{"id":213048,"date":"2017-08-22T23:52:52","date_gmt":"2017-08-23T03:52:52","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/the-self-driving-car-of-security-automation-cso-online\/"},"modified":"2017-08-22T23:52:52","modified_gmt":"2017-08-23T03:52:52","slug":"the-self-driving-car-of-security-automation-cso-online","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/automation\/the-self-driving-car-of-security-automation-cso-online\/","title":{"rendered":"The self-driving car of security automation &#8211; CSO Online"},"content":{"rendered":"<p><p>          By Kumar          Saurabh, Contributor, CSO | Aug 22, 2017 7:01 AM PT        <\/p>\n<p>          Opinions expressed by ICN authors are their own.        <\/p>\n<p>          Your message has been sent.        <\/p>\n<p>          There was an error emailing this page.        <\/p>\n<p>      When I speak with CISOs about automation in cybersecurity, it      can conjure up parallels to self-driving cars. After all, if      machine learning can create cars that drive themselves, why      cant we have self-driving security?    <\/p>\n<p>      Its a bit early and optimistic, however, to say machine      learning and automation will immediately solve all      cybersecurity challenges, if ever. Given the threat      landscapes inevitable evolution, it will most likely remain      an arms race between the defenders and the attackers for the      near and long term.    <\/p>\n<p>      Alternatively, the promise of a machine doing what we thought      only humans could do is quickly approaching reality. Theres      a lot of early results, hype and even more potential. In      fact, this is also true for self-driving cars.       The Washington Post highlighted the different      levels of development in regards to autonomy in self-driving      cars established by the Society of Automotive Engineers      (SAE).    <\/p>\n<p>      Specifically, the evolutionary path to the much-hyped fully      autonomous car with each stage providing exponential value.    <\/p>\n<p>      Similarly in cybersecurity, increasing levels of intelligent      automation will also provide exponential benefits. If we      compare the levels in the auto industry and apply them to the      world of cybersecurity, level zero has very little automation      while level five is most autonomous.    <\/p>\n<p>          On one hand, you have solutions such as User Behavior          Analytics and Network Traffic Analysis that profess to          automatically analyze normal behavior and alert          anything abnormal. The drawback is the inability to          understand the full context of an environment or          situation, which results in a tendency to generate too          many false positives and requires significant analyst          involvement to triage.        <\/p>\n<p>          On the other hand, you have early orchestration solutions          that can partially automate some of the easier and          repeatable actions during an incident response process.          While this solution is adequate to collect relevant          information for an investigation process, the actual          decision making is delegated to the analyst.        <\/p>\n<p>          In essence, Level 2 automates actions and repeatable          tasks, but not the decision making and judgments that          require intelligence.        <\/p>\n<p>          The first is full, end-to-end alert triage automation.          This is where the system has the intelligence, based on          context and awareness of an alerts severity, to make          decisions and accept feedback from human analysts. Though          more advanced systems are able to provide a full          explanation of their scoring, analysts still need to          review the systems results. However, 95 percent of the          overhead work they used to have to do is effectively          eliminated.        <\/p>\n<p>          Second is automated threat hunting that is possible after          expert analysts map out the logic they would use in an          investigation. The system applies cognitive automation to          intelligently hunt for threats 24\/7, but at a scale with          which human analysts cant keep up. This approach can be          made more manageable with prescriptive logic flows for          specific use cases, such as Threat Hunter for          CloudTrail or Threat Hunter for Office 365.        <\/p>\n<p>          Such a solution does not exist today, but is often what          CISOs hope for when they hear security automation.          Achieving this nirvana will require significant          advancements in machine learning and computing power.        <\/p>\n<p>      Security operations technologies have greatly evolved in the      past decade. The first big wave was driven by log aggregation      and analytics, followed by predictive technologies. The next      generation of solutions will be Prescriptive Security      Intelligence, offering specific solutions to typical      security use cases. The industry will take time to enter      a fully autonomous state. If security automation is      your end goal, start by looking for Level 3 security      solutions that can drive 80 percent of the way to your      destination.    <\/p>\n<p>      This article is published as part of the IDG      Contributor Network. Want to Join?    <\/p>\n<p>        Kumar Saurabh is the CEO and co-founder of security        intelligence automation platform LogicHub.        Kumar has 15 years of experience in the enterprise security        and log management space leading product development        efforts at ArcSight and SumoLogic, which he left to        co-found LogicHub.      <\/p>\n<p>    Sponsored Links  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Visit link: <\/p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"http:\/\/www.csoonline.com\/article\/3215869\/data-protection\/the-self-driving-car-of-security-automation.html\" title=\"The self-driving car of security automation - CSO Online\">The self-driving car of security automation - CSO Online<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> By Kumar Saurabh, Contributor, CSO | Aug 22, 2017 7:01 AM PT Opinions expressed by ICN authors are their own. Your message has been sent.  <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/automation\/the-self-driving-car-of-security-automation-cso-online\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":9,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[187732],"tags":[],"class_list":["post-213048","post","type-post","status-publish","format-standard","hentry","category-automation"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/213048"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=213048"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/213048\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=213048"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=213048"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=213048"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}