Leveraging AI Might Be What Stops Hackers

Leveraging AI Might Be What Stops Hackers

There are times that hackers can’t interfere with data, and then there are times that hackers really can’t interfere with data. CERN, the Conseil Européen pour la Recherche Nucléaire (European Council for Nuclear Research) maintains far too powerful of a computer grid to risk it falling into the control of hackers. To protect it, CERN leverages the cutting edge of security to protect its European Laboratory for Particle Physics: artificial intelligence.

There are a few reasons that using AI as a part of security is a solid strategy. First, it gives users a fighting chance to stay abreast of the changes that malware makes. As a means of fighting threats, the scientists at the European Laboratory for Particle Physics are teaching their AI to identify, extract, and eliminate threats on the network.

This is saying something, especially considering the resources needed to operate CERN’s famous Large Hadron Collider and Worldwide LHC Computing Grid. The LHC collected around 50 petabytes of data between January and June of 2017--and all of the data it collects is shared to a network of 170 research facilities across the globe. These facilities can even be supported by the vast computing resources within this network as needed.

This setup provides a few challenges for those responsible for maintaining CERN’s cybersecurity. First, maintaining computing power and data storage capabilities, while second, securing their global network against threats.

To accomplish this, CERN has turned to AI and machine learning so their security systems can differentiate between usual network activity and activity from a malicious source. Their AI is still being tested, but that doesn’t mean that there aren’t similar solutions that you can’t leverage to protect your business.

To clarify, we aren’t talking about sentient androids with human qualities and behaviors as one would see in a movie. CERN’s security AI probably isn’t going to find itself feeling unrequited love for a break room toaster. Rather, we’re discussing a tool that is much more accessible than you might initially realize. For instance, Google. Each time you press ‘Enter’ to run a search, the results are compiled, indexed, and categorized without the immediate involvement of a human being. Through machine learning and hundreds of other factors, Google can draw the most relevant results it can for you, specifically.

This allows search results to be delivered faster than the eye can blink, and millions of results to be balanced and compiled just as quickly. Imagine the difference we would see if human beings delivered search results: biases would influence the results, Google would be bankrupted by the staffing costs, and the speed of return would slow to a crawl.

AI’s capabilities are also extremely well-suited for security needs, as it can tirelessly run penetration tests, patch vulnerabilities, and scan for flaws. Improving defenses, like spam blockers and firewalls, can continue at all hours without the human need for a break. With the ability to draw upon and utilize security resources at inhuman speeds, hackers and other malicious actors will have a much harder time.

While true AI is still in the realm of science fiction, we’re getting much closer to making it fact.

What do you think? Is AI the way we will secure a business’ network in the near future? Sound off in the comments section with your thoughts!



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, 20 November 2017

Captcha Image

Request a Free Consultation

  • Company name *
  • First Name *
  • Last Name *
  • Title
  • Phone
  • What are your concerns?

      Sign up for our Newsletter!

      • Company *
      • First Name *
      • Last Name *

          Mobile? Grab this Article!

          QR-Code dieser Seite

          Tag Cloud

          security Tip of the Week technology Cloud Privacy Best Practices Productivity Hackers Business Computing business Microsoft Malware IT Services Internet Backup Hosted Solutions Managed Service Provider IT Support Email Workplace Tips Network Communication Mobile Devices Hardware Computer Disaster Recovery Smartphones Microsoft Office Windows Miscellaneous Business Continuity Mobile Device Management Efficiency Windows 10 Holiday Smartphone Small Business Server Data Saving Money Google Business Management Virtualization Software Alert Upgrade network security WiFi Operating System Ransomware VoIP Social Media BYOD Big Data Internet of Things Passwords User Tips Remote Computing The Internet of Things Vendor Management Office Remote Monitoring Android Browser Apple Innovation Spam Mobile Computing Apps Wireless Technology App Budget Artificial Intelligence Gmail Office Tips Retail Going Green Best Practice Tech Support Data Management Bring Your Own Device Phishing Collaboration Managed IT Services Customer Service Facebook Automation Analytics Business Growth Risk Management Hacker IT Solutions Information Technology Outsourced IT Save Money Computers Managed IT Document Management Gadgets Health Hosted Solution Proactive IT Current Events IT service Avoiding Downtime Data storage Recovery Outlook Application Money Hard Drives Presentation Firewall Hacking Content Filtering IT Consultant Employer-Employee Relationship Running Cable Robot Saving Time Lithium-ion Battery Customer Relationship Management virus Humor Trending Encryption Education Analyitcs Network Congestion Website Wireless Programming Mobile Device Settings Quick Tips Disaster User Virtual Desktop Laptop Administration Antivirus Phone System VPN iPhone Chrome USB Office 365 intranet PowerPoint Work/Life Balance Samsung Google Docs Two-factor Authentication Statistics Update communications Hacks Net Neutrality Password Cybercrime Save Time Law Enforcement Social Maintenance LiFi Cortana Hiring/Firing Tablet Downtime Business Owner Marketing Competition Cost Management End of Support Twitter Cybersecurity Safety Windows 8 Search LinkedIn File Sharing Mouse Patch Management Mobility business owners Environment Undo Monitors Downloads Notifications Solid State Drive Best Available Files Backups Flexibility Word History IT Support People YouTube Online Currency Troubleshooting Writing data breaches Telephone Systems Alt Codes Video Surveillance Websites Legal Specifications Productivity Help Desk Bandwidth Domains Social Engineering Wi-Fi risk Licensing Crowdsourcing Typing Company Culture Botnet today ’s world bdr Windows 8.1 Update Printer Managed Service Providers Public Speaking 5G cyberattack Business Intelligence Piracy Government Cryptocurrency Google Drive experience downtime Halloween Heating/Cooling Printer Server IBM Bitcoin Compliance cyberattacks Users Scary Stories Documents Digital Signature Data loss Travel Regulations Augmented Reality businesses Crowdfunding Private Cloud Paperless Office Sports PDF IT Management Unified Communications Printing Fun Computer Repair Software as a Service Gadget Storage Co-managed IT Google Calendar Excel Router Politics Computing Technology Tips Entrepreneur Public Cloud Dark Data Buisness Refrigeration IP Address Access Control Black Market Deep Learning Telephony Google Wallet Touchscreen Knowledge Mobile Technology security breach CIO Mobile Office project management Debate Training Drones Experience Consumers Mobile Payment Skype Memory Modern technology User Error eWaste Display Data Breach Processors Identities Mobile Data Hard Disk Drive Sync test post Web Server Comparison Supercomputer Mobile Device Managment Cameras Television IT Budget Managed IT Services CCTV Digital Payment Corporate Profile G Suite Virtual Reality Point of Sale Machine Learning Google Maps WannaCry Unified Threat Management SaaS Meetings Relocation Physical Security Software Tips Webcam Data Backup Motion Sickness Chromebook How To GPS Error Personal Information Cloud Computing Cleaning Emoji Upgrades Tracking Cabling Electronic Medical Records Computer Care 3D Printing Identity Theft Infrastructure Automobile Staffing Unsupported Software Uninterrupted Power Supply Administrator Taxes