SMART Blog

Featured 

Hackers May Meet Their Match With AI

Hackers May Meet Their Match With AI

There are many key organizations in the world that simply can’t afford to have cybercriminals and hackers interfering with their data. One of these organizations, CERN (whose acronym translates to the European Laboratory for Particle Physics), has far too powerful of a computer grid to allow hackers to access it. To keep it safe, CERN has deployed what may be the future of cybersecurity: artificial intelligence.


The use of artificial intelligence in security makes a lot of sense for a few reasons. First and foremost, it provides a chance to keep up with the changes that malware undergoes. To combat this, the scientists at CERN have been busy teaching their AI to identify threats on their network and to take appropriate action against them.

This is no easy feat when one considers the resources that CERN requires to operate its Large Hadron Collider and Worldwide LHC Computing Grid. The LHC collects a truly vast amount of data--around 50 petabytes between the beginning of 2017 to June--and shares it across a network of 170 research facilities worldwide, also providing computing resources to these facilities as needed.

This creates a unique challenge to maintaining cybersecurity--how to maintain computing power and storage capabilities while keeping the global network secured.

As a result, CERN is turning to AI and machine learning to allow their security to understand the difference between typical network activity and that of a more malicious nature. While CERN is still testing its new artificial intelligence, there are ways that businesses can leverage similar concepts to help protect their own networks.

Currently, when we say AI, we’re not talking about machines with human-like qualities you’d see in movies today. CERN isn’t going to be teaching their security AI the concept of love and friendship anytime soon. Instead, it’s actually a very simple tool you probably use every day, like Google, for example. When you do a Google search, you are getting results that are indexed and categorized without the direct influence of a human operator. Google’s computers crawl the Internet and use machine learning and hundreds of various factors to deliver the search results most relevant to what you need based on a whole slew of conditions.

The benefit of using this form of AI means results are delivered incredibly quickly, and a mind-numbing amount of data can be collated and delivered at the blink of an eye. If Google employed humans to deliver search results, the system would be flawed by human biases, the costs of employing so many people to meet demand, and a slowing down of a process that needs to get results on-demand.

AI empowering security could quickly scan for flaws on a network, run ongoing penetration tests, and constantly patch vulnerabilities. It could work day and night to improve spam and firewall capabilities. AI would have access to a lot of security resources and be able to react much faster, making it harder for hackers to overcome. Although we’re a long way out from seeing something like this fully implemented, we’re already seeing a lot of virtual intelligent systems collating and delivering data, and we look forward to seeing more.

Do you think that AI is a viable resource to keep business networks secure, or is the technology involved potentially too untested to have the reliability that modern enterprises need over time?

Let Smart Services position your agency for tomorrow’s technological challenges. For more than 25 years, Smart Services has helped agencies across the U.S. face a changing environment by providing innovative technology solutions that allow agencies to focus on growing their business. MyAgency Cloud, our complete cloud solution, covers all your technology needs in the cloud or at your agency. In today’s competitive environment, it’s time to make your agency technology a strategic asset, instead of a liability. Let us show you how. To learn more, please call our expert agency technology advisor at 586-258-0650.

 

Do Your Employees Shop Online While at Work?
Could Your Business Use a New Telephone System?
 

Comments

No comments made yet. Be the first to submit a comment
Guest
Already Registered? Login Here
Guest
Tuesday, March 26 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Fax Server Shortcut Cortana Facebook Keyboard Mobile Security Redundancy Distributed Denial of Service Back Up Server Project Management Kleinschmidt Insurance Memory Science VPN Co-managed IT Small Business Gmail Battery Managed IT Services Printing Hard Drives Computer Forensics IT Budget Phishing Content Filtering Wireless Charging Display IT Technicians Smartphone Camera Microsoft Wasting Money Apple spam Device Security Conferencing Students Google Google Assistant Data Storage GLAD Office Tips Telephone Payroll Extreme Technology Makeover Charger Accessory User Error Business Computing Meetings Personal Information Customer Service Encryption Doug Vanni Cloud Computing Avoid Downtime Bryant Caudill IT Consultant Storage Windows video Hetrick and Associates Machine Learning Compliance Backup and Disaster Recovery Data Collaboration Health Webinar Entertainment Microsoft Excel Microsoft Outlook holidays Sports BYOD Mobile Windows 10 Ciminal Legislation Data Recovery Workplace Tips Network Security Vendor Regulations Teamwork Current Events Tablets Microsoft Office 2010 Streaming Media Office Language Training Update Efficiency User Ransomware Saving Time Specifications Virus 3D Printing WiFi Hosted Solution Hyperlink Business Management Running Cable Laptop Backkup Operating Sysytem Computer Accessories Black Market Television Tech Support Reputation Evernote Emails Root Cause Analysis Wireless Internet Customer Relationship Management Mobile Devices End of Support Computer repair Apps Budget Cybersecurity Education Android Network Congestion iPhone Screen Mirroring Travel Applied TAM How To Outlook Information Technology Bring Your Own Device Net Neutrality Downtime Content Filter Files iPad Advertising Data Loss Disaster Recovery Consultant IIAI Books Application Disaster IT Service Electronic Medical Records Managed IT Service Mouse Printer Government Innovation Tech Term IT solutions Technology Social Networking HIPAA Alexa for Business BDR Utility Computing data backups IT Solutions Search Thank You Social App VoIP email encryption Document Management Media Consumption DocStar Identity Applications Vulnerability Gift Giving lunch and learn Password Business Continuity Windows 7 Workers Web Design Remote Workers Managed Service Computers Private Cloud Holiday Artificial Intelligence Jessica Stevenson Cloud Printer Server Windows 10s WIndows 7 Cleaning Analytics Data Security malware App store Text Messaging Unified Communications Peripheral Youtube Antivirus Augmented Reality Mobile Device Management Instant Messaging PowerPoint Proactive Monitoring webinar Fun Comparison Admin Upgrades Big Data Gifts Tutorial Email Taxes social media Mobile Computing HBO SMART Services Professional Services Programming SMARTweb Defense Twitter Keyboard Shortcuts agency automation Law Enforcement Employee-Employer Relationship Business Intelligence Audit Wi-Fi Computer Care PDF Testing Hosted Solutions ebay Business Technology Mobile Device Microsoft Word Microsoft Outlook 2007 Administrator Security Video Surveillance Devices Productivity Nanotechnology Privacy Best Practices Google Docs Best Available Productivity hackers Miscellaneous Internet Exlporer Mobile Office Paperless Office robot Wireless Technology Data Privacy Windows 10 Prodcutivity Medical IT Employee Touchscreen Hiring/Firing Quick Tips Software Microsoft Office Hacking Scott White Cybercrime Automobile OneNote Smart Technology Retail Managed Service Provider HaaS Computing website Managed IT Data Protection Congratulations Scam Networking Experience Backup Worker Commute Hard Disk Drive Cameras Save Money Printers Payment Cards Managed IT Services Virtual Private Network Safety Updates Employer-Employee Relationship Internet of Things Value Cast Smart Tech Computer Fan Fraud Licensing Jerry Fetty Save Time OneDrive Phone System Work Station Cost Management Commerce Branding Financial Technology Chromebook Computer Mobility Uninterrupted Power Supply Colocation Credit Cards Telephone Systems IT consulting Emergency MSP Phishing Scam IT Management Marketing Unified Threat Management Going Green Users Tip of the Week Bluetooth Legal SharePoint Point of Sale USB Work/Life Balance Data Theft Nokia Domains Alert Blockchain Help Desk Company Culture Steve Anderson Remote Monitoring Blogging Dark Web Remote Computing Microsoft Windows 7 Surge Protector Lifestyle Management Google Maps History eWaste Flexibility Employer Employee Relationship insurance IT Support Video Games Websites Bandwidth Avoiding Downtime Best Practice Analysis hacker CrashOverride DDoS ISP Virtualization Amazon Hard Drive Scalability Firewall Google Drive Co-Managed Services Wasting Time Browser Humor Smartphones Access Supercomputer Identity Theft In the News Bloatware Chevy HHR Gadgets Passwords Office 365 Financial Intranet Take Your Agency to the Next Level HITECH Act Virtual Desktop Connectivity Internet Data Management Near Field Communication Virtual Assistant Transportation Data Breach Buisness Images Virtual Reality Shadow IT MAIA Presentation Online Currency Gamification The Internet of Things SMB Spyware Money Settings Human Resources User Tips Network Lithium-ion battery Politics Operating System IT Services Information Wireless Edge Administration Unsupported Software Samsung Excel WannaCry Mircrosoft Proactive IT MySalesResults Vendor Management Touchpad communications Hardware Telephony Ubuntu Hybrid Cloud Software as a Service WPA3 Word Adobe Patch Management Security Cameras Saving Money Wiring Chromecast press release Projects Access Control SaaS Wayne Joubert Solid State Drive Managing Stress FAQ Wearable Technology Biometrics Router Tech Tip File Sharing Trending Sales IT Support File Storage Social Engineering Risk Management Regulation Windows 8 E-Commerce Sync Inbound Marketing Communication IoT Reliable Computing iOS NFL Benefits Chrome Business Debate automation Windows Ink Upgrade Recovery Maintenance Data Backup WIndows Server 2008 Tablet Break/Fix Outsourced IT Microblogging Identities Two-factor Authentication Music

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *