SMART Blog

Featured 

Hackers May Meet Their Match With AI

Hackers May Meet Their Match With AI

There are many key organizations in the world that simply can’t afford to have cybercriminals and hackers interfering with their data. One of these organizations, CERN (whose acronym translates to the European Laboratory for Particle Physics), has far too powerful of a computer grid to allow hackers to access it. To keep it safe, CERN has deployed what may be the future of cybersecurity: artificial intelligence.


The use of artificial intelligence in security makes a lot of sense for a few reasons. First and foremost, it provides a chance to keep up with the changes that malware undergoes. To combat this, the scientists at CERN have been busy teaching their AI to identify threats on their network and to take appropriate action against them.

This is no easy feat when one considers the resources that CERN requires to operate its Large Hadron Collider and Worldwide LHC Computing Grid. The LHC collects a truly vast amount of data--around 50 petabytes between the beginning of 2017 to June--and shares it across a network of 170 research facilities worldwide, also providing computing resources to these facilities as needed.

This creates a unique challenge to maintaining cybersecurity--how to maintain computing power and storage capabilities while keeping the global network secured.

As a result, CERN is turning to AI and machine learning to allow their security to understand the difference between typical network activity and that of a more malicious nature. While CERN is still testing its new artificial intelligence, there are ways that businesses can leverage similar concepts to help protect their own networks.

Currently, when we say AI, we’re not talking about machines with human-like qualities you’d see in movies today. CERN isn’t going to be teaching their security AI the concept of love and friendship anytime soon. Instead, it’s actually a very simple tool you probably use every day, like Google, for example. When you do a Google search, you are getting results that are indexed and categorized without the direct influence of a human operator. Google’s computers crawl the Internet and use machine learning and hundreds of various factors to deliver the search results most relevant to what you need based on a whole slew of conditions.

The benefit of using this form of AI means results are delivered incredibly quickly, and a mind-numbing amount of data can be collated and delivered at the blink of an eye. If Google employed humans to deliver search results, the system would be flawed by human biases, the costs of employing so many people to meet demand, and a slowing down of a process that needs to get results on-demand.

AI empowering security could quickly scan for flaws on a network, run ongoing penetration tests, and constantly patch vulnerabilities. It could work day and night to improve spam and firewall capabilities. AI would have access to a lot of security resources and be able to react much faster, making it harder for hackers to overcome. Although we’re a long way out from seeing something like this fully implemented, we’re already seeing a lot of virtual intelligent systems collating and delivering data, and we look forward to seeing more.

Do you think that AI is a viable resource to keep business networks secure, or is the technology involved potentially too untested to have the reliability that modern enterprises need over time?

Let Smart Services position your agency for tomorrow’s technological challenges. For more than 25 years, Smart Services has helped agencies across the U.S. face a changing environment by providing innovative technology solutions that allow agencies to focus on growing their business. MyAgency Cloud, our complete cloud solution, covers all your technology needs in the cloud or at your agency. In today’s competitive environment, it’s time to make your agency technology a strategic asset, instead of a liability. Let us show you how. To learn more, please call our expert agency technology advisor at 586-258-0650.

 

 

Comments

No comments made yet. Be the first to submit a comment
Guest
Already Registered? Login Here
Guest
Saturday, January 19 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Politics Augmented Reality Amazon Updates Take Your Agency to the Next Level Quick Tips Data Windows Solid State Drive Printing Operating System Windows 10 Adobe Gmail Outsourced IT Word website Unsupported Software Content Filter USB Bring Your Own Device Sports Applied TAM Remote Computing Lithium-ion battery Branding Retail Cybersecurity iPhone Saving Money Phone System Specifications Office Excel Managed IT Services Microsoft Upgrade VoIP Mobile VPN Books Business Intelligence Files HITECH Act Root Cause Analysis Miscellaneous Debate Save Time Security Microsoft Office 2010 Network Backup ebay Cybercrime Tech Tip Employer Employee Relationship Advertising SaaS Gamification Co-managed IT Wireless Technology Emergency Intranet Prodcutivity Data Security Internet Exlporer Vendor Management Text Messaging Collaboration Streaming Media Security Cameras Music IT Services Point of Sale Travel User Tips Passwords Antivirus Internet Virtual Private Network Tech Support Avoid Downtime Business Continuity Social Ransomware Wayne Joubert Personal Information Projects Business Computing Private Cloud Operating Sysytem History Cameras Supercomputer Save Money IT Budget Touchpad Battery Unified Threat Management IT Solutions Productivity OneNote Keyboard Work/Life Balance Automobile Data Management Value IT Service Customer Relationship Management Information Technology Managed IT Evernote Teamwork Information Password Webinar Inbound Marketing Peripheral iOS Congratulations Accessory Managing Stress Back Up Flexibility Alert Ubuntu Access Control WannaCry Downtime Data Privacy Hard Drive Hybrid Cloud IT Consultant Virtual Reality Efficiency Credit Cards SMB Scam Vendor IT Support Conferencing Chrome Edge ISP Financial Technology Memory Smartphones Mircrosoft Chromebook HIPAA insurance Disaster Recovery Mobile Computing Project Management OneDrive Office 365 App Virtualization Wearable Technology Blockchain Social Networking Nokia Alexa for Business Computer Care Hardware eWaste Wireless Law Enforcement Mobile Devices Hosted Solution PDF Language Windows 10s Blogging Analysis Video Surveillance 3D Printing IoT Legislation NFL WIndows 7 Cloud Computing Android Domains IIAI communications Commerce Gift Giving Apps Current Events Productivity Microblogging Tablets Access Big Data Printer Distributed Denial of Service Data Storage Students Hard Drives Smart Technology Tip of the Week Wasting Time HaaS Going Green Camera IT Support webinar Business Management Regulations Tutorial SharePoint Business Employee-Employer Relationship Utility Computing Near Field Communication Data Loss Communication Virus Hetrick and Associates Customer Service malware Proactive Employer-Employee Relationship Wireless Internet Redundancy Printer Server Hyperlink Mobile Device Management Analytics User Microsoft Word Computer repair Co-Managed Services robot video Sync Fun hacker Identities social media Workplace Tips Television Cleaning In the News Shortcut Storage Financial lunch and learn Network Congestion Avoiding Downtime Application How To Entertainment Humor Hosted Solutions WiFi Shadow IT data backups Education Dark Web Meetings Instant Messaging Machine Learning Administrator The Internet of Things Networking Worker Commute Business Technology Network Security Fraud Web Design Windows 8 BYOD Audit Doug Vanni Google Science Router Bloatware CrashOverride Google Docs Buisness Taxes Spyware Scott White press release Gifts Windows 10 Outlook agency automation Biometrics SMARTweb Defense Remote Workers Computer Accessories Safety SMART Services IT Technicians File Storage IT solutions Encryption Social Engineering Wasting Money Monitoring Scalability Update Managed IT Services Administration Government Computer Fan Mouse Hard Disk Drive BDR User Error Training Youtube Media Consumption Data Protection Marketing Applications Innovation Wi-Fi MSP Steve Anderson Legal Reputation Google Assistant Bryant Caudill Managed Service Telephone Systems Device Security Tablet Microsoft Office Budget Best Available Payroll Professional Services Cast Regulation email encryption Identity Document Management WPA3 DocStar Reliable Computing Browser Users Windows Ink Microsoft Outlook Chevy HHR Small Business Computer Apple Maintenance Cortana Human Resources Mobile Security Best Practice Thank You Kleinschmidt Insurance Upgrades Phishing Scam Search App store Benefits Connectivity Telephone Online Currency Internet of Things Software Cost Management Risk Management Bluetooth Company Culture Cloud Work Station Hiring/Firing Vulnerability holidays Software as a Service Sales Consultant Nanotechnology spam Compliance Money Telephony Smartphone Trending Licensing Video Games Screen Mirroring Comparison Microsoft Excel hackers Chromecast Experience Computer Forensics Virtual Assistant Paperless Office Patch Management Backkup Office Tips Facebook Laptop Uninterrupted Power Supply Ciminal Management Keyboard Shortcuts Admin Bandwidth Microsoft Windows 7 Holiday Settings Emails Remote Monitoring Transportation Recovery Data Backup Wiring iPad Devices Touchscreen Charger IT consulting Mobile Office Hacking Identity Theft Computing Best Practices Artificial Intelligence End of Support Extreme Technology Makeover Email Help Desk Colocation Surge Protector Websites Google Maps Running Cable Phishing Two-factor Authentication Data Theft Mobile Device Presentation Jessica Stevenson Technology FAQ Images GLAD Workers PowerPoint Jerry Fetty Google Drive Windows 7 Computers Health automation Saving Time Programming Tech Term Disaster DDoS MySalesResults Twitter Lifestyle Content Filtering Proactive IT Display Privacy Smart Tech HBO Printers MAIA Microsoft Outlook 2007 WIndows Server 2008 IT Management Black Market Wireless Charging Mobility Data Recovery Gadgets Server Net Neutrality Data Breach Managed IT Service File Sharing Unified Communications Samsung Managed Service Provider Fax Server Firewall Electronic Medical Records Testing Virtual Desktop

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *