Robotic Refactoring the Workplace
Artificial Intelligence regulations and its impact on medical devices
Data as a Business
Minimizing cyber risk through effective governance
How To Find Your Brand's Voice In An Increasingly Tech-Driven World
Dawn Lerman, Ph.D. Professor of Marketing and Executive Director, Center for Positive Marketing, Fordham University and Author of The Language of Branding: Theories, Strategies and Tactics
3 Ways to Integrate AI into Your Business Today
Rick Stanbridge, Executive Vice President And Chief Information Officer Of Marco’s Pizza
The Role Of Ai And Ml In Our Digital Future
Leonard Aukea, Head Of Machine Learning Engineering And Operations, Volvo Cars
Five Key Benefits Of Artificial Intelligence (Ai) In Nutrition...
Jarrod Anderson, Senior Director, Artificial Intelligence, Adm
Thank you for Subscribing to CIO Applications Weekly Brief

The Contribution of Artificial Intelligence to Cyber Defence

Algorithms are the main components of running AI and can be adapted to address complex cyber threats. An algorithm is a collection of step-by-step instructions provided to a computer to perform a specific task.
Fremont, CA: The flow of digital knowledge is expanding on a daily basis, making it increasingly difficult to control, structure and even distinguish what is important from what is superfluous.
Faced with this challenge, new promising breakthrough technologies are being built to push 'data analytics' to the next stage of evolution. Artificial Intelligence (AI), in particular, is expected to become important in many areas. Some types of AI allow machine learning, such as deep learning, to be used to perform predictive analysis. Their security potential is enormous as AI applications are expected to emerge in critical areas such as cyber defense, decision-making systems, risk management, pattern recognition, cyber situation understanding, projection, malware detection, and name-based data correlation.
People have also seen significant technical developments in self-driving cars where an analysis of the external environment is carried out in real-time and AI systems drive cars autonomously under particul
ar circumstances. One of the potential applications of AI in cyber defense might be to make it possible to set up self-configuring networks. This would mean that AI systems could detect vulnerabilities (software bugs) and perform response actions such as self-patching. This opens up new opportunities to improve connectivity and information systems security by offering network stability, mitigation and protection against cyber attacks. Cyber experts believe that the incorporation of the human system is a crucial factor that must be present in the AI cybersecurity system. If one takes into account the high speed needed to conduct any cyber activity, it is evident that only machines are capable of responding efficiently in the early stages of severe cyber attacks. As a result, AI will solve the shortages of conventional cybersecurity resources. It is also an important tool capable of improving the rate of malware detection using the cyber intelligence baseline. AI cybersecurity systems can learn from compromise indicators and may be able to fit the characteristics of small clues even though they are dispersed across the network.
Another critical aspect of developing an AI enabled cybersecurity may be the potential implications of Quantum computing or high processing computers. This data-processing enhancement can increase the efficiency of algorithms. Algorithms are the main components of running AI and can be adapted to address complex cyber threats. An algorithm is a collection of step-by-step instructions provided to a computer to perform a specific task. AI will take this technology to a different level in order to achieve intelligent autonomous algorithms. To highlight these research challenges, Facebook recently abandoned an AI project after 'chatbots' had invented their own language, which humans did not understand.
I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info
Featured Vendors
-
Jason Vogel, Senior Director of Product Strategy & Development, Silver Wealth Technologies
James Brown, CEO, Smart Communications
Deepak Dube, Founder and CEO, Datanomers
Tory Hazard, CEO, Institutional Cash Distributors
Jean Jacques Borno, CFP®, Founder & CEO, 1787fp
-
Andrew Rudd, CEO, Advisor Software
Douglas Jones, Vice President Operations, NETSOL Technologies
Matt McCormick, CEO, AddOn Networks
Jeff Peters, President, and Co-Founder, Focalized Networks
Tom Jordan, VP, Financial Software Solutions, Digital Check Corp
Tracey Dunlap, Chief Experience Officer, Zenmonics