{"id":185652,"date":"2017-03-31T07:08:55","date_gmt":"2017-03-31T11:08:55","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/artificial-intelligence-is-key-to-defeating-future-hackers-thehill-the-hill-blog\/"},"modified":"2017-03-31T07:08:55","modified_gmt":"2017-03-31T11:08:55","slug":"artificial-intelligence-is-key-to-defeating-future-hackers-thehill-the-hill-blog","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/artificial-intelligence\/artificial-intelligence-is-key-to-defeating-future-hackers-thehill-the-hill-blog\/","title":{"rendered":"Artificial intelligence is key to defeating future hackers | TheHill &#8211; The Hill (blog)"},"content":{"rendered":"<p><p>    In the heat of battle, its hard to separate the signal from    the noisea phenomenon thats known as the fog of war. This    is whats happening in field of cybersecurity now. Amid all the    noise of the presidential election, the actual and the rumored    hacking, a vital signal is being missed: the fact that there is    a dramatic shift in cyber attacks.  <\/p>\n<p>    As a veteran of the cybersecurity market, Ive worked with a    lot of young and mature companies to help shape their security    plans into battle-ready solutions. And it has been a busy few    decadesbecause ever since the dawn of e-commerce, companies    have been playing catch-up with ever more sophisticated,    malicious and insatiable adversaries.  <\/p>\n<p>    Fortunately, there are startups arising with cutting-edge    security innovations to combat cyber attackers. Many are    embracing a dual approach that includes using defensive    technologies, as well as new offensive tactics like predictive    AI technologies. We certainly need them.  <\/p>\n<p>    Cyberwar: The Early Years  <\/p>\n<p>    Early cyber attacks typically involved hackers writing viruses    for fun and for the challenge of it. An employee gets a virus,    his system freezes, a naughty message appears on his screen and    IT has to come out and wipe the PC clean. Ha-ha, you got me.    Fixing the glitch slowed work but these early attacks didnt    involve massive information theft. Solutions were simple: throw    antivirus at the problem and let the good and bad geeks fight    it out.  <\/p>\n<p>    Attacks evolved significantly; hackers began using malware to    steal credit card numbers, Social Security numbers and even    medical data for a quick profit. Those breaches resulted in    lost information as well as serious financial damage. In    addition to the cost of IT fixes are credit monitoring costs,    consultant fees, regulatory penalties and other charges. Here,    the solution was actuarial: throw regulations and cyber    insurance at the problem and tell the board youve managed our    risk.  <\/p>\n<p>    But now the game has changed and it will only get worse. It    already has. Attacks now can cost tens of millions of dollars    and even lead to ransom scenarios. More recently, breaches from    nation-state attacks had potentially political and economic    impacts. We can expect attacks to become more complex, and most    companies arent ready to deal with them.  <\/p>\n<p>    Heres a recent example that sounds like science fiction but is    becoming all too common: An attorney at a large law firm that    services one of the largest global banks receives an email with    a malware-infected attachment. He opens the document and the    malware later steals his network credentials. The hacker    immediately uses those to create several new accounts, and adds    those to privileged system admin groups. Over the next few    months, the hackers use those admin accounts to read files,    emails, and other communications between the lawyers and the    bank. The attackers can trade ahead of deals, and gather enough    information to cause major damage. And yet, they are never    detected, since all security technologies in place only see    valid employees doing valid work activities. But billions of    dollars in bank activities are at risk.  <\/p>\n<p>    The stakes really are that highand we need drastically    improved security tools to take on modern cyber attacks, which    are coming fast and furious. Theyre hard to detect and may    persist for years. At the end of 2015, Kaspersky Lab reported    that a group of Russian hackers had stolen over $1 billion from    global banks over a period of three years. In May 2016, hackers    stole $13 million from ATM machines in Japan in the space of    three hours.  <\/p>\n<p>    An intelligent defense against cyberattacks  <\/p>\n<p>    A December 2016McAfee    Labs Threats Reportrevealed that 93 percent of 400    security professionals said their organizations are overwhelmed    by threat alerts and are not able to triage all relevant    threats.  <\/p>\n<p>    To address the blizzard of threats, companies need    comprehensive and predictive approaches. These approaches need    to handle shades of gray and evaluate risk along a spectrum.    They need to learn and adapt by piecing together evidence that    might not be self-evidently connected, an approach known as    establishing the complete attack chain.  <\/p>\n<p>    Accordingly, were now seeing a shift from defensive security    practices to more predictive AI-powered security approaches.    And while many companies claiming to have such advanced    security techniques are still deploying static solutions, we    are seeing some startups with more dynamic approaches to    detection of and defense against cyber attacks. Companies like    Exabeam are focusing on    behavior and others like Shape focused on thwarting    malicious automated attacks. This is the next generation of    security companies, those that are leveraging automated machine    learning and AI methods to combat the next level of breaches,    spear-phishing and ransomware campaigns.  <\/p>\n<p>    A Treatment, Not a Cure  <\/p>\n<p>    New AI techniques give us methods to address a wide range of    security concerns. AI-driven security is well equipped to    handle probabilities, behaviors and connections. But AI isnt a    panacea on its own. It must be augmented with judgment.  <\/p>\n<p>    AI plus human experts is the only path to success in this new    phase of security. But it will not be a cakewalk. At the end of    last year, the     Cybersecurity Business Report, a Palo Alto-based research    center, said 2016 saw 0 percent unemployment in the    cybersecurity field and 1 million jobs unfilled. Translation:    those already in the industry are overloaded and will become    more so.  <\/p>\n<p>    The best way to amplify this scarce and precious expertise is    to combine it with AI and deep-learning capabilities to help    make sense of the river of data flowing within every large    organization. We should embrace, not fear, the machine when it    comes to protecting our information.  <\/p>\n<p>    A problem we face today in cybersecurity is that companies have    been working within a set of rules for basic machine learning    and automation, while hackers live and breathe the mantra that    rules are meant to be broken. But the next generation of    innovative security companies will, I hope, fulfill the promise    of AI methods without limits. These will be the companies that    will be able to battle and beat the new wave of attackers. And    at the center of their success will be AI.  <\/p>\n<p>    Matt Howard (@MattdHoward) is managing    partner at Norwest Venture Partners,a firm with    investments in numerous cybersecurity companies  <\/p>\n<p>    The views expressed by contributors are their own and are    not the views of The Hill.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>View original post here: <\/p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"http:\/\/thehill.com\/blogs\/pundits-blog\/technology\/326532-artificial-intelligence-is-key-to-defeating-future-hackers\" title=\"Artificial intelligence is key to defeating future hackers | TheHill - The Hill (blog)\">Artificial intelligence is key to defeating future hackers | TheHill - The Hill (blog)<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> In the heat of battle, its hard to separate the signal from the noisea phenomenon thats known as the fog of war. This is whats happening in field of cybersecurity now <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/artificial-intelligence\/artificial-intelligence-is-key-to-defeating-future-hackers-thehill-the-hill-blog\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":9,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[187742],"tags":[],"class_list":["post-185652","post","type-post","status-publish","format-standard","hentry","category-artificial-intelligence"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/185652"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=185652"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/185652\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=185652"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=185652"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=185652"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}