AI, Automation Emerge As Critical Tools For Cybersecurity
- progocicsicobanrar
- Aug 14, 2023
- 6 min read
Taking advantage of X as a service. Migrating workloads and infrastructure to third-party cloud environments (such as platform as a service, infrastructure as a service, and hyperscale providers) can better secure organizational resources and simplify management for cyberteams. Cloud providers not only handle many routine security, patching, and maintenance activities but also offer automation capabilities and scalable services. Some organizations seek to consolidate vendors for the sake of simplicity, but it can also be important to diversify partners strategically to limit exposure to performance or availability issues.
The critical technologies that are optimizing technologist delivery are augmented FinOps, cloud data ecosystems, cloud sustainability, computational storage, cybersecurity mesh architecture, data observability, dynamic risk governance, industry cloud platforms, minimum viable architecture, observability driven development, OpenTelemetry and platform engineering.
AI, automation emerge as critical tools for cybersecurity
Download Zip: https://gohhs.com/2vDrov
In response to this unprecedented challenge, Artificial Intelligence (AI) based tools for cybersecurity have emerged to help information security teams reduce breach risk and improve their security posture efficiently and effectively.
In recent years, AI has emerged as required technology for augmenting the efforts of human information security teams. Since humans can no longer scale to adequately protect the dynamic enterprise attack surface, AI provides much needed analysis and threat identification that can be acted upon by cybersecurity professionals to reduce breach risk and improve security posture. In security, AI can identify and prioritize risk, instantly spot any malware on a network, guide incident response, and detect intrusions before they start.
State threat actors do pose significant threats. Admiral Mike Rogers, former head of the National Security Agency and U.S. Cyber Command, has stated that at least two or three countries could launch a cyber-attack that could shut down the entire U.S. power grid and other critical infrastructure.
Cyber-attackers will always look for the weakest point of entry and mitigating third-party risk is critical for cybersecurity. Supply chain cyber-attacks can be perpetrated from nation-state adversaries, espionage operators, criminals, or hacktivists. Their goals are to breach contractors, systems, companies, and suppliers via the weakest links in the chain.
Created as a civilian counter-terrorism agency back in 2003, The Department of Homeland Security (DHS) has become the lead U.S. agency on the civilian side of government for cybersecurity. Also, the DHS role has significantly evolved in correlation with the growing and complex threat to critical infrastructure. Largely because of that responsibility and cybersecurity threat to CI and the need to coordinate with the private sector, the Department of Homeland Security (DHS) embarked on creating the Cybersecurity and Infrastructure Security Agency (CISA) in 2018 as an operational component.
Space is an emerging and mission critical frontier that countries are becoming increasingly dependent on for monitoring and information sharing. They also play a vital national security role by watching geopolitical movements and tracking adversarial threats. Satellites are at a growing risk from cyber-threats, and this has come to the attention of the national security establishment. As a result of those threats, the US Space Systems Command recently announced beta testing for cybersecurity guidance around commercial satellites.
Information sharing on threats and risks is one of the most principal functions of government and industry collaboration. Sharing such information helps allow both government and industry to keep abreast of the latest viruses, malware, phishing threats, ransomware, and insider threats. Information sharing also establishes working protocols for lessons-learned and resilience that is critical for the success of commerce and the enforcement against cyber-crimes.
Mitigating evolving threats and being resilient to breaches are paramount for critical infrastructure protection. Successful industry government collaboration is dependent on information sharing, planning, investment in emerging technologies, and allocation of resources (and roles and responsibilities) coordinated by both the public and private sectors in special working cybersecurity partnerships.
The cornerstone of industry/ government should be based on information sharing and knowledge transfer; sharing of cybersecurity tools, and sometimes combining mutual funding resources to build prototypes and build and fortify technologies that enhance security.
An enhanced and streamlined government and industry partnership should continue to be a priority for cybersecurity strategies in 2023, as threats can morph, especially with the emergence of technologies such as artificial intelligence, machine learning, 5G, and eventually quantum computing.
When it comes to adapting to new, sophisticated digital environments, AI and ML become key tools or innovative chess pieces in a cybersecurity strategy game. It will depend on the accuracy, speed, and the quality of the algorithms and supporting technologies to survive and thrive. To be competitive in a sophisticated game we need to be vigilant, innovative, and one step ahead.
AI, ML, and augmented reality technologies are no longer things of science fiction. AI and ML may become new paradigms for automation in cybersecurity. They enable predictive analytics to draw statistical inferences to mitigate threats with fewer resources.
Artificial intelligence is really a catalyst for cybersecurity. Everything you do is based on the threat horizon. You need to know what is in your system, and who may be doing things that are anomalies. Automated cybersecurity tools of threat detection, information assurance, and resilience can be the glues that will enable business to optimally utilize emerging technologies to operate safely in a world of converged sensors and algorithms in 2023.
While AI and ML can be important tools for cyber-defense, they can also be a double-edged sword. While they can be used to rapidly identify threat anomalies and enhance cyber defense capabilities, threat actors can also use them. Adversarial nations and hackers are already using AI and MI as tools to find and exploit vulnerabilities in threat detection models. They do this through a variety of methods. Their preferred ways are often via automated phishing attacks that mimic humans, and with malware that self-modifies itself to fool or even subvert cyber-defense systems and programs.
Botnet attacks are not new, but they are proliferating and becoming more dangerous as they are often automated. Look for more attacks by Bots in 2023. Bots are not only cyber-threat tools used by state sponsored intelligence actors, but also by organized criminal hacking groups.
A recent study by Accenture highlighted how Ransomware actors are growing bolder and sophisticated in their attacks on OT and IT environments. The report noted that criminal gangs cooperate and share commercial hacking tools (such as the pirated Cobalt Strike malware) via the Dark Web. Their targets include critical infrastructure sectors, including manufacturing, finance, energy, and agriculture. The study also says that hackers are using more aggressive high-pressure tactics to escalate infection consequences and that often they deploy multiple pressure points at once to extract ransom payments. In some cases, they are also using double and triple extortion threats. Ransomware attackers are growing bolder and using new extortion methods - TechRepublic
Updating of legacy systems and assimilation of emerging technologies such as 5G and artificial intelligence into security platforms will be prioritized. There are many shiny new toys and tools for cybersecurity operators. The challenge will be knowing how to best orchestrate those tools and understanding what is available to best mitigate industry-specific threats.
More automation and visibility tools will be deployed for expanding protection of remote employee offices, and for alleviating workforce shortages. Automation tools are being bolstered in capabilities by artificial intelligence and machine learning algorithms.
Cybersecurity is a critical issue that USDOT and automotive companies are working to address for the future safe deployment of these technologies. Advanced vehicle safety technologies depend on an array of electronics, sensors, and computing power. In advancing these features and exploring the potential of full automation, USDOT and NHTSA are focused on cybersecurity to ensure that companies appropriately safeguard these systems to be resilient and work as intended. You can read more about our approach by visiting NHTSA's vehicle cybersecurity topic.
As part of our continuing mission to reduce cybersecurity risk across U.S. critical infrastructure partners and state, local, tribal, and territorial governments, CISA has compiled a list of free cybersecurity tools and services to help organizations further advance their security capabilities. This living repository includes cybersecurity services provided by CISA, widely used open source tools, and free tools and services offered by private and public sector organizations across the cybersecurity community. CISA will implement a process for organizations to submit additional free tools and services for inclusion on this list in the future.
After making progress on the measures above, organizations can use the free services and tools listed below to mature their cybersecurity risk management. These resources are categorized according to the four goals outlined in CISA Insights: Implement Cybersecurity Measures Now to Protect Against Critical Threats:
One of the most problematic elements of cybersecurity is the evolving nature of security risks. As new technologies emerge, and as technology is used in new or different ways, new attack avenues are developed. Keeping up with these frequent changes and advances in attacks, as well as updating practices to protect against them, can be challenging. Issues include ensuring all elements of cybersecurity are continually updated to protect against potential vulnerabilities. This can be especially difficult for smaller organizations without adequate staff or in-house resources. 2ff7e9595c
Comments