Experts evaluate the importance of Artificial Intelligence and automated learning in the world of cyber-safety

In the name of the soon-to-be-published “AI-era in cybersecurity: A step toward a safer world or the brink of chaos?” ESET explains the role that A.I. and automated learning really play in the fight against cyber-threats.

 

Mid 2018, ESET ran a poll to analyze the beliefs that surround modern technology. 82% of participants believed their job places had already implemented cyber-safety measures that used Machine Learning (M.L.), with only 23% of participants claiming that they have no plants of implementing M.L.-based cyber-safety solutions in the near future.

 

More importantly: 80% of participants believe that M.L. already helps or will help their job places detect and protect themselves against threats, while 76% of participants agree that this tech will help solve the problems that come from lacking safety experts in their job places.

 

Integration of this ML engine into our cloud reputation system, ESET LiveGrid®, has made the benefits of this technology available to all our customers, including regular users as well as companies of all sizes. Enterprises might also consider ESET Dynamic Threat Defense, providing another layer of security by utilizing a cloud-based sandboxing technology to detect new, never before seen threats,” said ESET researcher and A.I. expert, Juraj Jánošík.

 

The researcher added that, while automatic learning has transformed several human activity fields for a while now, their complete transformation potential has yet to be seen. M.L.-based tech will increasingly help combat fraud, evaluate and optimize business processes, improve testing proceedings and develop new solutions for existing problems.

 

However, like most innovation, even automatic learning has its drawbacks. “With business, critical infrastructure, as well as our personal lives becoming ever more entwined with the digital realm, new risks will emerge. Attackers can employ AI in multiple ways: to power their malware, to target specific victims and extract valuable data, to hunt for zero-day vulnerabilities or protect hijacked infrastructure such as botnets,” said Jánošík.

 

Comments are closed.