4IT Blog

4IT has been serving the Miami area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Hackers May Meet Their Match With AI

Hackers May Meet Their Match With AI

There are many organizations in the world that simply can’t have cybercriminals and hackers interfering with their data. One of these organizations, CERN (whose acronym translates to the European Laboratory for Particle Physics) has far too powerful of a computer grid to allow hackers to access it. To keep it safe, CERN has deployed what may be the future of cybersecurity: artificial intelligence.

The use of artificial intelligence in security makes a lot of sense for a few reasons. First and foremost, it gives us a chance of keeping up with the changes that malware undergoes. To combat this, the scientists at CERN have been busy teaching their AI to identify threats on their network and to take appropriate action against them.

This is no easy feat when one considers the resources that CERN requires to operate its Large Hadron Collider and Worldwide LHC Computing Grid. The LHC collects a truly vast amount of data--around 50 petabytes between the beginning of 2017 to June--and shares it across a network of 170 research facilities worldwide, also providing computing resources to these facilities as needed.

This creates a unique challenge to maintaining cybersecurity--how to maintain computing power and storage capabilities while keeping the global network secured.

As a result, CERN is turning to AI and machine learning to allow their security to identify between typical network activity and that of a more malicious nature. While CERN is still testing its new artificial intelligence, there are ways that businesses can leverage similar concepts to help protect their own networks.

As of right now, when we say AI, we’re not talking about machines with human-like qualities you’d see in movies today. CERN isn’t going to be teaching their security AI the concept of love and friendship anytime soon. Instead, it’s actually a very simple tool you probably use every day. Take Google, for example. When you do a Google search, you are getting results that are indexed and categorized without the direct influence of a human operator. Google’s computers crawl the Internet and use machine learning and hundreds of various factors to deliver the search results most relevant to what you need based on a whole slew of conditions.

The benefit of using this form of AI means results are delivered incredibly quickly, and a mind-numbing amount of data can be collated and delivered at the blink of an eye. If Google employed humans to deliver search results, the system would be flawed by human biases, the costs of employing so many people to meet demand, and it would simply be slow to get the results on-demand.

AI empowering security could quickly scan for flaws on a network, run ongoing penetration tests, and constantly patch vulnerabilities. It could work day and night to improve spam and firewall capabilities. AI would have access to a lot of security resources and be able to react much faster, making it harder for hackers to overcome. Although we’re a long way out from seeing something like this fully implemented, we’re already seeing a lot of virtually intelligent systems collating and delivering data, and we can’t wait to see more…

Just as long as we don’t flip the switch on Skynet.

Do you think that AI is a viable resource to keep business networks secure, or is the technology involved potentially too untested to have the reliability that modern enterprises need over time? Leave your thoughts in the comments section below.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 22 January 2018
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

Qr Code

Tag Cloud

security Tip of the Week Technology Cloud Privacy Best Practices Microsoft software Internet Business Computing Hackers Backup Productivity Hosted Solutions Business Management Managed Service Provider Google Malware IT Services Business Efficiency Windows IT Support Disaster Recovery Innovation Business Continuity Hardware Workplace Tips VoIP Mobile Devices User Tips Saving Money Computer Miscellaneous Virtualization Upgrade Windows 10 Mobile Device Management Network Security Data Server Mobile Computing Email Alert communications Save Money Microsoft Office Communication Network Social Media Quick Tips Small Business Smartphone Smartphones Information Technology BYOD Going Green Mobile Office Managed IT Services Outsourced IT Health Android Office Apps Operating System Chrome Application Ransomware Browser Gadgets Productivity Managed IT Cybersecurity Holiday Firewall The Internet of Things Avoiding Downtime Disaster Mobility Tablet WiFi Search Data Recovery Best Practice Data Management Passwords Cybercrime Data Backup Remote Computing Unified Threat Management IT Solutions Telephone Systems Risk Management Spam History BDR Hacking Apple VPN Marketing Vendor Management Facebook Employer-Employee Relationship Budget Hard Drives Saving Time Remote Monitoring Automation User Error Office Tips Collaboration Law Enforcement Wireless Technology Phishing Password Hosted Solution Computers Big Data Content Filtering Recovery Phone System iPhone Money Customer Relationship Management Proactive IT Lithium-ion battery Vulnerability Antivirus Shortcut Social Work/Life Balance Bring Your Own Device Current Events Office 365 Telephony Printer Humor USB Administration Analytics Encryption Wearable Technology Gmail Router Maintenance PowerPoint Government Virus Users SaaS Save Time Intranet Audit Bandwidth HaaS Windows 8 Printer Server Data Protection Laptop Business Intelligence OneNote Education Trending Net Neutrality Social Engineering Point of Sale IT COnsultant Politics Data Security Tech Support Computer Repair Personal Information Private Cloud Outlook Wireless Unsupported Software App Google Drive Cloud Computing Cost Management Internet Exlporer Excel Windows 10 Internet of Things Identity Theft Solid State Drive Sports Travel Flexibility Efficency Update Customer Service Data Storage Redundancy Biometrics Retail Virtual Reality Samsung Network Congestion Wi-Fi Meetings Emergency Artificial Intelligence Display Help Desk Applications Instant Messaging Augmented Reality Emails hacker Paperless Office HIPAA Transportation Entertainment Benefits DDoS Fax Server Computer Accessories Robot Computer Care Battery Workplace Mouse Compliance Streaming Media Automobile Social Networking End of Support Uninterrupted Power Supply IT Support online currency Two-factor Authentication Managing Stress Google Maps Surge Protector Uograde Value Legal Images Commerce Touchpad Mobile Device Television Cameras User Managed Security Regulation 3D Printing Science Scam Software as a Service Virtual Desktop Presentation Best Available Sync Bluetooth ISP IT Technicians Employer Employee Relationship Data Loss iOS Worker Commute Managed IT Service Operating Sysytem Adobe PDF Managed IT Services Wiring SharePoint Files Programming Blogging Google Docs Information Scalability Computer Fan Safety Licensing Debate Text Messaging Teamwork Chromecast Website Microsoft Excel Busines Continuity How To Dark Web Screen Mirroring Networking Upgrades Near Field Communication Administrator OneDrive Training File Sharing IT consulting Cast Colocation Amazon Human Resources Consultant Running Cable Co-managed IT The Blindside Of Windows 10s Access Company Culture systems Nokia Black Market Nanotechnology Reliable Computing Touchscreen IT Security Tablets Lifestyle Hard Disk Drive Ebay Bloatware Cleaning hack Root Cause Analysis Experience HBO Computing Keyboard NFL Avoid Downtime best practices Cortana CrashOverride Music IT Management Branding Distributed Denial of Service Hiring/Firing Word data breach Settings Data storage Legislation WIndows 7 Books WIndows Server 2008 eWaste Storage Smart Technology Windows Ink Inbound Marketing Video Games risk management Hard Drive Twitter Regulations Document Management Data Breach Patch Management Advertising Specifications Updates Sales Domains Managed Service Provder Taxes Conferencing Microsoft Word Webinar Gift Giving Supercomputer Gifts Device Security Electronic Medical Records Buisness IT Budget Devices Webinar Reputation Credit Cards Spyware Mobile IT solutions FAQ Professional Services Charger Shadow IT Relocation Wireless Charging WannaCry Tutorial Evernote Comparison Workers Microblogging Youtube IT service