How Cybersecurity Is Evolving: The Real Lesson of Machine Learning


Even worse, how often do we hear about major data breaches with unprotected or misconfigured servers? Here's an example just last week where records for 57 million American residents were revealed by a search engine that scans for connected devices and open servers. It found at least three IP addresses with identical clusters misconfigured for public access. With 73GB of data, the service held data on almost 57 million US citizens, containing information including first and last name, employers, job title, email, address, state, ZIP code, phone number, and IP address. Another index of the same database included over 25 million business records, which held details on companies including employee counts, revenue numbers, and carrier routes.

60 Cybersecurity Predictions For 2019


I've always been a loner, avoiding crowds as much as possible, but last Friday I found myself in the company of 500 million people. The breach of the personal accounts of Marriott and Starwood customers forced us to join the 34% of U.S. consumers who experienced a compromise of their personal information over the last year. Viewed another way, there were 2,216 data breaches and more than 53,000 cybersecurity incidents reported in 65 countries in the 12 months ending in March 2018. How many data breaches we will see in 2019 and how big are they going to be? No one has a crystal ball this accurate and it's difficult to make predictions, especially about the future. Still, I made a brilliant, contrarian, and very accurate prediction last year, stating unequivocally that "there will be more spectacular data breaches" in 2018. Just like last year, this year's 60 predictions reveal the state-of-mind of key participants in the cybersecurity industry (on the defense team, of course) and cover all that's hot today. Topics include the use and misuse of data; artificial intelligence (AI) and machine learning as a double-edge sword helping both attackers and defenders; whether we are going to finally "get over privacy" or see our data finally being treated as a private and protected asset; how the cloud changes everything and how connected and moving devices add numerous security risks; the emerging global cyber war conducted by terrorists, criminals, and countries; and the changing skills and landscape of cybersecurity.

Symantec develops neural network to thwart cyberattack-induced blackouts


Symantec is rolling out a new product that it says will help enterprises protect public infrastructure from cyber attacks and cyberattack-induced blackouts. The Industrial Control System Protection (ICSP) Neural is a device that scans for malware on USB devices to block attacks on IoT and operational technology environments. Today's security threats have expanded in scope and seriousness. There can now be millions -- or even billions -- of dollars at risk when information security isn't handled properly. The cybersecurity firm said the ICSP station functions as a neural network, using artificial intelligence to detect USB-borne malware and sanitize the devices.

What do AI, blockchain and GDPR mean for cybersecurity?


It's possible that someone may be watching your screen--by listening to it. A recent study from cybersecurity analysts at the universities of Michigan, Pennsylvania and Tel Aviv found that LCD screens "leak" a frequency that can be processed by artificial intelligence to provide a hacker insight into what's on a screen. "Displays are built to show visuals, not emit sound," says Roei Schuster, a PhD candidate at Tel Aviv University and a co-author of the study with doctoral candidates Daniel Genkin, Eran Tromer and Mihir Pattani. Yet the team's study shows that's not the case. The researchers were able to collect the noise through either a built-in or nearby microphone or remotely over Google Hangouts, for example.

Humans vs. Machines: AI and Machine Learning in Cybersecurity CDOTrends


Artificial Intelligence (AI) is at the frontier of a new techno-tsunami that is transforming the way we live and work. "Historically, an AV researcher might see 10,000 viruses in a career. Today there are over 700,000 per day," said Ryan Permeh, chief scientist, Cylance. Could AI be the solution to solving the big data problem, and bridging the widening workforce gap in the Cyber Security industry? Intelligent machines now have the power to make observations, understand requests, reason, draw data correlations, and derive conclusions.

Does AI Pose More of a Threat to Cybersecurity Than We Think? - CPO Magazine


We often think about artificial intelligence (AI) in terms of the benefits it can provide by helping us complete tasks more efficiently. It's important to remember, though, that this technology can be used just as easily for malicious ends. Could it pose more of a cybersecurity threat than we think? Because AI can learn on its own and use that knowledge to complete tasks autonomously, it can help us complete work more efficiently, more cost-effectively, more accurately and with less hands-on effort. Those benefits apply to virtually every sector.

You say, 'AI'. I say, 'Machine learning'. They say, 'Cybersecurity'... What does it all mean?


Sponsored "Machine learning is eating the world," writes Clarence Chio in Machine Learning and Security with David Freeman, who heads a team of ML engineers charged with detecting and preventing fraud and abuse across LinkedIn. Chio went on to write that in fact: "Cybersecurity is also eating the world," and he has a point. The UK's National Cyber Security Centre (NCSC) claimed, on its second anniversary in October 2018, it had stopped more than 10 attacks per week, primarily from hostile nation states. Perhaps, unsurprisingly, the rise in threats has led to a boom in sales of cybersecurity software: it will be a $248bn (£194bn) industry by 2023, according to Markets and Markets research. Within this, the future for machine learning is bright.

Inside Chronicle, Alphabet's cybersecurity moonshot


Fifteen years ago, cybersecurity could be boiled down to a simple strategy: Secure the perimeter. Experts fought against malware and other nefarious code by implementing firewalls and other point-of-entry defenses. Since then, however, companies have moved their operations online and allowed employees to bring their own devices (BYOD) to work. The so-called perimeter has dissolved in the process, forcing security practitioners to prioritize tracking, understanding and ultimately making judgments about the information flowing both inside and outside of their company. Many businesses use 10, 20 or 30 different security products to protect their systems. They all have advantages, and security practitioners will use different combinations to investigate a potential threat. If a team has access to 15 tools, for instance, one engineer might think to use three of them while another tries a completely different subset. There isn't enough time to try them all, so experts pick products based on their experience and what they believe will be best suited to the task. It's a messy problem that doesn't have a simple answer.

Marriott Starwood hack: Booking database data compromised in cyber attack that could affect half a billion people

The Independent

A booking database run by the Marriott hotel chain has been hit by a vast hack that could affect half a billion people. The vast collection of people's personal information, used to book rooms at its Starwood properties, has been accessed by unauthorised people since 2014, it said. The cyberattack included information about those people's credit cards that could be used to steal money, Marriott warned. Uber has halted testing of driverless vehicles after a woman was killed by one of their cars in Tempe, Arizona. The I.F.O. is fuelled by eight electric engines, which is able to push the flying object to an estimated top speed of about 120mph The giant human-like robot bears a striking resemblance to the military robots starring in the movie'Avatar' and is claimed as a world first by its creators from a South Korean robotic company Waseda University's saxophonist robot WAS-5, developed by professor Atsuo Takanishi and Kaptain Rock playing one string light saber guitar perform jam session A man looks at an exhibit entitled'Mimus' a giant industrial robot which has been reprogrammed to interact with humans during a photocall at the new Design Museum in South Kensington, London Electrification Guru Dr. Wolfgang Ziebart talks about the electric Jaguar I-PACE concept SUV before it was unveiled before the Los Angeles Auto Show in Los Angeles, California, U.S The Jaguar I-PACE Concept car is the start of a new era for Jaguar.

Cybersecurity overtakes artificial intelligence as law firms' tech priority


Investment in defences against cyberattacks has overtaken artificial intelligence as the main technology issue for law firms, a report reveals today. Cybersecurity was the area cited most often by leaders of the UK's biggest law firms when researchers asked how they were allocating their technology budgets. Artificial intelligence, broadly seen as the must-have technology function over the last 12 months, was relegated to fourth place on the investment league table. Law firm leaders at the top-50 practices in the country cited "client collaboration tools" -- software packages that share information between in-house lawyers and law firms -- and automated document production as being more important that AI.