KT Connections Blog

KT Connections has been serving the Rapid City area since 1997, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Leveraging AI Might Be What Stops Hackers

Leveraging AI Might Be What Stops Hackers

There are times that hackers can’t interfere with data, and then there are times that hackers really can’t interfere with data. CERN, the Conseil Européen pour la Recherche Nucléaire (European Council for Nuclear Research) maintains far too powerful of a computer grid to risk it falling into the control of hackers. To protect it, CERN leverages the cutting edge of security to protect its European Laboratory for Particle Physics: artificial intelligence.

There are a few reasons that using AI as a part of security is a solid strategy. First, it gives users a fighting chance to stay abreast of the changes that malware makes. As a means of fighting threats, the scientists at the European Laboratory for Particle Physics are teaching their AI to identify, extract, and eliminate threats on the network.

This is saying something, especially considering the resources needed to operate CERN’s famous Large Hadron Collider and Worldwide LHC Computing Grid. The LHC collected around 50 petabytes of data between January and June of 2017--and all of the data it collects is shared to a network of 170 research facilities across the globe. These facilities can even be supported by the vast computing resources within this network as needed.

This setup provides a few challenges for those responsible for maintaining CERN’s cybersecurity. First, maintaining computing power and data storage capabilities, while second, securing their global network against threats.

To accomplish this, CERN has turned to AI and machine learning so their security systems can differentiate between usual network activity and activity from a malicious source. Their AI is still being tested, but that doesn’t mean that there aren’t similar solutions that you can’t leverage to protect your business.

To clarify, we aren’t talking about sentient androids with human qualities and behaviors as one would see in a movie. CERN’s security AI probably isn’t going to find itself feeling unrequited love for a break room toaster. Rather, we’re discussing a tool that is much more accessible than you might initially realize. For instance, Google. Each time you press ‘Enter’ to run a search, the results are compiled, indexed, and categorized without the immediate involvement of a human being. Through machine learning and hundreds of other factors, Google can draw the most relevant results it can for you, specifically.

This allows search results to be delivered faster than the eye can blink, and millions of results to be balanced and compiled just as quickly. Imagine the difference we would see if human beings delivered search results: biases would influence the results, Google would be bankrupted by the staffing costs, and the speed of return would slow to a crawl.

AI’s capabilities are also extremely well-suited for security needs, as it can tirelessly run penetration tests, patch vulnerabilities, and scan for flaws. Improving defenses, like spam blockers and firewalls, can continue at all hours without the human need for a break. With the ability to draw upon and utilize security resources at inhuman speeds, hackers and other malicious actors will have a much harder time.

While true AI is still in the realm of science fiction, we’re getting much closer to making it fact.

What do you think? Is AI the way we will secure a business’ network in the near future? Sound off in the comments section with your thoughts!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 23 January 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Privacy hackers Technology Email malware Cloud Internet Business Computing Network Security Google software User Tips Business Ransomware Efficiency Backup Data Small Business Mobile Device Management IT Support IT Support Microsoft Computer Android Smartphone Windows Hosted Solutions Productivity Network Gmail Managed IT Services Money cybersecurity Mobile Devices VoIP Facebook Hardware Phishing Data Security IT Management Microsoft Office communications Windows 10 Data Management Internet of Things Operating System Business Continuity Cloud Computing Alert Artificial Intelligence Bandwidth Update Managed IT Services Robot Smartphones Outlook Outsourced IT Unified Communications Social Media IT Services Hard Drive Cost Management Data storage Passwords Communication Upgrade Nextiva BDR security cameras Business Management Disaster Recovery Encryption Networking Antivirus End of Support data breach vulnerability Office 365 Apple The Internet of Things Innovation Word Apps Patch Management Event Marketing Law Enforcement Local Buzz Gadgets BYOD botnet South Dakota Project Management WiFi Analytics YouTube Automation vulnerabilities Collaboration Best Practice IoT Holiday security solutions Server Remote Monitoring Social Engineering Google Wallet Spam Firewall Google Docs Customer Service Legal Search Productivity IBM Browser Google Maps Scam Windows 10 Information Security Save Money Lunch and Learn Data Recovery SaaS Saving Money Bitcoin Document Management Information Technology Drones Start Menu Cryptocurrency History Politics News Hacking Data Backup Digital Events App Access Control Big Data Data Protection Websites Webcam Penetration Testing Specifications Tip of the week Writing Access botnet attack Government camera LastPass Microsoft Bookings Social Corporate Profile Programming Software as a Service Phishing Scams Budget communication device Remote Computing Television Virtual Assistant Redundancy Education Black Market Worker Spyware Rebrand Virtual Reality macbook booking process Audit Cloud Backup Google Drive Experience Hack Rapid City Virus File Sharing IT Consultation business owner Mouse Mobile Device Retail Web Servers DDoS attacks Applications Local Technology Memory Event Maintenance Virtual Machines Telephony Sports IoT Devices Law IT Workers IT Assessment Solid State Drive Physical Security communication solutions SharePoint Wireless Technology DDoS Hard Drive Disposal Managed Service Provider LiFi Business Growth Internet 101 Cache Tips and Tricks Sales Tax Virtualization security precautions identity theft Mixer Fortinet Network Congestion Risk Creep VoIP Deep Learning Lawyers Streaming Media Samsung IT Strategy IT Security Society Dell ’s Sonicwall Global Management System email scam Microsoft Office 365 Emergency Visible Light Communication Internet Connected Devices media experience Vendors Business Security IT for Oil Companies Office Laptop IT Solutions Windows XP Tablets Administration Unified Threat Management Freedom of Information Windows 8 Password eWaste Microsoft Office 365 features Business Technology Website Communications How To Mobility information Community Involvement Printing Risk Management Time Management Compliance Vendor Management Tablet Attorneys face Fake News Tech Support Computing Infrastructure Disaster Advertising Phone System Flash Download Downloads Kaseya Unified Threat Management Monitors SOX Managed Services Virtual Desktop enterprise productivity software surveillance cameras Microsoft Excel Printer Cortana Hosted Solution Hardware as a Service Content Filtering Settings healthcare Google Calendar Kaseya Connect Displays Sarbanes-Oxley Act Business Cards Computer Care Trend Micro password manager LastPass AtomBombing Knowledge HaaS Managed IT Distributed Denial of Service Email Security tool Business Communications Workplace Tips Conference Business Comunications End User Testing VPN Proactive IT Running Cable Press Release Chamber of Commerce Fast food Google Play Store Blockchain user confidence Bluetooth appointment Tech Terms Quick Tips Uninterrupted Power Supply Vendor Mangement Comparison Cleaning Office Tips Touchscreen Excel Cybercrime Music Cabling Safety Business Mangement Digital Payment Private Cloud breach methods Miscellaneous Microchip Downtime Books In Internet of Things Motion Sickness Public Cloud Taxes Piracy Telephone Systems Reading Users Machine Learning Paperless Office Hiring/Firing Software License Health Bring Your Own Device Administrator Banking Relocation Hacker 3D Printing base infrastructure CCTV Hacks Phone Systen Automobile security solution IT service Web Server Work/Life Balance Notifications Business Metrics Meetings end-of-support date Ordinary Computers CrashOverride Marketing holiday season Emails Wi-Fi Rental Service collaboration capabilities Chromebook UTM Tracking Flexibility quantum computers holidays Documents Supercomputer Threat management Reliable Computing scammers Text Messaging PDF Twitter IT Consultant Scalability network security professionals Computing Protection scams G Suite Training Computer Malfunction Travel Playbook Language Processors Employer-Employee Relationship Messenger Sync Employer Employee Relationship