AI a dual-edged weapon in computer protection

Dmitry Berezin, global security solutions expert at Kaspersky.

International security solutions analyst at Kaspersky, Dmitry Berezin.

AI can be used to evade detection, breach infrastructure, and build social engineering attacks against users. It’s a double-edged sword in digital security, but it can also be used to improve defenses and implement procedures to improve operations.

Dmitry Berezin, a Kaspersky expert on international security options, will discuss this subject at the 20th monthly on May 28 at the CTICC, and on June 3 at the Sandton Convention Center.

Berezin will also address how AI can be used by cybercriminals to hack into organizations ‘ equipment, to get information from both regular people and industry experts, and how it can be used in various social engineering attacks.

” This is only the first part,” the statement read. The change in technology used by the hackers is related to this, Berezin says,” You don’t need to be a software engineer to be a strong hacker anymore.” They don’t need to be a software developer to be a strong hacker anymore.

The Kaspersky specialist will also discuss defense.

Berezin goes on to discuss how to tell if someone is not a real man, how to tell if you are vulnerable to hacking attacks, and how AI-powered security tools may aid security centers. ” In our everyday activities, we are using AI but frequently… for example, you are probably no talking to a real person when you call your lender to ensure a deal, but AI that is using voice recognition to confirm your identity.”

The advancing technology can be used to automate daily duties, from transcribing and using images in project managers ‘ presentations to wireless device words assistants.

AI-enabled virtual security devices

According to Berezin, AI-enabled virtual security devices are crucial because one can only fight AI with AI-powered cyber security.

Human beings move a little slower than humans, so they won’t be able to maintain the rate. Without computer protection AI, you will always be one step behind in an attack because AI is growing so quickly and in so many locations.

This is important because Kaspersky is seeing a significant rise in social engineering attacks involving AI.

Berezin continues,” Social engineering is not something that a surveillance tool is great at because it is about communicating with people, and sometimes that means using Facebook or Linked In, something that is not managed by the business cyber security.”

While having limited resources is still a challenge, the lack of AI training and awareness in organizations is another major obstacle.

Berezin claims that 60 % of SA businesses lack some form of education in AI and related security.

” That is why I believe that providing this kind of training is the first and main crucial stage. Businesses and businesses can use the free tool to teach individuals how to recognize that they are being attacked by social engineering or that AI is the “person” they are talking to rather than a genuine person.

supply of cybersecurity knowledge

Business leaders are put under more stress due to the availability of computer skills.

Berezin acknowledges that the lack of knowledge is a worldwide issue, and that when businesses invest in upskilling their workforce, they become frustrated when these skills are being sought after.

The amount of data that the usual cyber security team needs to analyze these days is “absolutely huge.” Imagine the amount of system traffic for a year, which amounts to petabytes of data, because it is terabytes of data and needs to be stored for a while. Safety has more difficulties, and they need to analyze as much as possible in an automatic manner, which requires the use of machine learning algorithms and AI.

Berezin emphasizes the strategic value of solutions that you prioritize threats and lower workload. The same rule applies to the cloud-based service managed detection and response ( MDR).

According to Berezin, the goal is to minimize the population’s task.

The seller should take care of security concerns like monitoring, immediate response, and threat hunting when using cloud-based protection, according to the expectation. Given that sellers continue to use AI to reduce the number of false positives that need to be analyzed by citizens, technology is used extensively.

Berezin adds that business customers would prefer to keep these characteristics internally because they also want to raise their level of protection but are reluctant to outsource these tasks to cloud sellers.

” The cloud company must receive training, and this cannot be withheld.” Additional training is also required for on-the-job experience.

to file and find out more about the mountain.

Leave a Comment