MERIT Solutions Blog

MERIT Solutions has been serving the Chesapeake area since 1982, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Hackers May Meet Their Match With AI

Hackers May Meet Their Match With AI

There are many organizations in the world that simply can’t have cybercriminals and hackers interfering with their data. One of these organizations, CERN (whose acronym translates to the European Laboratory for Particle Physics) has far too powerful of a computer grid to allow hackers to access it. To keep it safe, CERN has deployed what may be the future of cybersecurity: artificial intelligence.

The use of artificial intelligence in security makes a lot of sense for a few reasons. First and foremost, it gives us a chance of keeping up with the changes that malware undergoes. To combat this, the scientists at CERN have been busy teaching their AI to identify threats on their network and to take appropriate action against them.

This is no easy feat when one considers the resources that CERN requires to operate its Large Hadron Collider and Worldwide LHC Computing Grid. The LHC collects a truly vast amount of data--around 50 petabytes between the beginning of 2017 to June--and shares it across a network of 170 research facilities worldwide, also providing computing resources to these facilities as needed.

This creates a unique challenge to maintaining cybersecurity--how to maintain computing power and storage capabilities while keeping the global network secured.

As a result, CERN is turning to AI and machine learning to allow their security to identify between typical network activity and that of a more malicious nature. While CERN is still testing its new artificial intelligence, there are ways that businesses can leverage similar concepts to help protect their own networks.

As of right now, when we say AI, we’re not talking about machines with human-like qualities you’d see in movies today. CERN isn’t going to be teaching their security AI the concept of love and friendship anytime soon. Instead, it’s actually a very simple tool you probably use every day. Take Google, for example. When you do a Google search, you are getting results that are indexed and categorized without the direct influence of a human operator. Google’s computers crawl the Internet and use machine learning and hundreds of various factors to deliver the search results most relevant to what you need based on a whole slew of conditions.

The benefit of using this form of AI means results are delivered incredibly quickly, and a mind-numbing amount of data can be collated and delivered at the blink of an eye. If Google employed humans to deliver search results, the system would be flawed by human biases, the costs of employing so many people to meet demand, and it would simply be slow to get the results on-demand.

AI empowering security could quickly scan for flaws on a network, run ongoing penetration tests, and constantly patch vulnerabilities. It could work day and night to improve spam and firewall capabilities. AI would have access to a lot of security resources and be able to react much faster, making it harder for hackers to overcome. Although we’re a long way out from seeing something like this fully implemented, we’re already seeing a lot of virtually intelligent systems collating and delivering data, and we can’t wait to see more…

Just as long as we don’t flip the switch on Skynet.

Do you think that AI is a viable resource to keep business networks secure, or is the technology involved potentially too untested to have the reliability that modern enterprises need over time? Leave your thoughts in the comments section below.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, June 22 2018

Captcha Image

Tag Cloud

Security Tip of the Week Technology Best Practices Cloud Privacy Business Computing Network Security Hackers Malware Software Internet Productivity Hosted Solutions Business Management Backup google Computer Managed IT Services Disaster Recovery Mobile Devices Outsourced IT Microsoft Business Continuity communications VoIP Business Windows 10 IT Support Email User Tips Hardware Innovation Cybersecurity IT Services Data Backup Efficiency Cybercrime Apps Mobility Server Ransomware Saving Money Mobile Device Management Tech Term Windows Small Business Managed IT Data Recovery Data Smartphone Productivity Operating System Law Enforcement Internet of Things browser Virtualization Office 365 BDR Save Money Telephone Systems Android Phishing Money Data Security Smartphones Passwords Cloud Computing Hosted Solution Quick Tips BYOD Automation Chrome Managed Service Provider Communication Information Technology VPN Recovery Password Holiday Microsoft Office Hacking Application Google Drive Avoiding Downtime Vulnerability Alert upgrade Social Health Miscellaneous Computers App Two-factor Authentication Data Breach Wireless Best Practice Social Media Facebook Risk Management Government Budget Unsupported Software Data Management Network Collaboration Update IT Support Gadgets Work/Life Balance Cost Management Wi-Fi Social Engineering Antivirus Current Events Telephony Audit Streaming Media Spam Compliance Personal Information search Managed IT Services Private Cloud Office tips Applications History Politics Remote Computing Proactive IT Cleaning USB Save Time User Error The Internet of Things Employer-Employee Relationship Gmail Identity Theft Data Protection Artificial Intelligence Flexibility Tech Support Shortcut Workplace Tips Wireless Technology Firewall Windows 10 Television Patch Management Samsung Content Filtering iPhone Battery Apple HaaS Management Mobile Computing Transportation Blockchain Wireless Charging WiFi Excel Going Green Data Storage Robot Mobile Security Automobile Bandwidth OneNote Devices Value eWaste End of Support Google Assistant Saving Time Office Data Loss Fraud Computer Care Phone System Marketing Humor Disaster Legal Google Docs Users Encryption Sports Big Data Project Management IT solutions Redundancy DDoS Hacker Commerce Internet Exlporer Education Solid State Drive Router Vendor Management Cortana SaaS Computing Benefits FAQ NFL SBS Monitoring Augmented Reality Lifestyle compaq Unified Communications Business Intelligence IT budget Unified Threat Management Touchscreen Analysis Charger PDF Outlook Wearable Technology Word Maintenance Training Entertainment Electronic Medical Records Legislation hp Financial Managed IT Service Upgrades App store iOS Point of Sale Text Messaging Windows Ink domain Financial Technology Device Security Company Culture HIPAA Safety Black Market Comparison Identities Consultant Computer Fan Smart Technology Evernote Regulation Avoid Downtime Google Maps remote Printing Shadow IT Specifications Yahoo Screen Mirroring IoT Laptop Identity Dark Web Uninterrupted Power Supply Document Management Networking Sync Running Cable Software as a Service Server 2008 Meetings Spyware Experience Sales Ali Rowghani Cast Language Emails Adobe Touchpad Data Privacy Trending Workers Video Games Reputation Computer Forensics Settings Virtual Reality Retail Advertising Licensing Hard Drive WannaCry Scam Updates Music server installation dvd "cannot install required files" PowerPoint Edge Webinar Conferencing stock HBO Data storage Virus Mobile Chromebook Employer Employee Relationship Microsoft Word Analytics Microsoft Excel Administration Wireless Internet Remote Monitoring Chromecast Ciminal IT solutions Keyboard Instant Messaging Gifts tweet Proactive Professional Services Smart Tech Computer Accessories Worker Commute File Sharing Colocation calculator Gamification Mobile Device Windows 10s Managing Stress Hard Drives Twitter IT Management Websites Travel control Connectivity Nanotechnology Files Books Scalability Storage Memory Administrator MSP Lithium-ion battery Hard Disk Drive Hiring/Firing Credit Cards WSJ WIndows Server 2008 Data Theft Tablets Exchange Content Filter Root Cause Analysis Distributed Denial of Service How To Relocation altivista Students Access intranet CrashOverride Emergency Worker Cache Thank You Monitors Congratulations

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Anna Jackson 5 SEO Tools To Get a Google-Eye View of Your Website
15 September 2017
Hello Randall! I was doing very important work but due to your subject I felt better to stay at you...
David Miller Not all project-management tools are right for all businesses
25 August 2017
All the points depicted by you in this blog is v.apt. I love the title of this blog because it says ...