CEO Jon Cartu Claims - 4 Evolving Technology Areas Of Smart Cybersecurity - Jonathan Cartu Computer Repair Consultant Services
3323
post-template-default,single,single-post,postid-3323,single-format-standard,qode-quick-links-1.0,ajax_fade,page_not_loaded,,qode_grid_1300,footer_responsive_adv,qode-theme-ver-11.2,qode-theme-bridge,wpb-js-composer js-comp-ver-5.2.1,vc_responsive

CEO Jon Cartu Claims – 4 Evolving Technology Areas Of Smart Cybersecurity

4 Evolving Technology Areas Of Smart Cybersecurity

CEO Jon Cartu Claims – 4 Evolving Technology Areas Of Smart Cybersecurity

The surge in digital connectivity and more sophisticated cyber-threats has promulgated the need for smart cybersecurity.  Smart Cybersecurity is a logical reaction to try to manage risk by lessening security gaps often posed by reliance on manual processes that are impacted by a continual cybersecurity skills shortage and the administrative burdens of data security management.

Despite the challenges, there is promise for reducing dependence on humans and bolstering cybersecurity capabilities. A myriad of evolving cognitive technologies can help us enhance cybersecurity and navigate the increasingly malicious and disruptive cyber threat landscape. They include:

•     Artificial Intelligence

•     Machine Learning

•     Automated and Adaptive Networks:

•     Super-Computing

Artificial intelligence (AI):   Gartner describes AI as a “technology that appears to emulate human performance typically by learning, coming to its own conclusions, appearing to understand complex content, engaging in natural dialogs with people, enhancing human cognitive performance or replacing people on execution of non-routine tasks.” Some of the basic activities computers with AI are now be designed for include: Speech recognition; Learning’ Planning; and Problem solving.

Computing systems that employ AI and ML are becoming more pervasive and critical to cyber operations and have become a major focus area of cybersecurity research development and investments in both the public and private sectors. Discovering, categorizing and synthesizing data is surely advantages in mitigating cybersecurity threats. Holistically, AI technologies can be used to help protect against increasingly sophisticated and malicious malware, ransomware, and social engineering attacks. AI is not sentient (yet) but there is likely a future in AI cognitive autonomy in predicting and mitigating cyber-attacks.

Machine Learning:  in basic terms involves getting a computer to act without programming. It often combines with AI and can be thought of as the rapid automation of predictive analytics. Machine learning can provide the fastest way to identify new cyber-attacks, draw statistical inferences, and push that information to endpoint security platforms.

An area where AI and ML can certainly provide an important component for cybersecurity is in threat intelligence. It can be applied to monitor and detect anomalies in the network and identify new threats without known signatures. It can also be utilized to correlate data from silos to understand the nature of attacks and assess network vulnerabilities and risks. AI and machine learning could help on the identity management by cross-checking the veracity of data across multiple fragmented databases.

Automated and Adaptive Networks: Automation allows for horizon scanning and monitoring of networks that can report on deviations and anomalies in real time.  It allows for automatic updating of defense framework layers (network, payload, endpoint, firewalls and anti-virus) and diagnostic and forensics analysis for cybersecurity. Both AI and machine learning can be core components and support applications of automated and adaptive networks.

One of the areas that AI and ML can support is robotic process automation (RPA), a capability that allows automated integration with any IT application or website to perform complex rule-based work (such as clerical processes or transactions).  Also, AI and ML can facilitate Security Orchestration Automation and Response (SOAR) products by integrating orchestration processes, automation, incident management and collaboration, visualization and reporting under a single interface.  SOAR can also provide security operations center (SoC) staff a faster, more accurate way to process large volumes of data produced by cybersecurity systems and help identify and remediate attacks which may be imminent or underway.

Art Coviello, a partner at Rally Ventures and the former chairman of RSA  summaries the value of automation for cybersecurity; “There are too many things happening – too much data, too many attackers, too much of an attack surface to defend – that without those automated capabilities that you get with artificial intelligence and machine learning, you don’t have a prayer of being able to defend yourself,” (

Supercomputing: Seymour Cray is commonly referred to as the “father of supercomputing” and his company, Cray Computing, is still a driving force in the industry. Supercomputers are differentiated from mainframe computers by their vast data storage capacities and expansive computational powers. Super computers are the engines for future automation. The National Academy of Sciences, in its study “The Future of Supercomputing,” envisions investments in supercomputing as highly beneficial and that it plays an essential role in national security and in scientific discovery.

In cybersecurity supercomputing is promising. MIT Lincoln Labs Fellow Jeremy Kepner notes that   “Detecting cyber threats can be greatly enhanced by having an accurate model of normal background network traffic,” and that analysts could compare the internet traffic data they are investigating with these models to bring anomalous behavior to the surface more readily.

This type of capability was demonstrated at a conference sponsored by DARPA, supercomputers sans humans, were exposed to bugs which the computers were able to detect and rapidly repair the threats.

The fallibility of the human factor has been a cybersecurity vulnerability.  It will likely become more so as we become more immersed in digital interconnectivity (i.e. Internet of Things Smart Cities remote work) associated with the realities of a larger cyber-attack surface.

Smart cybersecurity has a promising and large role to play in identifying, filtering, neutralizing and remediating cyber-threats.  By harnessing evolving enterprise tools such as artificial intelligence machine learning, automated and adaptive networks and supercomputing, enterprises will be more readily be able to meet the future challenges.  

Chuck Brooks a globally recognized thought leader and evangelist for Cybersecurity and Emerging Technologies. LinkedIn…

AiroAV

No Comments

Post A Comment