MERIT Solutions Blog

MERIT Solutions has been serving the Chesapeake area since 1982, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Hackers May Meet Their Match With AI

Hackers May Meet Their Match With AI

There are many organizations in the world that simply can’t have cybercriminals and hackers interfering with their data. One of these organizations, CERN (whose acronym translates to the European Laboratory for Particle Physics) has far too powerful of a computer grid to allow hackers to access it. To keep it safe, CERN has deployed what may be the future of cybersecurity: artificial intelligence.

The use of artificial intelligence in security makes a lot of sense for a few reasons. First and foremost, it gives us a chance of keeping up with the changes that malware undergoes. To combat this, the scientists at CERN have been busy teaching their AI to identify threats on their network and to take appropriate action against them.

This is no easy feat when one considers the resources that CERN requires to operate its Large Hadron Collider and Worldwide LHC Computing Grid. The LHC collects a truly vast amount of data--around 50 petabytes between the beginning of 2017 to June--and shares it across a network of 170 research facilities worldwide, also providing computing resources to these facilities as needed.

This creates a unique challenge to maintaining cybersecurity--how to maintain computing power and storage capabilities while keeping the global network secured.

As a result, CERN is turning to AI and machine learning to allow their security to identify between typical network activity and that of a more malicious nature. While CERN is still testing its new artificial intelligence, there are ways that businesses can leverage similar concepts to help protect their own networks.

As of right now, when we say AI, we’re not talking about machines with human-like qualities you’d see in movies today. CERN isn’t going to be teaching their security AI the concept of love and friendship anytime soon. Instead, it’s actually a very simple tool you probably use every day. Take Google, for example. When you do a Google search, you are getting results that are indexed and categorized without the direct influence of a human operator. Google’s computers crawl the Internet and use machine learning and hundreds of various factors to deliver the search results most relevant to what you need based on a whole slew of conditions.

The benefit of using this form of AI means results are delivered incredibly quickly, and a mind-numbing amount of data can be collated and delivered at the blink of an eye. If Google employed humans to deliver search results, the system would be flawed by human biases, the costs of employing so many people to meet demand, and it would simply be slow to get the results on-demand.

AI empowering security could quickly scan for flaws on a network, run ongoing penetration tests, and constantly patch vulnerabilities. It could work day and night to improve spam and firewall capabilities. AI would have access to a lot of security resources and be able to react much faster, making it harder for hackers to overcome. Although we’re a long way out from seeing something like this fully implemented, we’re already seeing a lot of virtually intelligent systems collating and delivering data, and we can’t wait to see more…

Just as long as we don’t flip the switch on Skynet.

Do you think that AI is a viable resource to keep business networks secure, or is the technology involved potentially too untested to have the reliability that modern enterprises need over time? Leave your thoughts in the comments section below. your social media marketing partner


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, 23 February 2018

Captcha Image

Tag Cloud

Tip of the Week Security Technology Cloud Privacy Best Practices Business Computing Hackers Network Security Software Malware Internet Hosted Solutions Backup google Business Management Productivity Managed IT Services Disaster Recovery Computer Microsoft Mobile Devices Outsourced IT Business Continuity Business IT Support Windows 10 communications VoIP User Tips Hardware Productivity IT Services Innovation Email Cybercrime Mobile Device Management Efficiency Windows Mobility Data Backup Managed IT Server Ransomware Apps Cybersecurity Smartphone Saving Money browser Telephone Systems Data Recovery Small Business Save Money Virtualization Law Enforcement Internet of Things Hosted Solution Quick Tips Operating System Android BYOD VPN Data BDR Passwords Money Password Information Technology Holiday Recovery Chrome Data Security Microsoft Office Office 365 Hacking Google Drive Avoiding Downtime Facebook Alert Government Health IT Support Miscellaneous Wireless Managed Service Provider Computers Risk Management Gadgets Unsupported Software Social Media Best Practice Cloud Computing Phishing Budget Smartphones Data Management Work/Life Balance upgrade Social App Communication Personal Information User Error Automation Telephony Collaboration Politics Two-factor Authentication USB Private Cloud Office tips Save Time Applications History Windows 10 Proactive IT Workplace Tips Vulnerability Identity Theft The Internet of Things Flexibility Social Engineering Shortcut Managed IT Services Data Breach Wi-Fi Firewall search Application Current Events Audit Wireless Technology Compliance iPhone Automobile Data Protection Blockchain Mobile Computing Transportation Redundancy Gmail Saving Time Cleaning Commerce Robot Office Phone System Update Computer Care Cortana End of Support Remote Computing IT solutions Legal DDoS Users Encryption Spam Artificial Intelligence Disaster Television Excel Humor Data Storage Streaming Media Apple Employer-Employee Relationship OneNote Cost Management Project Management Network Sports WiFi SaaS Tech Support Going Green Samsung Bandwidth Antivirus Content Filtering Data Loss Hacker Internet Exlporer eWaste Solid State Drive Battery Marketing HaaS Google Docs Webinar Conferencing Ali Rowghani Point of Sale HBO IT budget Mobile Trending Company Culture Microsoft Word HIPAA Microsoft Excel Black Market Maintenance Consultant IT solutions Smart Technology Gifts PDF Professional Services Avoid Downtime Value File Sharing server installation dvd "cannot install required files" Shadow IT Device Security Windows 10s stock Text Messaging Document Management IT Management Identities Travel Nanotechnology Experience Storage Devices Hard Disk Drive Credit Cards tweet WIndows Server 2008 Tablets Video Games Root Cause Analysis calculator Virtual Reality Spyware Uninterrupted Power Supply Scam FAQ Twitter Patch Management Laptop Music NFL control Augmented Reality Lifestyle Business Intelligence Fraud Touchscreen Employer Employee Relationship Charger WSJ Outlook Touchpad Analytics Word Exchange Reputation Distributed Denial of Service Keyboard Legislation altivista Advertising Instant Messaging Managed IT Service Edge iOS Computer Accessories Wireless Charging Worker Commute Big Data Windows Ink SBS Mobile Device Comparison compaq Managing Stress Data storage Ciminal Computer Fan Evernote Regulation Wearable Technology Books Google Maps Administration Scalability Chromecast Hiring/Firing Specifications hp Education Screen Mirroring Router Dark Web Vendor Management Networking Sync Software as a Service domain Colocation How To Meetings Benefits Sales Hard Drives Cast MSP Emails Files Workers Adobe remote Settings Administrator Lithium-ion battery Unified Threat Management Retail Yahoo intranet Licensing WannaCry Training Updates Entertainment Running Cable Electronic Medical Records Server 2008 Relocation Access Upgrades Monitors Safety Remote Monitoring Emergency Thank You Congratulations Worker CrashOverride Cache

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Anna Jackson 5 SEO Tools To Get a Google-Eye View of Your Website
15 September 2017
Hello Randall! I was doing very important work but due to your subject I felt better to stay at you...
David Miller Not all project-management tools are right for all businesses
25 August 2017
All the points depicted by you in this blog is v.apt. I love the title of this blog because it says ...