• Latest
  • Trending
Creating a Partnership with Your AI Cybersecurity Tools

Creating a Partnership with Your AI Cybersecurity Tools

December 20, 2021
Apple is reportedly testing iPhones with USB-C

Apple is reportedly testing iPhones with USB-C

May 16, 2022
Nintendo Working on Next-Gen Switch Powered by an NVIDIA SoC

Nintendo Working on Next-Gen Switch Powered by an NVIDIA SoC

May 16, 2022
AMD Instinct MI300 Exascale APU Features Zen4 CPU and CDNA3 GPU

AMD Instinct MI300 Exascale APU Features Zen4 CPU and CDNA3 GPU

May 16, 2022
GrAI Matter Labs Unveils sparsity-native AI SoC

GrAI Matter Labs Unveils sparsity-native AI SoC

May 16, 2022
Tecnotree Launches a Transformation Suite for MTN Ghana

Tecnotree Launches a Transformation Suite for MTN Ghana

May 16, 2022
Ghana with Moringa School and Brighter Investment to promote digital skills for jobs

Ghana with Moringa School and Brighter Investment to promote digital skills for jobs

May 16, 2022
SA Obscure Technologies announces strategic alliance with DNSSense

SA Obscure Technologies announces strategic alliance with DNSSense

May 16, 2022
SLVA Cybersecurity to provide crucial new API security solutions

SLVA Cybersecurity to provide crucial new API security solutions

May 16, 2022
Samsung PRO Endurance Up to 256GB microSD Memory Card

Samsung PRO Endurance Up to 256GB microSD Memory Card

May 16, 2022
Apacer AS2280Q4U M.2 PCIe Gen4 x4 NVMe 1.4 for PS5

Apacer AS2280Q4U M.2 PCIe Gen4 x4 NVMe 1.4 for PS5

May 16, 2022
ProGrade Digital SDXC UHS-II V90 512GB U3 Memory Card

ProGrade Digital SDXC UHS-II V90 512GB U3 Memory Card

May 16, 2022
Team Group T-Force Vulcan Z SATA 2.5-Inch With 3D TLC Flash

Team Group T-Force Vulcan Z SATA 2.5-Inch With 3D TLC Flash

May 16, 2022
  • Consumer Watch
  • Kids Page
  • Directory
  • Events
  • Reviews
Monday, 16 May, 2022
  • Login
itechnewsonline.com
  • Home
  • Tech
  • Africa Tech
  • InfoSEC
  • Data Science
  • Data Storage
  • Business
  • Opinion
Subscription
Advertise
No Result
View All Result
itechnewsonline.com
No Result
View All Result

Creating a Partnership with Your AI Cybersecurity Tools

by ITECHNEWS
December 20, 2021
in Data Science, Leading Stories
0 0
0
Creating a Partnership with Your AI Cybersecurity Tools


There are a lot of reasons why humans need AI’s help in cybersecurity. The skills shortage is one. Handling the monotonous tasks that lead to burnout is another. The ability to do the type of deep dives humans can’t is a third.

Yet a lot of people, including those in IT and cybersecurity, remain skeptical of AI’s benefits in cybersecurity. Or maybe they are wary of AI taking jobs away from humans. But the truth is, AI can’t function without human interaction. As a Trustwave blog post pointed out, “Many systems today can use data analytics to detect anomalies in their environment, but they can’t tell you if that anomaly is something good or something bad.”

YOU MAY ALSO LIKE

Apple is reportedly testing iPhones with USB-C

Nintendo Working on Next-Gen Switch Powered by an NVIDIA SoC

Humans and AI have to develop a partnership in order to get the most out of technology.

AI Is Not Out to Replace You

This misconception simply can’t be stressed enough. The robots are not out to replace you; they are there to allow you to do your job better.

“The best analogy for AI and cybersecurity professionals exists between mathematicians and calculators,” said Tim Wade, technical director, CTO Team at Vectra, in an email comment. “Did calculators materially change how math was conducted? Absolutely—for starters, they largely eliminated the need to maintain proficiency with slide rules and log tables. Were (the few) mathematicians associated with creating log tables displaced? Maybe?”

What happened instead is that calculators not only enabled faster calculations but extended the exploration of mathematical concepts to a much wider audience. AI and cybersecurity professionals have a similar relationship, said Wade.

“There is no shortage of tasks for people, and these people will stand on the shoulders of their AI tooling.”

How AI Functions as a Security Tool

Where AI excels is at managing noise, an area that humans struggle with. But at the same time, AI needs human interaction to recognize context and designate problems.

AI assists with cybersecurity in many ways depending on how it is integrated into a company or organization’s systems, explained Cody Michaels, application security consultant at nVisium.

“Weak AI—that is to say, AI that doesn’t do much in the way of thinking—are nothing more than glorified algorithms going through a predefined and static ‘if this, then that’ style of functionality,” said Michaels in an email interview. “Stronger AI will perform actions based on models and variables that can be self-altered depending on the main intent of the system.”

An example of a weak AI is packet monitoring or virus-style scanning based on flagged known threats. Conversely, strong AI both replicates what the weak AI can do as well as builds on it, including tasks such as alerting humans to suspicious behavior on the network/system from a user with valid credentials.

“While many aren’t even aware of this fact, we all actually do have a style of typing in the same way we, let’s say, have a unique style of walking. So, a strong AI would be able to spot and flag the fact that someone who only has a words-per-minute typing speed of 15 is suddenly typing like they’re on an episode of ‘Mr. Robot,’” said Michaels.

The AI/Human Partnership

“Automate the boring stuff,” software developer Al Sweigart once stated. That’s where AI shines, with the boring tasks that must be done but can be mind-numbingly boring for most cybersecurity professionals. (Do you want to read logs all day to find a singular anomaly? Of course not. No one does.) So, working with AI to strengthen your security posture is all about time and resource management, according to Michaels.

“My advice for anyone looking to implement AI in their processes is to start small,” Michaels stated. “For example, think about a handful of tasks that you can document in full beforehand so there will be a low impact if done incorrectly a few times. Once this type of task is being taken care of, you can move on to bigger hurdles because now you’ve got more bandwidth to deal with them.”

Think of AI as the coworker who offers a second look at what you’ve done, to make sure everything is correct and there are no glaring errors that could cause problems.

“Just keep in mind that this is another layer to your security stance,” said Michaels. “AI is a tool like any other, but this particular tool has the promise to grow in effectiveness and return, as you continue to scale and include more data, as well as the time you put into working with it.”

By Security Boulevard

Tags: AIcybersecurityTools
ShareTweetShare

Get real time update about this post categories directly on your device, subscribe now.

Unsubscribe

Search

No Result
View All Result

Recent News

Apple is reportedly testing iPhones with USB-C

Apple is reportedly testing iPhones with USB-C

May 16, 2022
Nintendo Working on Next-Gen Switch Powered by an NVIDIA SoC

Nintendo Working on Next-Gen Switch Powered by an NVIDIA SoC

May 16, 2022
AMD Instinct MI300 Exascale APU Features Zen4 CPU and CDNA3 GPU

AMD Instinct MI300 Exascale APU Features Zen4 CPU and CDNA3 GPU

May 16, 2022

About What We Do

itechnewsonline.com

We bring you the best Premium Tech News.

Recent News With Image

Apple is reportedly testing iPhones with USB-C

Apple is reportedly testing iPhones with USB-C

May 16, 2022
Nintendo Working on Next-Gen Switch Powered by an NVIDIA SoC

Nintendo Working on Next-Gen Switch Powered by an NVIDIA SoC

May 16, 2022

Recent News

  • Apple is reportedly testing iPhones with USB-C May 16, 2022
  • Nintendo Working on Next-Gen Switch Powered by an NVIDIA SoC May 16, 2022
  • AMD Instinct MI300 Exascale APU Features Zen4 CPU and CDNA3 GPU May 16, 2022
  • GrAI Matter Labs Unveils sparsity-native AI SoC May 16, 2022
  • Home
  • InfoSec
  • Opinion
  • Africa Tech
  • Data Storage

© 2021 iTechNewsOnline.Com - Powered by BackUpDataSystems

No Result
View All Result
  • Home
  • Tech
  • Africa Tech
  • InfoSEC
  • Data Science
  • Data Storage
  • Business
  • Opinion

© 2021 iTechNewsOnline.Com - Powered by BackUpDataSystems

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?
Go to mobile version