Contact us today!

Network Solutions Unlimited Blog

Network Solutions Unlimited has been serving the Decatur area since 2013, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Hackers May Meet Their Match With AI

Hackers May Meet Their Match With AI

There are many organizations in the world that simply can’t have cybercriminals and hackers interfering with their data. One of these organizations, CERN (whose acronym translates to the European Laboratory for Particle Physics) has far too powerful of a computer grid to allow hackers to access it. To keep it safe, CERN has deployed what may be the future of cybersecurity: artificial intelligence.

The use of artificial intelligence in security makes a lot of sense for a few reasons. First and foremost, it gives us a chance of keeping up with the changes that malware undergoes. To combat this, the scientists at CERN have been busy teaching their AI to identify threats on their network and to take appropriate action against them.

This is no easy feat when one considers the resources that CERN requires to operate its Large Hadron Collider and Worldwide LHC Computing Grid. The LHC collects a truly vast amount of data--around 50 petabytes between the beginning of 2017 to June--and shares it across a network of 170 research facilities worldwide, also providing computing resources to these facilities as needed.

This creates a unique challenge to maintaining cybersecurity--how to maintain computing power and storage capabilities while keeping the global network secured.

As a result, CERN is turning to AI and machine learning to allow their security to identify between typical network activity and that of a more malicious nature. While CERN is still testing its new artificial intelligence, there are ways that businesses can leverage similar concepts to help protect their own networks.

As of right now, when we say AI, we’re not talking about machines with human-like qualities you’d see in movies today. CERN isn’t going to be teaching their security AI the concept of love and friendship anytime soon. Instead, it’s actually a very simple tool you probably use every day. Take Google, for example. When you do a Google search, you are getting results that are indexed and categorized without the direct influence of a human operator. Google’s computers crawl the Internet and use machine learning and hundreds of various factors to deliver the search results most relevant to what you need based on a whole slew of conditions.

The benefit of using this form of AI means results are delivered incredibly quickly, and a mind-numbing amount of data can be collated and delivered at the blink of an eye. If Google employed humans to deliver search results, the system would be flawed by human biases, the costs of employing so many people to meet demand, and it would simply be slow to get the results on-demand.

AI empowering security could quickly scan for flaws on a network, run ongoing penetration tests, and constantly patch vulnerabilities. It could work day and night to improve spam and firewall capabilities. AI would have access to a lot of security resources and be able to react much faster, making it harder for hackers to overcome. Although we’re a long way out from seeing something like this fully implemented, we’re already seeing a lot of virtually intelligent systems collating and delivering data, and we can’t wait to see more…

Just as long as we don’t flip the switch on Skynet.

Do you think that AI is a viable resource to keep business networks secure, or is the technology involved potentially too untested to have the reliability that modern enterprises need over time? Leave your thoughts in the comments section below.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, 21 February 2018

Captcha Image

Mobile? Grab this Article!


Tag Cloud

Patch Management intranet Work/Life Balance Telephone Systems Workers Vulnerability Windows Chrome Risk Management IT Management IT Support Public Cloud Credit Cards Books Hosted Solution BYOD Retail Computing Infrastructure Upgrades Outsourced IT Managed IT Nanotechnology Ciminal Value Hackers Smartphones Word Professional Services Upgrade IT Services Black Market Internet of Things SaaS Laptop Holiday Backup Save Money Experience Audit Legislation MSP Settings Health Sync IT Support Identities Public Computer Cast Data Breach Microsoft Word Operating System VPN Tip of the Week Marketing User Error Recovery eWaste Productivity Software as a Service Data Security Troubleshooting Blockchain Maintenance Solid State Drive Politics Document Management Remote Monitoring Unified Threat Management Wi-Fi Microsoft Office Instant Messaging Microsoft Excel End of Support Automation Save Time Monitor Hardware Going Green Best Practices Cache HBO Spam Blocking Managed Service Provider Specifications Windows Ink Identity Theft Loyalty History Wireless Internet Customer Safety Commerce Encryption Firewall Budget Downtime Hosted Solutions Scam Content Filtering VoIP Artificial Intelligence Virtualization Samsung Spyware Reputation Wireless Technology Remote Computing USB Excel Small Business Tech Support Network Security Administration Vendor Management Lifestyle Disaster Recovery WannaCry Data Backup The Internet of Things IT Solutions Passwords Communications Unsupported Software Government Cybersecurity Webinar Computer Care Sports Keyboard Rootkit Licensing Relocation Worker Commute hacker Malware WiFi Big Data Facebook iOS Google Maps Mobile Device Management Personal Information Outlook Social Media Training Techology Benefits Colocation Sales Congratulations Root Cause Analysis NFL Video Games Internet exploMicrosoft Workplace Tips Applications Collaboration Television Humor Security App Chromecast Server Tablets Wireless Charging Office Tips Emergency Innovation Smart Technology OneNote Software Comparison Screen Mirroring Transportation Virtual Reality Apple Hacking Networking Data Recovery Data Loss IT solutions Cost Management Automobile Shadow IT Entertainment Mobile Devices HaaS Social Engineering Android Flexibility FAQ Thank You Battery Advertising Gifts Meetings IT budget Proactive IT Monitors Dark Web Storage Robot Saving Money Users Touchscreen Cortana Windows 10 Windows 10s Touchpad Network Two Factor Authentication Fraud Law Enforcement Cybercrime Hard Disk Drive Managed IT Services Managed IT Service Phishing Updates Computer Accessories Productivity Business Computing Router Data Storage Business Avoiding Downtime Application Business Continuity Hybrid Cloud Alert Hiring/Firing Office 365 Redundancy HIPAA Efficiency Legal Two-factor Authentication Content Shortcut Business Management Email Education Money Technology Managed IT Services Data PDF Information Technology Mobile Computer Google Smartphone Bluetooth Devices Evernote Assessment Employer Employee Relationship Google Drive Data Management Device Security Internet Exlporer Phone System Quick Tips Cloud Mobile Device Best Practice BDR Data storage Data Protection Employer-Employee Relationship Compliance User Tips Browser Ransomware Apps Password Emails Business Owner How to Private Cloud File Sharing Travel Computers Scalability Spam Hard Drives Google Docs Search Edge Privacy Office Bandwidth Miscellaneous Regulation Bring Your Own Device Electronic Medical Records Audiobook Project Management How To Consultant Adobe Conferencing Cleaning Physical Security Charger WIndows Server 2008 Cloud Computing CrashOverride Gmail Files Gadgets Augmented Reality Microsoft Business Intelligence Mobility Computer Fan Worker Windows 10 iPhone

Sign Up for Our Newsletter

  • Company Name *
  • First Name *
  • Last Name *