AI Is The New Weapon In The Cyber Arms Race

Artificial Intelligence (AI) is a rapidly growing field of technology with potentially significant implications for national security with the United States and other nations actively developing AI applications for a range of military functions.

Indeed, AI promises to change the face of future warfare as it becomes absorbed into autonomous weapons systems and being increasingly used to manage military operations. It has already been incorporated into military operations in Iraq and Syria.

Research is underway for AI to be applied in the fields of intelligence collection and analysis, logistics, cyber operations, information operations, command and control, as well as a variety of autonomous vehicles and the US military is already integrating AI systems into combat via an initiative called Project Maven, which has used AI algorithms to identify insurgent targets in Iraq and Syria.

These investments are the early stages of an AI arms race, similar to the nuclear arms race of the 20th century and this type of military escalation poses a threat to all humanity. Nevertheless, the development of military AI is accelerating and right now AI is now being deployed on multiple military applications, mainly to conduct predictive analysis at a scale beyond human means. 

Hackers are continuously devising new techniques, adapting the latest technology innovations including machine learning and artificial intelligence to devise more destructive forms of attack. Indeed, AI promises to become the next major weapon in the cyber arms race. As companies move to the cloud to gain scale and efficiency and integrated new channels and touch points to make it easier for their customers and suppliers to do business with them, they have also created more potential points of entry for cyber attacks.

The trend of allowing employees to bring their own laptops, smartphones and other digital devices to the office or use to work remotely serves to increase the threat surface.

According to the McAfee Labs 2019 Threats Predictions Report, hackers will increasingly turn to AI to help them evade detection and automate their target selection. Companies will have no choice but to begin adopting AI defenses to counter these cyber-criminals. This escalation reflects the sheer volume of data and transactions in modern life. In businesses like financial services and healthcare it is not humanly possible to examine every transaction for anomalies that might signal cyber snooping. 

AI can also be used to continually monitor and allocate levels of access to a network’s multitude of legitimate users. 
Because cyber attackers have stealth on their side, organisations might need dozens of experts to counter only a handful of attackers. AI can help even the odds, scoping out the potential permutations of vulnerabilities. 

Chief Information Officers advise boards on the growing cyber security threats and although AI programs cannot presently replace experienced cyber security professionals, AI technology can make security staff smarter, more vigilant and more responsive.

Organizations like the US Department of Defense and the space agency NASA, as well as governments around the world are implementing AI-based tools to address the cyber threat and many experts believe that AI will have a significant impact on warfare and it will transform how war happens in the future. 

West Point Modern War Inst:        US Congress Research Service:      FutureofLife Inst:    Fortuna's Corner: Gen. John Allen:

You Might Also Read: 

The Emerging Domain Of Cyber War:

 

« Detecting Rogue Mobile Devices
Take Your Network Security One Step Further »

Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

WEBINAR: How To Build A Security Observability Strategy In AWS

WEBINAR: How To Build A Security Observability Strategy In AWS

Thursday, Apr 22, 2021 - Join this webinar to learn how to build a security observability strategy in AWS, covering cloud-native monitoring sources, guardrails, and automation capabilities.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

Datasource Consulting

Datasource Consulting

We are experts in Data Architecture, Data Integration, Data Quality, Master Data Management, Data Governance, Reporting and Analytics, and Program Management.

CloudInsure

CloudInsure

CloudInsure is a Cloud Insurance platform designed to specifically address emerging liabilities within the Cloud environment.

Oracle Cloud Security

Oracle Cloud Security

Oracle’s cloud security solutions enable organizations to implement and manage consistent security policies across the hybrid data center.

Solida Systems

Solida Systems

Solida Systems specialise in designing high end network intrusion detection and prevention devices at low cost for small and medium sized enterprises and data centers.

Pixalate

Pixalate

Pixalate is an omni-channel fraud intelligence company that works with brands and platforms to prevent invalid traffic and improve ad inventory quality.

Swarmnetics

Swarmnetics

Swarmnetics helps customers discover hard-to-find software vulnerabilities by hacking your system before the bad guys do.

IntaPeople

IntaPeople

IntaPeople are IT and engineering recruitment specialists. We have specialist teams for job sectors including Cybersecurity, IT infrastructure and DevOps.

Armenia Startup Academy

Armenia Startup Academy

Armenia Startup Academy is a pre-acceleration program for selected Armenian tech companies and startups in areas including cybersecurity.

Adarma Security

Adarma Security

Adarma are specialists in threat management including SOC design, build & operation.

InferSight

InferSight

InferSight can help you design an architecture that takes into account security, performance, availability, functionality, resiliency and future capacity to avoid technological lock in and limitations