{"id":187650,"date":"2017-04-13T23:43:14","date_gmt":"2017-04-14T03:43:14","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/automation-advancement-the-road-to-emergent-security-ai-security-intelligence-blog\/"},"modified":"2017-04-13T23:43:14","modified_gmt":"2017-04-14T03:43:14","slug":"automation-advancement-the-road-to-emergent-security-ai-security-intelligence-blog","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/automation\/automation-advancement-the-road-to-emergent-security-ai-security-intelligence-blog\/","title":{"rendered":"Automation Advancement: The Road to Emergent Security AI? &#8211; Security Intelligence (blog)"},"content":{"rendered":"<p><p>    The rise of big data and the Internet of Things (IoT) come with    huge potential for forward-thinking organizations. But they    also pave the way for greater security challenges since both    political entities and for-profit cybercriminals look to    compromise IT defenses and gain complete access to network    services or data.  <\/p>\n<p>    ABI Research noted that security automation    may offer the fastest route from existing security structures    to adaptive solutions based on artificial intelligence (AI)    frameworks. But this road isnt easy  how do companies    overcome new challenges on the way to emergent security AI?  <\/p>\n<p>    Computer Business Review explained    automated security processes are an essential part of    empowering skilled security staff. Using current methods, many    breach discovery efforts take 200 days or more, which gives    attackers plenty of time to break down defenses, grab what they    came for and disappear.  <\/p>\n<p>    Huntsman Security CEO Peter Woollacott argued in Computer    Business Review that the problem stems from dependence on    manual processes to sort data and reach conclusions. While all    of the information is coming in at machine speed, they are    always underwater, making it impossible to gain ground, he    said. Automation could help alleviate this issue by giving    security specialists the time and space they need to identify    key threat vectors and shore up infrastructure weakness.  <\/p>\n<p>    Woollacott also emphasized specificity, noting that analysts    come on board to solve problems, [like] the surgeon comes on    board to cut, not to push the patient from the ward into the    theater and wash them down. By relying on security    professionals end to end, emerging threats and potential fixes    may go unnoticed. Automating parts of the process, such as data    collection and baseline analytics, allows companies to both    save time and develop better security strategies.  <\/p>\n<p>    But giving human analysts room to run is only the first step.    Ideally, automation can help drive another key area of security    advancement: emergent AI. Its no easy task, since designing    truly emergent AI solutions  which can intelligently respond    to real-time security events rather than simply as their    programming dictates  requires machines with both the speed to    access big data in real time and the ability to learn    independently.  <\/p>\n<p>    As noted by the ABI Research study, automation here can be a    double-edged sword if not handled properly. Giving AI too    much responsibility too soon could open up organizations to    serious data breaches or record-keeping compromises.  <\/p>\n<p>    Its no surprise, then, that many companies prefer human-AI partnerships that allow experts to    leverage the broad knowledge of intelligent machines while    retaining control over eventual outcomes. Increasing automation    of threat analysis, historic data comparison and information    gathering should further enhance these partnerships, ideally    making it harder to identify where human expertise ends and    machine capability begins.  <\/p>\n<p>    Automation is a critical facet of the evolving cybersecurity    market. While its immediate value stems from the ability to    reduce manual process volume, this is just the beginning.    Human-machine pairings, combined with improved data collection,    continual learning and complete network access, should help    pave the way for emergent security AI that is able to    automatically and assertively defend corporate interests.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>The rest is here: <\/p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/securityintelligence.com\/news\/automation-advancement-the-road-to-emergent-security-ai\/\" title=\"Automation Advancement: The Road to Emergent Security AI? - Security Intelligence (blog)\">Automation Advancement: The Road to Emergent Security AI? - Security Intelligence (blog)<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> The rise of big data and the Internet of Things (IoT) come with huge potential for forward-thinking organizations. But they also pave the way for greater security challenges since both political entities and for-profit cybercriminals look to compromise IT defenses and gain complete access to network services or data <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/automation\/automation-advancement-the-road-to-emergent-security-ai-security-intelligence-blog\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[187732],"tags":[],"class_list":["post-187650","post","type-post","status-publish","format-standard","hentry","category-automation"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/187650"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=187650"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/187650\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=187650"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=187650"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=187650"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}