Page 50 - Cyber Warnings
P. 50







CyberSecurity: Machine Learning + Artificial Intelligence =

Actionable Intelligence

by Smit Kadakia, Co-founder, Seceon


Overview

The goal of artificial intelligence is to enable the development of computers to do things
normally done by people -- in particular, things associated with people acting
intelligently. In the case of cybersecurity, its most practical application has been
automating human intensive tasks to keep pace with attackers! Progressive
organizations have begun using artificial intelligence in cybersecurity applications to
defend against attackers. However, on its own, artificial intelligence is best designed to
identify “what is wrong.”

For today’s enterprise, that’s only half the challenge for defending against attackers.
What today’s enterprise needs to know is not only “what is wrong” in the face of a
breach, but to understand “why it’s wrong” and “how to fix it!” By combining artificial
intelligence with machine learning to analyze and interpret actions and behaviors to
predict attack patterns and recommend actions to stop threats in motion, technologists
have devised a means to generate actionable intelligence. This article will seek to
explain how artificial intelligence and machine learning can be used to practical effect in
defending the enterprise in real-time.

Introduction

Machine Learning (ML) and Artificial Intelligence (AI) have been around in one form or
another since the latter half of last century, but have picked up significant pace and
applicability to change our day to day life in the last few years. The data science which
now includes both ML and AI, among other things, has taken off on its own to become a
major discipline in the educational world.

Business stakeholders have also recognized the importance of this discipline and have
been leveraging contemporary data science methods to mine valuable information,
make smarter business decisions and explore new opportunities using existing or newly
harvested information.

The internet and mobile revolution of the last few decades have helped generate
volumes of valuable information with potential to derive critical behavioral and structural
insights from its collection. Naturally, the information gathering was vastly helped by the
50 Cyber Warnings E-Magazine – April 2017 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   45   46   47   48   49   50   51   52   53   54   55