending Digital YouTube Webcam Settings Unified Communications Start Menu Statistics Taxes Safety Specifications Social Software as a Service Access Control Uninterrupted Power Supply Network Congestion Streaming Media Politics Inbound Marketing Data Security Bitcoin Cybercrime Patch Management Google Maps Co-managed IT Cryptocurrency Chrome Google Docs Laptop Router Cloud Computing Hack Computer Accessories Downtime Customer Relationship Management Lifestyle Processors Office Tips USB Augmented Reality Paperless Office Presentation Mouse Sports Company Culture Emergency Worker Relocation GPS Machine Learning Data Warehousing Identity Theft Computer Care Skype Google Drive Hard Drive Disposal Smart Phones Employer Employee Relationship Notifications Get More Done Teamwork Vulnerability Ebay Licensing Reliable Computing Printer Server 3D Recycling Electricity Windows Server 2008 Botnet Virtual Reality Music Storage Printing PDF Unified Threat Management Upgrades Adminstration Bluetooth Keyboard LiFi Best Available Business Technology Pirating Information Product Reviews WannaCry Windows 7 Computer Malfunction Domains Downloads Read Time Management Fiber-Optic Rental Service Deep Learning Webinar Memory Shortcut Visible Light Communication Content Management Value Upselling Freedom of Information Motion Sickness Wi-Fi Troubleshooting Google Calendar Environment Touchscreen Fraud Tracking Staffing Flash Competition Advertising Knowledge Video Surveillance News Saving ZTime Web Server Google Wallet LinkedIn Business Owner Technology Tips Websites email scam Workers Best Practives Displays Application Archive Tech Terms Debate Access Fake News Microserver Banking Drones Point of Contact Vulnerabilities Samsung File Sharing G Suite Language Permissions Digital Signature Mobile Technology Spyware Microsoft Excel Turn Key Thin CLient Physical Security Business Metrics Entertainment switches Business Cards Tablets Trojan Writing Organize Sync Data Protection Mobile Payment Analytic cache Leadership CCTV Chromebook Messenger In Internet of Things Work/Life Balance Public Speaking Data Loss Device Management Corporate Profile Television Assessment Blockchain Emails Download Entrepreneur IT consulting Redundancy Books Scalability Cleaning online Currency HIPAA Data Breach Business Managemenet VoIP SharePoint Consultation Tip of the week Meetings Microchip Electronic Payment CIO Regulations Windows XP Harddrive Cabling Reading Private Cloud Evernote Administrator IP Address Society Audit Virtual Assistant External Harddrive Supercomputer Hacks Human Resources Micrsooft Productuvuty CrashOverride Piracy Software License 3D Printing Capital

hp supplies medallionLarge2017