MERIT Solutions Blog

MERIT Solutions has been serving the Chesapeake area since 1982, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Hackers May Meet Their Match With AI

Hackers May Meet Their Match With AI

There are many organizations in the world that simply can’t have cybercriminals and hackers interfering with their data. One of these organizations, CERN (whose acronym translates to the European Laboratory for Particle Physics) has far too powerful of a computer grid to allow hackers to access it. To keep it safe, CERN has deployed what may be the future of cybersecurity: artificial intelligence.

The use of artificial intelligence in security makes a lot of sense for a few reasons. First and foremost, it gives us a chance of keeping up with the changes that malware undergoes. To combat this, the scientists at CERN have been busy teaching their AI to identify threats on their network and to take appropriate action against them.

This is no easy feat when one considers the resources that CERN requires to operate its Large Hadron Collider and Worldwide LHC Computing Grid. The LHC collects a truly vast amount of data--around 50 petabytes between the beginning of 2017 to June--and shares it across a network of 170 research facilities worldwide, also providing computing resources to these facilities as needed.

This creates a unique challenge to maintaining cybersecurity--how to maintain computing power and storage capabilities while keeping the global network secured.

As a result, CERN is turning to AI and machine learning to allow their security to identify between typical network activity and that of a more malicious nature. While CERN is still testing its new artificial intelligence, there are ways that businesses can leverage similar concepts to help protect their own networks.

As of right now, when we say AI, we’re not talking about machines with human-like qualities you’d see in movies today. CERN isn’t going to be teaching their security AI the concept of love and friendship anytime soon. Instead, it’s actually a very simple tool you probably use every day. Take Google, for example. When you do a Google search, you are getting results that are indexed and categorized without the direct influence of a human operator. Google’s computers crawl the Internet and use machine learning and hundreds of various factors to deliver the search results most relevant to what you need based on a whole slew of conditions.

The benefit of using this form of AI means results are delivered incredibly quickly, and a mind-numbing amount of data can be collated and delivered at the blink of an eye. If Google employed humans to deliver search results, the system would be flawed by human biases, the costs of employing so many people to meet demand, and it would simply be slow to get the results on-demand.

AI empowering security could quickly scan for flaws on a network, run ongoing penetration tests, and constantly patch vulnerabilities. It could work day and night to improve spam and firewall capabilities. AI would have access to a lot of security resources and be able to react much faster, making it harder for hackers to overcome. Although we’re a long way out from seeing something like this fully implemented, we’re already seeing a lot of virtually intelligent systems collating and delivering data, and we can’t wait to see more…

Just as long as we don’t flip the switch on Skynet.

Do you think that AI is a viable resource to keep business networks secure, or is the technology involved potentially too untested to have the reliability that modern enterprises need over time? Leave your thoughts in the comments section below. your social media marketing partner


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, 22 November 2017
If you'd like to register, please fill in the username, password and name fields.

Tag Cloud

Security Tip of the Week Cloud Privacy Technology Best Practices Business Computing Hackers Software Malware Network Security Hosted Solutions Backup Internet google Productivity Disaster Recovery Microsoft Computer Business Continuity Managed IT Services Windows 10 VoIP Business IT Support IT Services Innovation Outsourced IT User Tips Hardware Mobile Devices Business Management Managed IT Mobility communications Smartphone Ransomware Mobile Device Management Productivity Efficiency Email Windows Cybercrime Server Saving Money Telephone Systems Save Money Small Business Android Cybersecurity Operating System Virtualization Law Enforcement Data Backup Apps Hosted Solution Quick Tips Chrome Microsoft Office BYOD Data Data Recovery BDR VPN Money Passwords browser Information Technology Password Recovery Work/Life Balance Google Drive Hacking Communication Avoiding Downtime Health Miscellaneous Facebook Managed Service Provider Computers Government Office 365 Wireless Budget Smartphones Data Management Unsupported Software Social Cloud Computing upgrade search Shortcut App Wi-Fi Automation Telephony Firewall Application Alert Current Events Audit Office tips Applications Private Cloud Phishing Personal Information Managed IT Services Proactive IT Best Practice Politics Social Media Gadgets Workplace Tips USB Save Time Holiday Data Security Risk Management WiFi Hacker Artificial Intelligence Flexibility IT Support Internet Exlporer Solid State Drive Wireless Technology Going Green Bandwidth Commerce Cost Management iPhone SaaS Mobile Computing Windows 10 Samsung Antivirus Transportation User Error Content Filtering Battery Vulnerability Spam HaaS Robot Compliance History Remote Computing Gmail End of Support Data Storage Automobile Update Internet of Things IT solutions The Internet of Things Saving Time Cleaning Humor Disaster DDoS Office Computer Care Phone System Employer-Employee Relationship Television Google Docs Social Engineering Users Encryption Network Sports Streaming Media Apple Identity Theft Data Protection Collaboration Lithium-ion battery Computer Accessories Worker Commute Professional Services Administrator File Sharing Mobile Device domain Big Data Managing Stress IT Management Windows 10s Nanotechnology Relocation Travel Access Scalability Storage remote Books Yahoo Hiring/Firing Education WIndows Server 2008 eWaste Hard Disk Drive Root Cause Analysis Vendor Management Router Tablets How To Cortana Running Cable Server 2008 PDF Ali Rowghani Benefits Patch Management Trending Augmented Reality NFL Lifestyle Business Intelligence Touchscreen Unified Threat Management Text Messaging Outlook Training Entertainment Word Legislation Managed IT Service Upgrades server installation dvd "cannot install required files" Electronic Medical Records stock Point of Sale Excel iOS Company Culture HIPAA Windows Ink Black Market Comparison Laptop Uninterrupted Power Supply Consultant tweet Smart Technology Regulation Computer Fan OneNote Value Avoid Downtime Google Maps Shadow IT Specifications Touchpad Screen Mirroring Data Breach Two-factor Authentication calculator Twitter Document Management Reputation Sync Dark Web Software as a Service Meetings control Experience Advertising Sales Cast Emails WSJ Adobe Video Games Data Loss Data storage Settings Exchange Virtual Reality Retail Distributed Denial of Service Marketing altivista Scam Administration Licensing Chromecast Legal SBS Music compaq HBO Webinar Employer Employee Relationship Colocation Mobile Microsoft Excel Tech Support Wearable Technology Analytics Hard Drives hp Keyboard Instant Messaging Files IT solutions Thank You CrashOverride Safety Congratulations Emergency Worker WannaCry Cache Monitors Remote Monitoring

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Anna Jackson 5 SEO Tools To Get a Google-Eye View of Your Website
15 September 2017
Hello Randall! I was doing very important work but due to your subject I felt better to stay at you...
David Miller Not all project-management tools are right for all businesses
25 August 2017
All the points depicted by you in this blog is v.apt. I love the title of this blog because it says ...