Security News > 2020 > April > Threat detection and the evolution of AI-powered security solutions
Countering cyber-threats is a constant game of cat and mouse and hackers always want to get the maximum reward from the minimum effort, tweaking known attack methods as soon as these are detected by the AI. CTOs therefore need to make sure that the AI system is routinely exercised and fed new data and that the algorithms are trained to understand the new data.
AI is based on heuristics whereas machine learning requires a lot of data and algorithms that must be trained to learn the data and provide insights that will help to make decisions.
Due to the rapid rise of the amount of data out there, and with the growing number of threat businesses now face, AI and machine learning will play an increasingly important role for those that embrace it.
AI will always need that human intelligence to provide the context of the data that it is evaluating and has flagged as potentially malicious.
Know the "Where" and the "What" of your data - Prior to implementing any long-term security strategy, CISOs must first conduct a data sweep.
News URL
http://feedproxy.google.com/~r/HelpNetSecurity/~3/Db9g1XUi2cc/
Related news
- Britain Putin up stronger AI defences to counter growing cyber threats (source)
- Microsoft Fixes AI, Cloud, and ERP Security Flaws; One Exploited in Active Attacks (source)
- MUT-1244 targeting security researchers, red teamers, and threat actors (source)
- Deloitte says cyberattack on Rhode Island benefits portal carries 'major security threat' (source)
- CrowdStrike Survey Highlights Security Challenges in AI Adoption (source)
- Are threat feeds masking your biggest security blind spot? (source)
- Week in review: MUT-1244 targets both security workers and threat actors, Kali Linux 2024.4 released (source)
- The sixth sense of cybersecurity: How AI spots threats before they strike (source)
- Cross-Domain Attacks: A Growing Threat to Modern Security and How to Combat Them (source)
- How AI and deepfakes are redefining social engineering threats (source)