• Latest
  • Trending
Why AI and Automation Provide Superhuman Security

Why AI and Automation Provide Superhuman Security

December 2, 2021
ATC Ghana supports Girls-In-ICT Program

ATC Ghana supports Girls-In-ICT Program

April 25, 2023
Vice President Dr. Bawumia inaugurates  ICT Hub

Vice President Dr. Bawumia inaugurates ICT Hub

April 2, 2023
Co-Creation Hub’s edtech accelerator puts $15M towards African startups

Co-Creation Hub’s edtech accelerator puts $15M towards African startups

February 20, 2023
Data Leak Hits Thousands of NHS Workers

Data Leak Hits Thousands of NHS Workers

February 20, 2023
EU Cybersecurity Agency Warns Against Chinese APTs

EU Cybersecurity Agency Warns Against Chinese APTs

February 20, 2023
How Your Storage System Will Still Be Viable in 5 Years’ Time?

How Your Storage System Will Still Be Viable in 5 Years’ Time?

February 20, 2023
The Broken Promises From Cybersecurity Vendors

Cloud Infrastructure Used By WIP26 For Espionage Attacks on Telcos

February 20, 2023
Instagram and Facebook to get paid-for verification

Instagram and Facebook to get paid-for verification

February 20, 2023
YouTube CEO Susan Wojcicki steps down after nine years

YouTube CEO Susan Wojcicki steps down after nine years

February 20, 2023
Inaugural AfCFTA Conference on Women and Youth in Trade

Inaugural AfCFTA Conference on Women and Youth in Trade

September 6, 2022
Instagram fined €405m over children’s data privacy

Instagram fined €405m over children’s data privacy

September 6, 2022
8 Most Common Causes of a Data Breach

5.7bn data entries found exposed on Chinese VPN

August 18, 2022
  • Consumer Watch
  • Kids Page
  • Directory
  • Events
  • Reviews
Friday, 11 July, 2025
  • Login
itechnewsonline.com
  • Home
  • Tech
  • Africa Tech
  • InfoSEC
  • Data Science
  • Data Storage
  • Business
  • Opinion
Subscription
Advertise
No Result
View All Result
itechnewsonline.com
No Result
View All Result

Why AI and Automation Provide Superhuman Security

by ITECHNEWS
December 2, 2021
in Opinion
0 0
0
Why AI and Automation Provide Superhuman Security

Every CISO’s worst nightmare is that their organization will become the victim of a cyberattack. Unfortunately, this is a scenario that is becoming increasingly likely every day, as threats actors are ready to exploit new and more sophisticated vectors.

For example, supply-chain-based attacks, such as the SolarWinds SUNBURST attack, are not simple system vulnerabilities. These attacks consist of a complex series of actions in which the initial infection is just the first step and are both more and more commonplace and difficult to prevent. This particular attack swept the globe since the campaign activation in March 2020, targeting the finance, government, healthcare, education and infrastructure verticals alike. Regardless of the industry, there is a worrying shift in the mindsets of security professionals. This has moved from ‘if’ hackers target us to ‘when.’ Today’s organizations understand that they need to assume that they will be compromised.

YOU MAY ALSO LIKE

Making Biometrics Work: 3 Ways To Jumpstart the Process

How to prevent cyberbullying: Keeping students safe

It’s not just the direct threat to an organization’s data that is at stake here. As the threat increases, so does the media’s appetite for reporting on them, with security incidents regularly making mainstream headlines. Now, even if an attack is out of a CISO and their organization’s hands, the general public is nevertheless quick to lay the blame at their door. The cost of a successful data breach is more than just financial: attacks not only pose a threat to the security of data but the reputation of the company as a whole, while breaches inevitably have a knock-on effect on the broader value chain.

Context is Key

There are many questions to be answered to understand the nature of attacks. There are also many questions about how to prevent them. For example, how did the attack occur? Why was it successful? Who is to blame? How can the effects be remediated?

The investigation of a potential incident begins with the entry point — the endpoint that a cybercriminal has used as a gateway to gain access to a network. Legacy endpoint detection response (EDR) tools then try to link an isolated activity to another and another to build a complete picture of the incident as a whole and gain a comprehensive understanding of how far-reaching the breach is.

However, solving the mystery and understanding the context lies amongst a flood of corporate data needing sifting through. Legacy detection and response tools provide a complicated and overwhelming amount of data across a vast range of endpoints. Security teams are becoming overloaded with long incident queues, leaving them with no time to analyze incidents and threats in-depth.

What’s more, incident response teams — unsurprisingly — want to shoot down a virtual missile before it hits its target instead of figuring out what went wrong after it’s happened.

The Role of Automation

It’s become clear that a manual alert triage is no longer enough — it’s nearly impossible to monitor every endpoint manually, and the scale and sophistication of attacks is too much for a strictly human-powered approach. Instead, contextualization of all data points into a single action thread is key to a comprehensive defence against modern threats. For example, successfully resisting a ransomware attack such as SolarWinds requires a solution that can neutralize the full range of threats from various attack vectors. The only way to achieve this is through solutions founded in artificial intelligence and automation.

A Technological Advantage

Threat actors leverage the latest innovations in technique and technology to perpetrate their attacks, and robust enterprise cybersecurity teams need to do the same, fighting fire with fire in order to get one step ahead of attacks and proactively prevent them. It can take just seconds to breach an organization. By leveraging AI, businesses can detect, respond and remediate, all in real-time.

When performing real-time threat modeling, incident correlation and tactics, techniques and procedures (TTP) analysis, AI delivers enriched intelligence around the context of an attack. Custom detection rules can be written that address new or targeted threats, such as those specific to industries or organizations, so that an appropriate response occurs immediately while security professionals nevertheless maintain complete control over the process. In fact, one of the only solutions to protect organizations against SUNBURST variants during the SolarWinds attack leveraged autonomous AI and robust anti-tampering that together delivered complete protection at the point of attack.

Proactive Defense

Using AI and automation makes cybersecurity proactive rather than reactive by automatically detecting threats and blocking unwanted processes, disconnecting an endpoint from the network and even performing a selective rollback of the system to a point before the attack occurs. This helps organizations and SOC analysts prevent attacks before they can occur and remediates the effects of a successful breach. In this way, recovery is enabled as part of the automatic response in addition to purely preventative protection. Plus, such a solution can work without reliance on a cloud connection to detect activity or make decisions. Instead, it can all happen on the endpoint itself, both online and offline.

While there is no such thing as a catch-all in IT security, AI allows organizations to get ahead in cybersecurity’s arms race finally. A human analyst needs years of experience and training to develop the skills necessary to detect and isolate threats. Automating the incident detection and response process is the equivalent of having a digital SOC analyst on every endpoint at all times — something every organization could use in their cyber defense arsenal.

Milad Aslaner Senior Director, SentinelOne

ShareTweetShare
Plugin Install : Subscribe Push Notification need OneSignal plugin to be installed.

Search

No Result
View All Result

Recent News

ATC Ghana supports Girls-In-ICT Program

ATC Ghana supports Girls-In-ICT Program

April 25, 2023
Vice President Dr. Bawumia inaugurates  ICT Hub

Vice President Dr. Bawumia inaugurates ICT Hub

April 2, 2023
Co-Creation Hub’s edtech accelerator puts $15M towards African startups

Co-Creation Hub’s edtech accelerator puts $15M towards African startups

February 20, 2023

About What We Do

itechnewsonline.com

We bring you the best Premium Tech News.

Recent News With Image

ATC Ghana supports Girls-In-ICT Program

ATC Ghana supports Girls-In-ICT Program

April 25, 2023
Vice President Dr. Bawumia inaugurates  ICT Hub

Vice President Dr. Bawumia inaugurates ICT Hub

April 2, 2023

Recent News

  • ATC Ghana supports Girls-In-ICT Program April 25, 2023
  • Vice President Dr. Bawumia inaugurates ICT Hub April 2, 2023
  • Co-Creation Hub’s edtech accelerator puts $15M towards African startups February 20, 2023
  • Data Leak Hits Thousands of NHS Workers February 20, 2023
  • Home
  • InfoSec
  • Opinion
  • Africa Tech
  • Data Storage

© 2021-2022 iTechNewsOnline.Com - Powered by BackUPDataSystems

No Result
View All Result
  • Home
  • Tech
  • Africa Tech
  • InfoSEC
  • Data Science
  • Data Storage
  • Business
  • Opinion

© 2021-2022 iTechNewsOnline.Com - Powered by BackUPDataSystems

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Go to mobile version