{"id":177792,"date":"2017-02-15T21:20:27","date_gmt":"2017-02-16T02:20:27","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/ai-faces-hype-skepticism-at-rsa-cybersecurity-show-pcworld\/"},"modified":"2017-02-15T21:20:27","modified_gmt":"2017-02-16T02:20:27","slug":"ai-faces-hype-skepticism-at-rsa-cybersecurity-show-pcworld","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/ai\/ai-faces-hype-skepticism-at-rsa-cybersecurity-show-pcworld\/","title":{"rendered":"AI faces hype, skepticism at RSA cybersecurity show &#8211; PCWorld"},"content":{"rendered":"<p><p>    Vendors at this week's RSA cybersecurity show in San Francisco    are pushing artificial intelligence and machine    learningas the new wayto detect the latest threats,    but RSA CTO Zulfikar Ramzan is giving visitors a reality check.  <\/p>\n<p>    \"I think it (the technology) moves the needle,\" he said on    Wednesday. \"The real open question to me is how much has that    needle actually moved in practice?\"  <\/p>\n<p>    It's not as much as vendors claim, Ramzan warned, but for    customers it won't be easy cutting through the hype and    marketing. The reality is that a lot of the technology now    being pushedisnt necessarily new.  <\/p>\n<p>    In particular, he was talking about machine learning, a    subfield in A.I. thats become a popular marketing term in    cybersecurity. In practice, it essentially involves building    algorithms to spot bad computer behavior from good.  <\/p>\n<p>    RSA CTO Zulfikar Ramzan speaking at RSA 2017 in February.  <\/p>\n<p>    However, Ramzan pointed out that machine learning in    cybersecurity has been around for well over a decade. For    instance, email spam filters, antivirus software and online    fraud detection are all based on this technique of detecting    the bad from good.  <\/p>\n<p>    Certainly,     machine learning has advanced over the years and it can be    particularly useful at spotting certain attacks, like those    that dont use malware, he said. But the spotlight on A.I.    technologies also has to deal with marketing and building up    hype.  <\/p>\n<p>    Now all of a sudden, were seeing this resurgence of people    using the how as a marketing push, he said, after his    speech.  <\/p>\n<p>    The result has created a lemons market, where clients might    have trouble distinguishing between useful security products.    Not all are equal in effectiveness, Ramzan claimed. For    example, some products may generate too many false positives or    fail to detect the newest attacks from hackers.  <\/p>\n<p>    Theres no doubt you can catch some things that you couldnt    catch with these techniques, he said. But theres a disparity    between what a vendor will say and what it actually does.  <\/p>\n<p>    Nevertheless, A.I. technologies will still benefit the    cybersecurity industry, especially in the area of data    analysis, other vendors say.  <\/p>\n<p>    Right now, its an issue of volume. Theres just not enough    people to do the work, said Mike Buratowski, a senior vice    president at Fidelis Cybersecurity. Thats where an A.I. can    come in. It can crunch so much data, and present it to    somebody.  <\/p>\n<p>    One example of that is IBM's latest offering. On Wednesday, the    companyannouncedthat    its Watson supercomputer can now help clients respond to    security threats.   <\/p>\n<p>    Within 15 minutes, Watson can come up with a security analysis    to a reported cyber threat, when for a human it might have    taken a week, IBM claimed.  <\/p>\n<p>    Recorded    Future is another security firm thats been using machine    learning to offer intelligence to analysts and companies about    the latest cybercriminal activities. The companys technology    works by essentially scanning the internet, including black    market forums, to pinpoint potential threats.   <\/p>\n<p>    That might include a hacker trying to sell software exploits or    stolen data, said AndreiBarysevich, director of advanced    collection at the company.   <\/p>\n<p>    When you cover almost a million sources and you only have 8    hours a day, to find that needle in the hay stack, you have to    have some help from artificial intelligence, he said.  <\/p>\n<p>    The RSA 2017 show floor.  <\/p>\n<p>    Customers attending this weeks RSA show may be overwhelmed    with the marketing around machine-learning, but itll only be a    matter time, before the shoddier products are weeded out,    Barysevich said.  <\/p>\n<p>    We have hundreds of vendors here, from all over the country.    But among them, there are five or ten that have a superior    product, he said. \"Eventually, the market will identify the    best of the best.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read more: <\/p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"http:\/\/www.pcworld.com\/article\/3170869\/security\/ai-faces-hype-skepticism-at-rsa-cybersecurity-show.html\" title=\"AI faces hype, skepticism at RSA cybersecurity show - PCWorld\">AI faces hype, skepticism at RSA cybersecurity show - PCWorld<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Vendors at this week's RSA cybersecurity show in San Francisco are pushing artificial intelligence and machine learningas the new wayto detect the latest threats, but RSA CTO Zulfikar Ramzan is giving visitors a reality check. \"I think it (the technology) moves the needle,\" he said on Wednesday <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/ai\/ai-faces-hype-skepticism-at-rsa-cybersecurity-show-pcworld\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[187743],"tags":[],"class_list":["post-177792","post","type-post","status-publish","format-standard","hentry","category-ai"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/177792"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=177792"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/177792\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=177792"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=177792"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=177792"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}