page contents

Foresee 2020! Interpretation of 9 trends in artificial intelligence security

预见2020!人工智能安全9大趋势解读

[Netease Intelligence News Dec. 11th] Cybersecurity in 2020 is at a turning point. Advances in artificial intelligence and machine learning are helping advance technological advancements in cybersecurity, and real-time data and analytics are making it possible to build stronger business cases. Cybersecurity spending was rarely linked to revenue growth or cost reduction in the past, however, this situation will change in 2020.

What predictions do leading cybersecurity experts make for 2020?

Capgemini Consulting contacted five experts: Nicko van Someren (CTO of Absolute Software), Dr. Torsten George (Centrify Cyber Security Evangelist), Craig Sanderson (Vice President of Infoblox Security Products), Josh Johnston (Director of AI, Kount), And Brian Foster (Senior Vice President, Product Management, MobileIron), who shared in-depth and unique insights on how AI and machine learning can improve network security in 2020.

Provide larger endpoints to achieve an exponential increase in network security

Artificial intelligence and machine learning will continue to promote the development of asset management, and by providing greater endpoint flexibility, asset management will achieve an exponential improvement in network security.

According to Nicko Van Someren, "Keeping machines up to date, knowing what devices are needed on the network, and knowing what processes are running and what is consuming network bandwidth, these tasks involving network management are actually a secure result. I don't think these are different Activities, instead, I see them as multiple aspects of the same issue. As more businesses choose more flexibility to ensure endpoint security, this trend will accelerate in 2020. "

Use different data sets to improve prediction and response

AI tools will continue to improve to take advantage of a variety of different types of data sets, allowing a “bigger picture” to be streamed with statically configured data, historical local logs, global threat landscapes, and simultaneous events.

Nicko van Someren said, "Corporate executives will focus their budgets and time on using artificial intelligence to detect cyber threats. As technology matures, so will forecasting and response effects."

Analyze defense mechanisms to customize attacks for specific weak areas

Cybersecurity threat actors will make more use of artificial intelligence to analyze defense mechanisms, simulate behavioral patterns to bypass security controls, and use analytics and machine learning for hacking.

Torsten George believes that "cyber threats (many of which are state-funded) will increase the use of artificial intelligence algorithms to analyze each other's defense mechanisms and tailor attacks to specific weak areas."

Determine Threat Scope Use Big Data Solutions

Given the serious shortage of security operations resources and most organizations are trying to process large amounts of data, AI / ML capabilities will be used to automate security operations processes.

Craig Sanderson believes that "AI and machine learning will be widely used to detect new threats and determine the scope and severity of threats. As security operations become a big data problem, it requires big data solutions."

Fighting supply chain corruption

By 2020, we will need to fight machine learning more to fight supply chain corruption.

According to Sean Tierney, "The main problem in the remote collaboration space is determining who can access what data. Artificial intelligence applications will become more common in traditional business processes, such as identifying whether the supply chain has been disrupted."

Strengthen account management Establish special relationships for account holders

Artificial intelligence will become more common in account management.

According to Josh Johnston, "Consumers will realize that passwords do not provide adequate account protection, and that every account they own is vulnerable. The verification code is also unreliable because it can only identify the machine, but it cannot confirm the attempt. The person who logged in is the owner of the account. Artificial intelligence will be the key to protecting the entire process of user accounts from creation, transfer to payment transactions. In addition, artificial intelligence will also allow businesses to establish a relationship with their account holders, and Relationships are not only protected by passwords. "

Controlling data sharing and preventing privacy breaches

By 2020, consumers will have better control over their data sharing and privacy.

Brian Foster noted that in the past few years, we have witnessed some of the largest privacy and data breaches. As a result of the boycott, tech giants such as Apple, Google, Facebook and Amazon have stepped up their privacy controls to win customer trust. Today, the situation has turned to a situation that is conducive to consumers, and companies must put privacy first in order to continue operations. Going forward, consumers will have their own data, which means they will be able to selectively share data with third parties, but most importantly, they will retrieve the data after sharing, which is different from the situation in the past few years.

Fighting AI's early completion loopholes

As cybersecurity threats evolve, we will fight AI.

Brian Foster points out that the most successful cyber attacks are performed by highly specialized criminal networks that use AI and ML to access user valuable business systems and data using user behavior or security breaches. All of this makes it difficult for IT security organizations to keep up-not to mention staying ahead. Although the attacker only needs to find one vulnerability in the security of the enterprise, the enterprise must patch all the holes in advance. At the speed of artificial intelligence, it is difficult for humans to compete with it.

Stop damaged hardware, expand hardware supply chain attack vectors

Artificial intelligence and machine learning will prevent damaged hardware from entering the supply chain. As the market demand for more and cheaper chips continues to expand, the carrier of hardware supply chain attacks is also expanding, and parts and accessories have promoted the vigorous development of hardware counterfeiters and imitators. This expansion may provide greater opportunities for compromise for nation states and cybercriminal threat actors.

Capgemini predicts that 63% of organizations plan to deploy AI to improve network security by 2020, with the most popular application being network security. Capgemini found that by 2019, nearly one in five organizations is using AI to improve cybersecurity. In addition to network security, data security, endpoint security, and identity and access management are the top priority use cases for enterprises today to improve network security through AI.


(Selected from: Forbes Author: Capgemini compilation: NEW YORK intelligent participation: nariiy)

Source: Netease Intelligence, translated by Google Translate

Statement: this information is reprinted from authoritative news media. Reprinted for the purpose of transmitting more information and academic exchange, it is not used for commercial purposes, and does not mean to agree with its views or confirm its description. The content of this article is for reference only. If you violate the rights and interests of a third party, please contact us and we will deal with it as soon as possible. 

推荐

  • QQ空间

  • 新浪微博

  • 人人网

  • 豆瓣

取消
技术支持: 机器人行业建站
  • Home
  • 手机
  • 地址
  • QQ