NATO - AI Cyber Attacks Are A Critical Threat

Cyber attacks, both on national infrastructures and private companies, have ramped up exponentially and become a focal point since the start of the war in Ukraine and Artificial Intelligence (AI) is playing a massive role in cyber attacks and is proving both a “double-edged sword” and a “huge challenge,” according to NATO. 

“Artificial intelligence allows defenders to scan networks more automatically and fend off attacks rather than doing it manually. But the other way around, of course, it's the same game,” David van Weel, NATO’s Assistant Secretary-General for Emerging Security Challenges, speaking at a recent meeting in Estonia.

This is a pressing issue, since it is NATO's policy that a cyber attack on any of its member states could trigger Article 5, meaning an attack on one member is considered an attack on all of them and could trigger a collective response.

AI can be used to try and break into networks by using credentials and algorithms to crack systems and AI-based tools can be used to better detect and protect against threats. Conversely, cyber criminals can use the technology for more sporadic attacks that are harder to defend against because there are so many of them simultaneously. 

Just how to defend against AI -driven cyber attacks were being tested in Estonia’s capital Tallinn at the CR14 NATO Cyber Range. 

Last month, army commanders from over 30 countries (not all of them NATO members) descended on the cyber range to put their skills to the test on how they would defend their country while working with their allies.

Almost 150 personnel were on-site for the event, double the amount who made the journey in 2021 U.S. Cyber Command and U.S. European Command had over 50 people participating and the U.S. led air command and control in the exercise. Romania led on developing the storyline, the United Kingdom took control on the ground, and Poland was in charge of special operations forces.

The results were a closely guarded secret by NATO officials due to security and intelligence concerns, but it is understood that that no one failed the exercise. 

Euronews:    e-Estonia:     AOL:       Politico:      Flipboard:     Argonne:

You Might Also Read: 

Is Europe Ready For Cyber Warfare?:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

 


Cyber Security Intelligence: Captured Organised & Accessible



 

« Three Steps To Protect Your Organisation From Wiper Malware
Cyber Attack On Lisbon Port  »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Akin Gump Strauss Hauer & Feld

Akin Gump Strauss Hauer & Feld

Akin is a leading global law firm providing innovative legal services and business solutions to individuals and institutions. Practice areas include Cybersecurity, Privacy and Data Protection.

Actiphy

Actiphy

Actiphy provides a tried and proven backup and disaster recovery software solution to ensure business continuity at all times.

Apicrypt

Apicrypt

Apicrypt enables secure communications between health professionals by using strong encryption technologies.

ZyberSafe

ZyberSafe

ZyberSafe is an innovative Danish company specialized within building hardware encryption solutions.

Langner

Langner

Langner is a software and consulting firm specialized in cyber security for critical infrastructure and large-scale manufacturing.

Bureau Veritas

Bureau Veritas

Bureau Veritas are a world leader in Testing, Inspection and Certification. We provide certification and training services in areas including cybersecurity and data protection.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ditno

ditno

ditno uses machine learning to help you build a fully governed and micro-segmented network. Dramatically mitigate risk and prevent lateral movement across your organisation – all from one centralised

Rostelecom

Rostelecom

Rostelecom is Russia’s largest integrated provider of digital services and solutions, covering all market segments including consumer, governmental and private organizations.

comforte AG

comforte AG

comforte AG is a leading provider of data-centric security technology. Organizations worldwide rely on our tokenization and format-preserving encryption capabilities to secure personal, sensitive data

SECUINFRA

SECUINFRA

SECUINFRA has been supporting companies in detecting, analyzing and defending against cyber attacks since 2010.

Conseal Security

Conseal Security

Mobile app security testing done well. Conseal Security are specialists in mobile app penetration testing. Our expert-led security analysis quickly finds security vulnerabilities in your apps.

ThreatNG Security

ThreatNG Security

ThreatNG is redefining external attack surface management (EASM) and digital risk protection with a platform of unmatched breadth, depth, and capabilities in thwarting technical and business threats.

Anchor Technologies Inc (ATI)

Anchor Technologies Inc (ATI)

Anchor provides a full spectrum of cybersecurity services assisting our clients with all aspects of cybersecurity risk planning, identification, management, and monitoring.

SureCloud Cyber Services

SureCloud Cyber Services

Our Cyber Testing capability has been honed since we were founded in 2006 as a disrupter in the penetration testing market.

Kolide

Kolide

Kolide ensures that if a device isn't secure, it can't access your apps.