Cybersecurity Firms Deploy AI Against Hackers

Cyber security companies are turning to artificial intelligence and machine learning tools to ward off growing number of attacks on networks, says Finland-based internet security firm F-Secure.

As the world is fast moving towards Internet of Things and connected devices, deployment of Artificial Intelligence (AI) has become inevitable for cyber security firms to analyse huge amount of data to save networks from infiltration attempts, says F-Secure's Security Advisor Sean Sullivan. Networks are persistently exposed to threats like malware, phishing, password breaches and denial of service attacks. 

On a daily basis, F-Secure Labs on an average receives sample data of 500,000 files from its customers that include 10,000 malware variants and 60,000 malicious URLs for analysis and protection, Sullivan said.  

For humans, it is a big task to go through such huge amount of data and machine learning tools and AI are lending a helping hand at this stage. Machine learning can be used to train logic designed to detect suspiciousness based on the structure of a file or its behaviour or both, another Security Advisor Andy Patel said.

Sullivan said any abnormal behaviour of a file is flagged by AI which helps in detecting threats at an early stage without much damage being done to the network. 
 
Patel claimed behaviour models enable them to take preemptive steps to save their customers from ransomware attacks like 'Locky'. When asked if machine tools and AI can make people's jobs in cyber security redundant, Patel said it is unlikely as attacks through malwares are designed by humans who think creatively to bypass automated security solutions. 

So, there is need of humans who can think creatively to defend network from such attacks.

AI and machine learning are at an evolving stage and there is a long way to go for widespread adoption of such tools in cyber security as only big players at present can afford building such systems and improving them every day.

NDTV

You Might Also Read:

AI Attacks Are Just Around The Corner:

AI Might Be The Ultimate Answer To Cyber Threats:

A Response Solution to Cyber Attacks:
 

« US States Turning To Insurance
Staff Training Is Important But Does Not Reduce Cyber Risk »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Armor

Armor

Armor provide managed cloud security solutions for public, private, hybrid or on-premise cloud environments.

Casaba Security

Casaba Security

Casaba are specialists in software security providing managed Software Development Lifecycle services as well as products for security testing.

CybSafe

CybSafe

CybSafe is a cloud-based platform focussed on addressing the human component of cyber security - an intelligent approach to awareness training.

IDnext

IDnext

IDnext is the open and independent platform to support innovative approaches in the world of the Digital identity.

i-Sprint Innovations

i-Sprint Innovations

i-Sprint is a leader in Securing Identity and Transactions in the Cyber World for industries that are security sensitive.

Veracity Industrial Networks

Veracity Industrial Networks

Veracity provides an innovative industrial network platform that improves the reliability, efficiency, and security of industrial networks and devices.

Charterhouse Müller UK

Charterhouse Müller UK

Charterhouse Müller UK are a leading service provider for end of life IT services including data erasure and secure IT asset disposal.

Cyberspace Solarium Commission (CSC)

Cyberspace Solarium Commission (CSC)

The Cyberspace Solarium Commission was established to develop a consensus on a strategic approach to defending the United States in cyberspace against cyber attacks of significant consequences.

Loki Labs

Loki Labs

Loki Labs provides expert cyber security solutions and services, including vulnerability assessments & penetration testing, emergency incident response, and managed security.

Cyber Protection Group (CPG)

Cyber Protection Group (CPG)

Cyber protection Group specialize in Penetration Testing. We work with enterprise level companies as well as small to medium sized businesses.

Astrix Security

Astrix Security

Astrix enables security teams to instantly see through the fog of connects and detect redundant, misconfigured and malicious third-party exposure to their critical systems.

DruvStar

DruvStar

DruvStar provides B2B cybersecurity around threat management to strengthen businesses across attack vectors.

Cool Waters Cyber

Cool Waters Cyber

Cool Waters Cyber manage cyber security governance, risk and compliance.

Cythera

Cythera

Cythera is an Australian cyber security company with in-house cyber security professionals providing world-class cyber protection to medium to large companies all over Australia.

Arms Cyber

Arms Cyber

Arms Cyber is redefining ransomware defense with advanced solutions that stop attacks before they start.

Spectrotel

Spectrotel

Spectrotel, a trusted provider of Managed Network Solutions, elevates your network with solutions built on cutting-edge technologies.