{"id":205802,"date":"2017-07-15T23:05:52","date_gmt":"2017-07-16T03:05:52","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/why-automation-isnt-everything-in-cybersecurity-cso-online-cso-online\/"},"modified":"2017-07-15T23:05:52","modified_gmt":"2017-07-16T03:05:52","slug":"why-automation-isnt-everything-in-cybersecurity-cso-online-cso-online","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/automation\/why-automation-isnt-everything-in-cybersecurity-cso-online-cso-online\/","title":{"rendered":"Why automation isn&#8217;t everything in cybersecurity | CSO Online &#8211; CSO Online"},"content":{"rendered":"<p><p>    With the latest advancements in automation and AI, many CISOs    are recognizing the potential for automation to transform    security operations. Given the way many technology vendors hype    their solutions, you could be forgiven for thinking humans    should be removed from security flows to the greatest extent    possible. But, you would be wrong!  <\/p>\n<p>    On the contrary, security analysts are not only an important    part of the security process, they are THE most important part.    So, when you think of automation, you should think of it not as    a way of replacing security analysts, but rather as a way of    empowering them to do more of what they do best. This is an    important distinction.  <\/p>\n<p>    The fact is, automation is not a panacea. Certainly, the early    and rudimentary forms of automation our industry has seen in    the past decade have fallen short of their promise. SIEM    systems allow you to collect lots of log data, but the growth    in data means ever-increasing amounts of backlog to process.    Those same systems, with their inflexible, rules-based approach    to threat detection, overwhelm analysts with torrents of false    positives.  <\/p>\n<p>    To make things worse, there are still far too many false    negatives and intrusions that get by undetected. No matter what    an automation vendor tells you, humans are still the absolute    best at identifying previously unknown threats. However, we    just cant do it at scale.  <\/p>\n<p>    Solving the cybersecurity crisis cant start with the    assumption humans should be automated out of the system - in    fact, it should be quite the opposite. In an ideal    configuration, human analysts are at the center of everything,    supported with advanced automation tools that can make sense of    the torrents of data being generated and allowing them to make    the types of nuanced decisions that will take a very long time    to yield to technology.  <\/p>\n<p>    Some new generation solutions are purely focused on AI and    machine learning. The promise is you turn it on in your    environment and after a few days of the system learning on its    own, it will be able to detect all the bad stuff. However,    these systems suffer from a fatal flaw: missing the business    context, adaptability and explainability needed to be truly    effective.  <\/p>\n<p>    What do human analysts know better than any system or, more    importantly, any intruder? They know their own environment and    the enterprise context, as well as having an intuition about    how their system operates and what is normal versus what is    questionable. Humans also adapt quickly to fast changing    conditions and can always explain why they did something. On    the other hand, humans cannot scale and could struggle with    mistakes and inconsistencies. Machines, as we know, are    exponentially faster and consistent.  <\/p>\n<p>    The ideal system is still one that unites analyst and machine,    augmenting the intelligence of a security analyst with the    automation scale of a machine. To achieve this, we need the    right kind of automation.  <\/p>\n<p>    There are different types of automation. As explained by    Harvard Business Review, basic robotic    process automation handles routine and repeatable tasks, and    can only scale some of the motions of an analyst, but cannot    scale intelligence. Cognitive automation, on the other hand,    can handle decision making around the severity of an alert by    evaluating the full context of all data surrounding an event.    Cognitive automation by itself, however, is not sufficient. To    avoid pitfalls of a blackbox, automation needs to be    complemented by analysts input and feedback on a continuous    basis.  <\/p>\n<p>    Recent, new technologies now make it possible to play to    analysts strengths far more effectively. The next generation of    automation technology allows analysts to feed their tribal    knowledge about context and environment easily into the machine    learning system, without requiring large training data sets. In    addition to drastically increasingly efficacy, this allows a    properly designed system to adapt and evolve flexibly as    context and environment change. The analyst is in charge and    the machine dutifully mimics and executes what the analysts    would do, only at extreme scale.  <\/p>\n<p>    Security automation doesnt mean removing analysts from the    equation. Instead, good security automation is about empowering    your analysts to force multiply their efforts, aiding them to    be more productive and satisfied in their jobs, and freeing    them to tackle the most challenging threats. With the right    technologies and processes in place, your secops dream team can    become a tag team of expert human security analysts plus    virtual security analysts powered by cognitive automation.  <\/p>\n<p>    This article is published as part of the IDG    Contributor Network. Want to Join?  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read more here:<\/p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"http:\/\/www.csoonline.com\/article\/3208071\/data-protection\/why-automation-isnt-everything-in-cybersecurity.html\" title=\"Why automation isn't everything in cybersecurity | CSO Online - CSO Online\">Why automation isn't everything in cybersecurity | CSO Online - CSO Online<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> With the latest advancements in automation and AI, many CISOs are recognizing the potential for automation to transform security operations. Given the way many technology vendors hype their solutions, you could be forgiven for thinking humans should be removed from security flows to the greatest extent possible.  <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/automation\/why-automation-isnt-everything-in-cybersecurity-cso-online-cso-online\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":8,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[187732],"tags":[],"class_list":["post-205802","post","type-post","status-publish","format-standard","hentry","category-automation"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/205802"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=205802"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/205802\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=205802"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=205802"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=205802"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}