Security News > 2020 > April > Threat detection and the evolution of AI-powered security solutions

Countering cyber-threats is a constant game of cat and mouse and hackers always want to get the maximum reward from the minimum effort, tweaking known attack methods as soon as these are detected by the AI. CTOs therefore need to make sure that the AI system is routinely exercised and fed new data and that the algorithms are trained to understand the new data.
AI is based on heuristics whereas machine learning requires a lot of data and algorithms that must be trained to learn the data and provide insights that will help to make decisions.
Due to the rapid rise of the amount of data out there, and with the growing number of threat businesses now face, AI and machine learning will play an increasingly important role for those that embrace it.
AI will always need that human intelligence to provide the context of the data that it is evaluating and has flagged as potentially malicious.
Know the "Where" and the "What" of your data - Prior to implementing any long-term security strategy, CISOs must first conduct a data sweep.
News URL
http://feedproxy.google.com/~r/HelpNetSecurity/~3/Db9g1XUi2cc/
Related news
- 5 Identity Threat Detection & Response Must-Haves for Super SaaS Security (source)
- Enterprises walk a tightrope between AI innovation and security (source)
- AI agents swarm Microsoft Security Copilot (source)
- How AI agents could undermine computing infrastructure security (source)
- AI-Powered SaaS Security: Keeping Pace with an Expanding Attack Surface (source)
- After Detecting 30B Phishing Attempts, Microsoft Adds Even More AI to Its Security Copilot (source)
- Week in review: Chrome sandbox escape 0-day fixed, Microsoft adds new AI agents to Security Copilot (source)
- Generative AI Is reshaping financial fraud. Can security keep up? (source)
- AI Adoption in the Enterprise: Breaking Through the Security and Compliance Gridlock (source)
- AI Threats Are Evolving Fast — Learn Practical Defense Tactics in this Expert Webinar (source)