CIOAdvisor Apac

  • Home
  • Conference
  • Newsletter
  • Whitepapers
  • News
  • Subscribe
  • About Us
  • Specials

  • Menu
      • Ad Management
      • Application Security Testing
      • Artificial Intelligence
      • Augmented and Virtual Reality
      • Blockchain
      • BPO
      • Cloud
      • Contact Center
      • Data Analytics
      • Digital Marketing
      • Disinfection and Sanitization
      • E-Invoicing
      • Ecommerce
      • Enterprise Mobility
      • Govt Tech
      • HubSpot
      • Human Resource
      • ICT
      • IoT
      • ISP
      • Laser and Photonics
      • Leadership Development
      • Logistics
      • Machine Learning
      • Marketing Technology
      • Mobile Application
      • Parking Management
      • Payment And Card
      • Robotics
      • RPA
      • SDN
      • Telecom
  • BPO
  • Data Analytics
  • Leadership Development
  • Mobile Application
  • Payment And Card
  • Artificial Intelligence
Specials
  • Specials

  • Ad Management
  • Application Security Testing
  • Artificial Intelligence
  • Augmented and Virtual Reality
  • Blockchain
  • BPO
  • Cloud
  • Contact Center
  • Data Analytics
  • Digital Marketing
  • Disinfection and Sanitization
  • E-Invoicing
  • Ecommerce
  • Enterprise Mobility
  • Govt Tech
  • HubSpot
  • Human Resource
  • ICT
  • IoT
  • ISP
  • Laser and Photonics
  • Leadership Development
  • Logistics
  • Machine Learning
  • Marketing Technology
  • Mobile Application
  • Parking Management
  • Payment And Card
  • Robotics
  • RPA
  • SDN
  • Telecom
×
#

CIO Advisor APAC Weekly Brief

Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from CIO Advisor APAC

Subscribe

loading
  • Home
  • News
Editor's Pick (1 - 4 of 8)
left
Artificial Intelligence (AI) Operated Petrochemical Plants

John Boot, CIO, Yutime

IT Strategy in the Age of AI

Kapil Mahajan, CIO, Safexpress

Responsible AI: The Human-Machine Symbiosis

Sal Cucchiara, CIO & Head of Wealth Management Technology, Morgan Stanley

Conquering Technological Transformation

David Kennedy, Group CIO, Transaction Services Group

Where is the Value in AI?

Mansoor Karatela, CIO, Brisbane Airport Corporation

AI: The Next-Frontier in Business

Bora Arslan, Chief Analytics Officer, IAG

Cultivating Fit-For-Purpose AI

Gautam Aggarwal, Senior Vice President, Operations & Technology, Asia Pacific, Mastercard (ASX – DHG)

How AI can Revamp a Business

Matt Kuperholz, Partner and Chief Data Scientist, PwC

right

THANK YOU FOR SUBSCRIBING

Cybersecurity News: AI and ML Suit Up to Fight Threats

By CIOAdvisor Apac | Monday, November 25, 2019
Tweet

FREMONT, CA: Since their conception, Artificial Intelligence (AI) and Machine Learning (ML) have caused a renaissance in how the technology field is viewed and used. The recent surge in the popularity of AI is a direct result of two crucial factors. Firstly, AI/ML algorithms are computationally thorough. Especially with cloud computing, it is feasible to run these algorithms practically anywhere, anytime. Second, training AI/ML models need massive amounts of data. The availability of big data platforms has upped the performance of AI/ML, making them better than humans in iterative applications.

In the field of cybersecurity, a promising area for AI/ML has three fundamental requisites to function. The primary requirement is access to large amounts of data. The next factor is to build an efficient pipeline, which processes the samples constantly and effective design models. The third crucial factor is to seek assistance from security domain experts, for the classification of good and bad for provision of insights.

Defense in depth is the core principle of security. It refers to the possession of multiple layers of security without relying on only one technology. The hype around, which suggests the omnipotence of new AI/ML-powered security endpoints, can be distrusted since it is dependent on the number of layers. For ironclad protection from cyber threats, it is essential to scan all the authentic user accesses and data. In order to scan each file before download, it is necessary to have the capacity to intercept SSL-encrypted networks between the user’s client and the server at the destination.

Once the known-threat intelligence has been conquered with no available verdict, the realm of unknown-threats, also called zero-day threats, is entered. These threats do not possess known or identifiable signatures. To analyze such risks, a procedure called sandboxing is carried out where the user’s file is quarantined, taking several minutes to detect the threat. 

Since users prefer instant gratification, an AI/ML model, which is properly trained, will take up only milliseconds to detect threats. A new variety of attacks borrows exfiltration techniques from historical attacks and utilizes exploit kits. AI/ML models can be trained to identify the polymorphic variants to curb the attacks.  

Check out: Top Artificial Intelligence Solution Companies

tag

Cloud Computing

Cyber Threats

Featured Vendors

  • MVI Technologies: Innovative, Future-proof Financial and Payment Switching
    MVI Technologies: Innovative, Future-proof Financial and Payment Switching
  • Dell Technologies: Transforming the Present for the Future
    Dell Technologies: Transforming the Present for the Future
  • SAP Litmos: Where Learning Innovation is The Name of The Game
    SAP Litmos: Where Learning Innovation is The Name of The Game
  • Unis WDC: High-Performance Intelligent Storage Solutions
    Unis WDC: High-Performance Intelligent Storage Solutions
ON THE DECK

SDN 2020

Top Vendors

Telecom 2020

Top Vendors

Previous Next

Read Also

A Look at Key Machine Learning Developments of 2021

A Look at Key Machine Learning Developments of 2021

3 Essential Skills for Data Analytics

3 Essential Skills for Data Analytics

How Technology Can Be Employed to Empower Leadership

How Technology Can Be Employed to Empower Leadership

PlanetSpark Innovation Centre to Allow Tech Startups Achieve Market Deployment

PlanetSpark Innovation Centre to Allow Tech Startups Achieve Market Deployment

Inflectra Announces Expansion of Its Global Cloud Hosting Infrastructure

Inflectra Announces Expansion of Its Global Cloud Hosting Infrastructure

Applications of Data Science in Banking

Applications of Data Science in Banking

Loading...

I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info

Copyright © 2021 CIO Advisorapac. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy Policy |  Sitemap

follow on linkedinfollow on twitter
This content is copyright protected

However, if you would like to share the information in this article, you may use the link below:

https://www.cioadvisorapac.com/news/cybersecurity-news-ai-and-ml-suit-up-to-fight-threats-nwid-1632.html