sb-as logo
Story image

Intelligent cybersecurity systems - before it's too late

14 Aug 2018

If you believe the hype, you would be under the impression that AI is the be-all and end-all technology that will revolutionise every aspect of the technological world.

There’s no denying that it will have powerful and far-ranging effects but the reality is that those effects are going to be more subtle and specific than Hollywood will have you believe.

In fact, certain aspects of AI, such as machine learning, have been working quietly behind the scenes for years already.

One such case is on the frontlines of endpoint and network cybersecurity,

When it comes to keeping your systems safe, it has been proven time and again that adding machine learning capabilities to any solution will vastly improve the protection of that system.

The volume of data that organisations are now producing provides cybercriminals with the perfect smokescreen under which they can conduct their nefarious activities.

An intelligent system, that is one that incorporates machine learning, can learn what that data flow is and isn’t supposed to look like, and can automatically respond to threats in real-time.

These systems can also be configured so that they are specific to the risk profile of a specific organisation or compliance needs.

There is always the concern that such a system will eat up the precious resources that are needed for critical systems - that is where the cloud can and will come in.

In the cloud, security systems can use as few or as many resources as it needs, without causing negatives effects on operations.

Aside from offering the well-known benefits of scalability, taking systems into the cloud also allows them to learn what is typical from similar companies and systems, and about new and different forms of attacks as they happen, no matter where in the world they are.

Many organisations may even have systems that already have these intelligence capabilities but are not yet utilising them.

By making use of features that can react proactively, organisations can save staff time by letting the system deal with the time-intensive tasks like creating honeypots.

No matter how fast the systems on this side of the war change and evolve, those on the criminal side will be moving just as fast. This is why the perfect defence can never really exist.

However, by using machine learning capabilities, you can ensure that if something does go wrong you will have the best partner possible when it comes to responding quickly and helping your security team learn exactly what happened at the point of attack.

At the end of the day, deploying AI in your systems is not just a ‘nice to have’ because chances are good that those who are trying to ruin your day have already taken that step.

Learn more about LogRhythm’s comprehensive approach to Security Analytics to expose real threats.

Story image
Revealed: The behaviours exhibited by the most effective CISOs
As cyber-threats pile up, more is being asked of CISOs - and according to Gartner, only a precious few are 'excelling' by the standards of their CISO Effectiveness Index.More
Story image
CrowdStrike integrates with ServiceNow program to bolster incident response
As part of the move, users can now integrate device data from the CrowdStrike Falcon platform into their incident response process, allowing for the improvement of both the security and IT operation outcomes.More
Story image
The guide to digital security in unstable times
An increase in vulnerability across different sectors has meant that 2020 has seen more than its fair share of cybersecurity incidents. One of the most effective ways to combat the perils of today’s cyber-threats is to gain a better knowledge of the threat vectors looming over the heads of organisations. More
Story image
Ripple20 threat could affect 35% of all IT environments – ExtraHop
The vulnerabilities have the potential to ‘ripple’ through complex software supply chains, enabling attackers to steal data or execute code.More
Story image
Kaspersky finds red tape biggest barrier against cybersecurity initiatives
The most common obstacles that inhibit or delay the implementation of industrial cybersecurity projects include the inability to stop production (34%), and bureaucratic steps, such as a lengthy approval process (31%) and having too many decision-makers (23%). More
Story image
Why it’s essential to re-write IT security for the cloud era
Key components of network security architecture for the cloud era should be built from the ground up, as opposed to being bolted on to legacy solutions built for organisations functioning only on-premises or from only managed devices.More