{"id":1121032,"date":"2024-01-14T22:27:01","date_gmt":"2024-01-15T03:27:01","guid":{"rendered":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/uncategorized\/nsa-benefits-of-generative-ai-in-cyber-security-will-outweigh-the-bad-itpro\/"},"modified":"2024-01-14T22:27:01","modified_gmt":"2024-01-15T03:27:01","slug":"nsa-benefits-of-generative-ai-in-cyber-security-will-outweigh-the-bad-itpro","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/nsa-benefits-of-generative-ai-in-cyber-security-will-outweigh-the-bad-itpro\/","title":{"rendered":"NSA: Benefits of generative AI in cyber security will outweigh the bad &#8211; ITPro"},"content":{"rendered":"<p><p>    A senior figure at the NSA has said that     generative AI in cyber security will offer practitioners    marked benefits in combating attacks and cracking down on    global cyber criminal groups.  <\/p>\n<p>    Rob Joyce, director of cyber    security at the US agency, told attendees at an event at    Fordham University in New York that generative is absolutely    making us better at finding malicious activity and outlined    key benefits of the technology for use among security    personnel.  <\/p>\n<p>    Joyce noted that, over the last year, a significant focus on    the     nefarious applications of generative AI have been a key    talking point, particularly their use by cyber criminals.  <\/p>\n<p>    Many threat actors and cyber criminal groups have been    leveraging generative AI tools to turbocharge fraud and    scams, he said.  <\/p>\n<p>    Last year, researchers at Mandiant warned that generative AI    will give threat actors the ability to launch a new wave of        far more powerful and personalized social engineering    attacks.  <\/p>\n<\/p>\n<p>    Mandiant's claims were just one of a number of warnings from    security experts on the matter over the course of 2023.        Research from Darktrace raised concerns about the prospect    of AI-supported phishing    attacks, warning that hackers could use the technology to    fine-tune techniques and dupe users.  <\/p>\n<p>    However, while Joyce said fears over the use of generative AI    in cyber crime were justified, he also made clear the fact that    national security bodies are harnessing these tools to great    effect, and that cyber security experts were getting as much    out of generative AI as criminals.  <\/p>\n<p>    Citing examples and use-cases, Joyce said AI can be used to    combat threat actors who hide on networks posing as safe    accounts through vulnerability exploits.  <\/p>\n<p>    As these sorts of accounts don't behave normally,    AI and    LLMs can be used by cyber security teams to aggregate activity    and identify malicious activity.  <\/p>\n<p>    Joyce warned, however, that generative AI wont represent a    silver bullet for cyber security practitioners.  <\/p>\n<p>    [AI] isnt the super tool that can make someone whos    incompetent actually capable, but its going to make those that    use AI more effective and more dangerous, he said.  <\/p>\n<p>    Speaking to ITPro, Spencer Starkey, VP for EMEA at    SonicWall, echoed Joyce's comments, adding that the use of        AI tools in cyber security will prove vital for    practitioners in the coming years and enable them to stamp out    attacks far more effectively.  <\/p>\n<p>    These technologies are perfect for spotting suspicious    behavior and fending off cutting-edge threats because they can    instantly analyze large volumes of data without requiring human    oversight, he said.  <\/p>\n<p>      RELATED RESOURCE    <\/p>\n<\/p>\n<p>        Discover how you can increase your IT team's        productivity                WATCH NOW      <\/p>\n<p>    Cyber security experts are already using AI and ML to identify    cyber attacks in real-time, which emphasizes the significance    of their work in maintaining a secure online environment, he    added.  <\/p>\n<p>    While AI can sift through records of login activity and IP    addresses to monitor unusual activity, it can also respond    proactively if programmed to do so. Once a potential threat    actor is identified, AI models can log out accounts or place    restrictions on data deletion.  <\/p>\n<p>    AI might even be able to predict attacks before they happen, if    trained correctly, according to Own Companys Graham Russel.  <\/p>\n<p>    A notable trend is the strategic use of backup files, he told    ITPro. Traditionally seen as a safety net for data    recovery, backup files are now being leveraged as a valuable    resource for training and refining AI and machine learning    models.  <\/p>\n<p>    Incorporating backup files into AI and machine learning models    allows organizations to simulate diverse scenarios, ensuring    that the algorithms are robust and adaptable to real-world    complexities,\" Russel added.  <\/p>\n<p>    This approach not only optimizes the performance of AI    applications but also enhances the accuracy of predictions and    decision-making processes.\"  <\/p>\n<p>    The use of generative AI in cyber security could also help    crack down on voice and facial recognition scams, according to    Nick France, CTO of Sectigo.  <\/p>\n<p>    France told ITPro that AI's ability to analyze vast    quantities of data and detect anomalies in speech patterns    could uncover efforts to tamper with voice authentication and    facial recognition processes.  <\/p>\n<p>    The     machine learning aspect of AI means that, when paired with    security solutions such as identity verification and biometric    authentication (voice or fingerprint), it improves in its    detection over time, increasing accuracy but also reducing the    number of false positives, he said.  <\/p>\n<p>    And rather than having to wait after the scam has happened, AI    has real-time capabilities that can make a decisive judgment    call in the moment.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Visit link:<br \/>\n<a target=\"_blank\" href=\"https:\/\/www.itpro.com\/security\/nsa-benefits-of-generative-ai-in-cyber-security-will-outweigh-the-bad\" title=\"NSA: Benefits of generative AI in cyber security will outweigh the bad - ITPro\" rel=\"noopener\">NSA: Benefits of generative AI in cyber security will outweigh the bad - ITPro<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> A senior figure at the NSA has said that generative AI in cyber security will offer practitioners marked benefits in combating attacks and cracking down on global cyber criminal groups. Rob Joyce, director of cyber security at the US agency, told attendees at an event at Fordham University in New York that generative is absolutely making us better at finding malicious activity and outlined key benefits of the technology for use among security personnel <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/nsa-benefits-of-generative-ai-in-cyber-security-will-outweigh-the-bad-itpro\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94881],"tags":[],"class_list":["post-1121032","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/1121032"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=1121032"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/1121032\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=1121032"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=1121032"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=1121032"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}