4IT Blog

4IT has been serving the Miami area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Hackers May Meet Their Match With AI

Hackers May Meet Their Match With AI

There are many organizations in the world that simply can’t have cybercriminals and hackers interfering with their data. One of these organizations, CERN (whose acronym translates to the European Laboratory for Particle Physics) has far too powerful of a computer grid to allow hackers to access it. To keep it safe, CERN has deployed what may be the future of cybersecurity: artificial intelligence.

The use of artificial intelligence in security makes a lot of sense for a few reasons. First and foremost, it gives us a chance of keeping up with the changes that malware undergoes. To combat this, the scientists at CERN have been busy teaching their AI to identify threats on their network and to take appropriate action against them.

This is no easy feat when one considers the resources that CERN requires to operate its Large Hadron Collider and Worldwide LHC Computing Grid. The LHC collects a truly vast amount of data--around 50 petabytes between the beginning of 2017 to June--and shares it across a network of 170 research facilities worldwide, also providing computing resources to these facilities as needed.

This creates a unique challenge to maintaining cybersecurity--how to maintain computing power and storage capabilities while keeping the global network secured.

As a result, CERN is turning to AI and machine learning to allow their security to identify between typical network activity and that of a more malicious nature. While CERN is still testing its new artificial intelligence, there are ways that businesses can leverage similar concepts to help protect their own networks.

As of right now, when we say AI, we’re not talking about machines with human-like qualities you’d see in movies today. CERN isn’t going to be teaching their security AI the concept of love and friendship anytime soon. Instead, it’s actually a very simple tool you probably use every day. Take Google, for example. When you do a Google search, you are getting results that are indexed and categorized without the direct influence of a human operator. Google’s computers crawl the Internet and use machine learning and hundreds of various factors to deliver the search results most relevant to what you need based on a whole slew of conditions.

The benefit of using this form of AI means results are delivered incredibly quickly, and a mind-numbing amount of data can be collated and delivered at the blink of an eye. If Google employed humans to deliver search results, the system would be flawed by human biases, the costs of employing so many people to meet demand, and it would simply be slow to get the results on-demand.

AI empowering security could quickly scan for flaws on a network, run ongoing penetration tests, and constantly patch vulnerabilities. It could work day and night to improve spam and firewall capabilities. AI would have access to a lot of security resources and be able to react much faster, making it harder for hackers to overcome. Although we’re a long way out from seeing something like this fully implemented, we’re already seeing a lot of virtually intelligent systems collating and delivering data, and we can’t wait to see more…

Just as long as we don’t flip the switch on Skynet.

Do you think that AI is a viable resource to keep business networks secure, or is the technology involved potentially too untested to have the reliability that modern enterprises need over time? Leave your thoughts in the comments section below.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, 19 November 2017
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

Qr Code

Tag Cloud

security Tip of the Week Technology Cloud Privacy Best Practices Microsoft software Internet Business Computing Backup Hackers Productivity Hosted Solutions Business Management Managed Service Provider Malware Google IT Services Business Efficiency Windows IT Support Disaster Recovery Innovation Business Continuity Hardware VoIP Workplace Tips User Tips Saving Money Computer Virtualization Upgrade Windows 10 Miscellaneous Mobile Device Management Mobile Devices Data Server Network Security Mobile Computing Alert Email Communication Network Save Money Microsoft Office Quick Tips communications Small Business Smartphone BYOD Going Green Mobile Office Information Technology Social Media Smartphones Android Apps Health Office Application Browser Ransomware Managed IT Services Outsourced IT Gadgets Operating System Chrome Disaster Tablet Productivity Managed IT WiFi Holiday Firewall Avoiding Downtime Mobility IT Solutions Best Practice Data Management Spam BDR Cybercrime Risk Management Search Telephone Systems Cybersecurity The Internet of Things Remote Computing Passwords Unified Threat Management Vendor Management Hard Drives Saving Time Employer-Employee Relationship History Remote Monitoring Budget VPN Automation Apple Facebook Hacking Content Filtering Marketing Data Recovery Proactive IT Phishing Money Password Hosted Solution User Error Computers Data Backup iPhone Customer Relationship Management Collaboration Recovery Phone System Wireless Technology Law Enforcement Office Tips Big Data Bring Your Own Device USB Vulnerability Antivirus Shortcut Analytics Encryption Social Gmail Router Government Humor Administration Wearable Technology Telephony Lithium-ion battery Maintenance PowerPoint Virus Current Events Work/Life Balance Office 365 Printer Politics Personal Information Outlook Business Intelligence Point of Sale IT COnsultant Wireless Unsupported Software App Social Engineering Computer Repair Cost Management Cloud Computing Google Drive Intranet Bandwidth Save Time Printer Server Private Cloud Data Security Laptop Data Protection OneNote Users Education Trending Windows 8 Net Neutrality SaaS Audit HaaS Tech Support Paperless Office hacker Network Congestion Travel Fax Server Transportation Help Desk Update Workplace Customer Service Computer Care Battery Biometrics Robot Streaming Media Retail Virtual Reality Data Storage Automobile Uninterrupted Power Supply Meetings online currency End of Support Instant Messaging Emails Internet Exlporer HIPAA Entertainment Internet of Things Benefits Identity Theft Social Networking DDoS Efficency Computer Accessories Solid State Drive Flexibility Sports Compliance Mouse Two-factor Authentication Samsung Display Wi-Fi Managing Stress Emergency IT Support Excel Artificial Intelligence Applications Windows 10 Augmented Reality Company Culture Regulation Virtual Desktop Black Market Presentation Lifestyle Access Touchscreen Software as a Service Bluetooth Ebay Best Available Debate IT Technicians Computing IT Security Cleaning Sync Data Loss SharePoint Experience iOS Avoid Downtime Keyboard Managed IT Service Adobe Managed IT Services Google Docs Teamwork Music Computer Fan Nokia Busines Continuity Hiring/Firing Licensing Networking Near Field Communication Data storage Microsoft Excel Books Dark Web Twitter Video Games Smart Technology Screen Mirroring Human Resources Document Management IT consulting Surge Protector File Sharing Running Cable Data Breach Television Advertising Legal 3D Printing Cast Mobile Device Windows 10s Reliable Computing Touchpad systems Managed Security Nanotechnology Bloatware Scam ISP Tablets Hard Disk Drive Hard Drive hack Root Cause Analysis Employer Employee Relationship HBO Programming NFL Branding Blogging Worker Commute best practices Operating Sysytem Uograde Images Cortana Distributed Denial of Service CrashOverride PDF Scalability Files IT Management Word Website data breach WIndows 7 Inbound Marketing Legislation eWaste Safety Settings Storage Text Messaging WIndows Server 2008 How To Regulations Chromecast OneDrive Upgrades Windows Ink risk management Value Amazon Training Patch Management Co-managed IT Cameras Administrator Wiring Consultant Google Maps User Colocation Information The Blindside Of Commerce Science Shadow IT Relocation Buisness Tutorial Webinar Mobile IT solutions Professional Services Taxes Gift Giving Youtube Supercomputer Microblogging Electronic Medical Records IT Budget Sales Managed Service Provder IT service Reputation Webinar Comparison Domains Specifications