facebook linkedin twitter

Leveraging AI Might Be What Stops Hackers

Leveraging AI Might Be What Stops Hackers

There are times that hackers can’t interfere with data, and then there are times that hackers really can’t interfere with data. CERN, the Conseil Européen pour la Recherche Nucléaire (European Council for Nuclear Research) maintains far too powerful of a computer grid to risk it falling into the control of hackers. To protect it, CERN leverages the cutting edge of security to protect its European Laboratory for Particle Physics: artificial intelligence.

There are a few reasons that using AI as a part of security is a solid strategy. First, it gives users a fighting chance to stay abreast of the changes that malware makes. As a means of fighting threats, the scientists at the European Laboratory for Particle Physics are teaching their AI to identify, extract, and eliminate threats on the network.

This is saying something, especially considering the resources needed to operate CERN’s famous Large Hadron Collider and Worldwide LHC Computing Grid. The LHC collected around 50 petabytes of data between January and June of 2017--and all of the data it collects is shared to a network of 170 research facilities across the globe. These facilities can even be supported by the vast computing resources within this network as needed.

This setup provides a few challenges for those responsible for maintaining CERN’s cybersecurity. First, maintaining computing power and data storage capabilities, while second, securing their global network against threats.

To accomplish this, CERN has turned to AI and machine learning so their security systems can differentiate between usual network activity and activity from a malicious source. Their AI is still being tested, but that doesn’t mean that there aren’t similar solutions that you can’t leverage to protect your business.

To clarify, we aren’t talking about sentient androids with human qualities and behaviors as one would see in a movie. CERN’s security AI probably isn’t going to find itself feeling unrequited love for a break room toaster. Rather, we’re discussing a tool that is much more accessible than you might initially realize. For instance, Google. Each time you press ‘Enter’ to run a search, the results are compiled, indexed, and categorized without the immediate involvement of a human being. Through machine learning and hundreds of other factors, Google can draw the most relevant results it can for you, specifically.

This allows search results to be delivered faster than the eye can blink, and millions of results to be balanced and compiled just as quickly. Imagine the difference we would see if human beings delivered search results: biases would influence the results, Google would be bankrupted by the staffing costs, and the speed of return would slow to a crawl.

AI’s capabilities are also extremely well-suited for security needs, as it can tirelessly run penetration tests, patch vulnerabilities, and scan for flaws. Improving defenses, like spam blockers and firewalls, can continue at all hours without the human need for a break. With the ability to draw upon and utilize security resources at inhuman speeds, hackers and other malicious actors will have a much harder time.

While true AI is still in the realm of science fiction, we’re getting much closer to making it fact.

What do you think? Is AI the way we will secure a business’ network in the near future? Sound off in the comments section with your thoughts!

Are These 3 Challenges Holding Your Patch Implemen...
Tip of the Week: It’s Easy to Color-Code Your Goog...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, October 23, 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Software Business Computing Hackers Microsoft Managed Service Provider Backup Productivity Workplace Tips Data Hardware Business Saving Money Email Malware Network Security IT Services IT Support Efficiency Hosted Solutions Google Small Business Computer Smartphones User Tips Quick Tips Gadgets Business Continuity Mobile Devices Disaster Recovery Innovation Microsoft Office Mobile Office Virtualization Network Android Social Media Server Mobile Device Management VoIP Miscellaneous Smartphone Collaboration Communication Upgrade Ransomware Windows 10 Data Backup Data Recovery Unified Threat Management Windows Remote Monitoring Passwords Operating System IT Support Tech Term Vendor Management Mobile Computing Productivity Managed IT services BYOD Remote Computing Holiday communications Apps Facebook Cybersecurity WiFi Analytics BDR The Internet of Things Marketing Firewall History Automation Users Apple Outsourced IT Mobile Device Internet of Things Data Management Phishing Alert Managed IT Services IT Consultant Big data App Browser Artificial Intelligence Save Money Bandwidth Spam Bring Your Own Device Antivirus Encryption Gmail Maintenance Office Content Filtering Going Green Health Cost Management Help Desk Office 365 Wireless Technology Managed IT Hiring/Firing Outlook Budget Windows 8 Search Hard Drives Two-factor Authentication Printer Virus Tech Support Cybercrime Lithium-ion Battery Best Practice Information Technology Hacking Phone System Money Document Management Training Business Technology Saving Time Computers VPN Recovery Travel Employer-Employee Relationship Cloud Computing Update IBM Save Time Law Enforcement Access Control Compliance Administration Data storage It Management Proactive IT Customer Service Running Cable Humor Hard Drive Networking Website Legal Government Intranet Education Regulations Windows 10 SaaS Risk Management End of Support Customer Relationship Management Hosted Solution Robot Hacker Business Intelligence Augmented Reality Current Events PowerPoint Digital Payment Securty Machine Learning Downtime Telephone Systems Solid State Drive User Comparison Tablet Fax Server Data Security Flexibility Black Market Company Culture Computer Repair Information File Sharing Social Networking Wireless Patch Management Blockchain Laptop Data Loss Avoiding Downtime DDoS Business Growth iPhone Mobility Twitter Data Breach Social Engineering Paperless Office Word Sports Excel Project Management Applications Computing Password Cortana Disaster Start Menu Tech Terms Download Net Neutrality Private Cloud Chrome Mobile Technology Managed Service User Error Telephony IT service Gaming Console Processors Co-managed IT Software as a Service Conferencing Uninterrupted Power Supply Taxes Router USB Distributed Denial of Service Computer Accessories Webcam Presentation Text Messaging Bluetooth Bitcoin Monitoring Virtual Desktop Lifestyle Data Protection Trending Vendor Specifications Safety Public Cloud Mouse Cryptocurrency Social Documents Management Identity Theft Google Docs Programming Inbound Marketing Heating/Cooling Statistics Entertainment Experience Vulnerabilities Monitors Storage Google Maps Cleaning Network Congestion Scam Office Tips Politics Redundancy Healthcare Virtual Reality Emails Pain Points Automobile Chromebook YouTube Retail Streaming Media Digital Unified Communications Settings eWaste Computing Infrastructure Hack Value Websites How To Piracy Upload Web Server Electronic Medical Records Troubleshooting Data Warehousing Smart Tech Distribution Cabling Video Surveillance Entrepreneur Wi-Fi Administrator Device Management Saving ZTime HIPAA Access HTML Books Workers Permissions Language Environment Emergency Hard Drive Disposal Fiber-Optic Database Content Management Competition Computer Care Mobile Security Supercomputer Business Managemenet Dark Web Electronic Payment Microsoft Excel Telephone System Debate Software License Trends Microchip switches Writing Harddrive Health IT Business Owner Webinar Google Drive Windows Server 2008 Multi-Factor Security Cost Worker Music Fraud Tactics Upgrades online Currency IP Address Spyware Mobile Payment Devices Reading Samsung GPS Vulnerability External Harddrive Application Electricity Printing UTM Content Employer Employee Relationship LiFi Bookmark Human Resources G Suite IT Plan Enterprise Resource Planning Hacks Physical Security LinkedIn Windows 7 Legislation Error Licensing email scam Addiction Banking Botnet Deep Learning Thin CLient cache Television Accountants A.I. Relocation Tablets Work/Life Balance 3D Ebay Archive Smart Phones Digital Signature Best Practives WannaCry Downloads Multi-factor Authentication Visible Light Communication Memory Skype Browsers Sync Teamwork Corporate Profile Migration Connected Devices Notifications CCTV IT consulting User Tip Time Management Freedom of Information Wireless Headphones Telephone Network Management Business Metrics Computer Malfunction Leadership Assessment SharePoint Equifax Fleet Tracking Reliable Computing Point of Contact Adminstration Pirating Information Microserver Google Calendar Device security MSP Advertising Flash Data Analysis PDF Tip of the week In Internet of Things CIO Best Available Keyboard Get More Done VoIP Desktop Finance Windows XP Touchscreen News Nanotechnology Social Network Staffing Google Wallet Knowledge Business Cards Service Level Agreement Motion Sickness Displays Recycling Domains Printer Server Consultation Evernote Startup Asset Tracking Scalability Society Analytic Turn Key Micrsooft Public Speaking Trojan Technology Tips Username Messenger Tracking Product Reviews Virtual Assistant Unified Threat Management Backup and Disaster Recovery Read Shortcut Audit Gamification Rental Service Meetings Upselling Proxy Server Organize Fake News Screen Reader Customer Resource management Drones Productuvuty Managing Stress Regulation 3D Printing CrashOverride Printers Fileless Malware Capital

toner1