KT Connections Blog

KT Connections has been serving the Rapid City area since 1997, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Leveraging AI Might Be What Stops Hackers

Leveraging AI Might Be What Stops Hackers

There are times that hackers can’t interfere with data, and then there are times that hackers really can’t interfere with data. CERN, the Conseil Européen pour la Recherche Nucléaire (European Council for Nuclear Research) maintains far too powerful of a computer grid to risk it falling into the control of hackers. To protect it, CERN leverages the cutting edge of security to protect its European Laboratory for Particle Physics: artificial intelligence.

There are a few reasons that using AI as a part of security is a solid strategy. First, it gives users a fighting chance to stay abreast of the changes that malware makes. As a means of fighting threats, the scientists at the European Laboratory for Particle Physics are teaching their AI to identify, extract, and eliminate threats on the network.

This is saying something, especially considering the resources needed to operate CERN’s famous Large Hadron Collider and Worldwide LHC Computing Grid. The LHC collected around 50 petabytes of data between January and June of 2017--and all of the data it collects is shared to a network of 170 research facilities across the globe. These facilities can even be supported by the vast computing resources within this network as needed.

This setup provides a few challenges for those responsible for maintaining CERN’s cybersecurity. First, maintaining computing power and data storage capabilities, while second, securing their global network against threats.

To accomplish this, CERN has turned to AI and machine learning so their security systems can differentiate between usual network activity and activity from a malicious source. Their AI is still being tested, but that doesn’t mean that there aren’t similar solutions that you can’t leverage to protect your business.

To clarify, we aren’t talking about sentient androids with human qualities and behaviors as one would see in a movie. CERN’s security AI probably isn’t going to find itself feeling unrequited love for a break room toaster. Rather, we’re discussing a tool that is much more accessible than you might initially realize. For instance, Google. Each time you press ‘Enter’ to run a search, the results are compiled, indexed, and categorized without the immediate involvement of a human being. Through machine learning and hundreds of other factors, Google can draw the most relevant results it can for you, specifically.

This allows search results to be delivered faster than the eye can blink, and millions of results to be balanced and compiled just as quickly. Imagine the difference we would see if human beings delivered search results: biases would influence the results, Google would be bankrupted by the staffing costs, and the speed of return would slow to a crawl.

AI’s capabilities are also extremely well-suited for security needs, as it can tirelessly run penetration tests, patch vulnerabilities, and scan for flaws. Improving defenses, like spam blockers and firewalls, can continue at all hours without the human need for a break. With the ability to draw upon and utilize security resources at inhuman speeds, hackers and other malicious actors will have a much harder time.

While true AI is still in the realm of science fiction, we’re getting much closer to making it fact.

What do you think? Is AI the way we will secure a business’ network in the near future? Sound off in the comments section with your thoughts!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 20 November 2017
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Privacy Technology Email hackers Cloud Internet Business Computing Google malware Network Security software Efficiency Ransomware Business Data User Tips Backup IT Support Microsoft Computer Smartphone Small Business Windows VoIP Hosted Solutions Mobile Device Management Managed IT Services Productivity IT Support Network Android Business Continuity Mobile Devices communications Data Management IT Management Windows 10 cybersecurity Cloud Computing Operating System Money Facebook Hardware Artificial Intelligence Upgrade Phishing Outsourced IT IT Services Nextiva Bandwidth security cameras Disaster Recovery Unified Communications Social Media data breach End of Support Apple Internet of Things Business Management Gmail BDR Passwords Smartphones Microsoft Office Communication Outlook Antivirus Encryption Update Data storage Alert Legal Big Data The Internet of Things Apps Scam Hard Drive Lunch and Learn BYOD security solutions IoT Data Recovery Drones Windows 10 Firewall WiFi History Remote Monitoring YouTube Productivity Customer Service Data Backup IBM Access Control Best Practice vulnerability Search Innovation Google Maps Patch Management Managed IT Services Law Enforcement Robot Spam Start Menu Politics Analytics Browser App Automation Events Save Money SaaS Word Saving Money Document Management Event Marketing Information Technology Local Buzz Server Google Wallet Networking South Dakota Google Docs Hacking Rapid City Event File Sharing Vendor Management Attorneys Applications Disaster Phone System Solid State Drive Web Servers DDoS Virtual Machines Flash Local Technology Downloads Unified Threat Management security precautions IoT Devices enterprise productivity software Mixer Workers Monitors Physical Security Managed Services Tips and Tricks Hosted Solution Hardware as a Service Social Internet 101 Risk Creep Settings Gadgets Sales Tax Google Calendar Collaboration Education Vendors Samsung Displays Internet Connected Devices Knowledge HaaS password manager LastPass Experience IT for Oil Companies Business Communications Workplace Tips Business Comunications How To Proactive IT Press Release Laptop Fast food Community Involvement Tablets VPN Bluetooth Tech Terms Quick Tips Vendor Mangement user confidence Sports face Risk Management Mobility Comparison Office Tips Touchscreen Wireless Technology Music Digital LiFi Tablet Download Safety Business Mangement surveillance cameras Streaming Media Kaseya Specifications Websites Society Content Filtering Penetration Testing Access Visible Light Communication SOX Government healthcare Writing Data Security LastPass Trend Micro Windows XP AtomBombing Kaseya Connect communication device Information Security Software as a Service Windows 8 Managed IT Phishing Scams Redundancy Black Market Spyware Website Sarbanes-Oxley Act Virtual Reality tool Computer Care Audit Google Drive Compliance Google Play Store IT Consultation Conference business owner appointment Email Security Virus Tech Support Project Management Advertising End User Testing Running Cable Retail Chamber of Commerce Memory Maintenance Telephony Uninterrupted Power Supply IT Assessment Virtual Desktop News communication solutions Office 365 Law IT Printer Managed Service Provider Business Growth Webcam Cache vulnerabilities Cabling Data Protection identity theft Fortinet Network Congestion VoIP botnet attack Virtualization camera IT Strategy Cost Management Microsoft Bookings Deep Learning Lawyers Emergency Budget Dell ’s Sonicwall Global Management System Remote Computing Microsoft Office 365 macbook Corporate Profile media experience Business Security Cryptocurrency botnet Hack Administration Programming booking process Office IT Solutions Rebrand Business Technology Communications Password Worker Microsoft Office 365 features Cloud Backup information Printing Time Management Cleaning DDoS attacks Administrator CrashOverride Relocation Paperless Office Wi-Fi Hacker collaboration capabilities base infrastructure Documents Hacks Holiday Automobile security solution Text Messaging CCTV PDF Unified Threat Management Notifications Social Engineering Computing Users Business Metrics IT service Web Server end-of-support date Meetings holiday season Rental Service Language Chromebook Ordinary Computers UTM Flexibility Emails holidays Miscellaneous Cortana Tracking quantum computers Threat management Reliable Computing Supercomputer scammers Twitter Television Distributed Denial of Service Scalability IT Consultant scams Telephone Systems Marketing Mouse network security professionals G Suite Computer Malfunction Travel Health Processors Training Employer-Employee Relationship Banking Messenger Playbook Sync Private Cloud Microchip 3D Printing Employer Employee Relationship In Internet of Things Books Digital Payment breach methods Motion Sickness Phone Systen Reading Work/Life Balance Public Cloud Taxes Machine Learning Hiring/Firing Bring Your Own Device