With the ever increasing complexity and volume of cyber attacks, companies are increasingly turning to automated solutions and artificial intelligence in the quest for more effective protection. But how effective is an automated approach and will it become the norm in future? We spoke to Eran Barak, CEO of incident response specialist Hexadite to find out. Are we nearing the end of traditional approaches to security? Until very recently, companies have been spending their security time, resources, and dollars on products that gather information that is then handed to a person to act upon.
Hexadite, the creator of the only agentless intelligent security orchestration and automation platform, announced today that it has established a Boston headquarters and appointed two new vice presidents with deep experience in the cybersecurity industry. Aaron Cote joined Hexadite from CarbonBlack as vice president of sales, and Nathan Burke brings experience from companies including Intralinks and CloudLock (recently acquired by Cisco) as vice president of marketing. Hexadite empowers incident response teams that are locked in an unfair fight against an ever-increasing volume of security alerts. The rise in cyber-attacks and the subsequent alerts they produce from an array of different detection tools have reached a volume that is simply impossible for humans to match. It improves security by ensuring that every alert is properly investigated while giving time back to security teams so they can focus on more strategic tasks.
Keen Footwear sells its iconic boots, shoes and sandals through thousands of retailers worldwide. But the Oregon manufacturer, which is working hard to honor its commitment to become "American Built," does not have the manpower to support a dedicated information security staff. With a team of six information technology professionals -- all but two focused on handling the day-to-day client issues of its 450 employees -- the IT staff would fall behind in triaging incidents the company's security software flagged. "We fit squarely in the realm that we have the problems of all the big players, but we don't have the resources of a large enterprise," said Clark Flannery, Keen's director of IT in Portland. To solve the problem, Flannery augmented his IT staff with machines.
While walking around the larger industry shows, those hosting say more than 140 vendors, it doesn't take long to realise that artificial intelligence and machine-learning are the current'it' girls of the cyber-security industry. In an effort to define what'artificial intelligence' actually is, Luger & Stubblefield described in their 2004 book on artificial intelligence, that an ideal "intelligent" machine is a flexible rational agent that perceives its environment and takes actions that maximise its chance of success at some goal based on a complex set of calculations. As notifications from UBA, SIEM and threat intelligence systems continue to grow, artificially intelligent systems are being touted as the solution to the fatigue experienced by SOC teams who have to try and figure out what to do with each threat, and whether or not they should investigate it further. Research from security company Hexadite, a security automation company, claimed that 37 percent of cyber-security professionals face 10,000 alerts per month" with 52 percent of alerts turning out to be false positive. He responded: "Highly repetitive and intricate tasks may be well suited for a machine rather than a human.
As consumer demand for the Internet of Things (IoT) increases, more and more enterprises are joining in on the movement, transforming their outdated business models, improving operational efficiency and generating additional revenue streams. In fact, Gartner predicts there will be 25 billion Internet-connected things by 2020, and nearly $2 trillion of economic benefit globally. Enterprises that fail to innovate and leverage the potential of the IoT as part of the digital business transformation run the risk of losing customers to competitors and frankly, becoming less relevant. Despite its economic potential, though, the IoT introduces serious enterprise security concerns. Every connected device serves as a potential entry point for malicious hackers, and as the IoT expands, so does its potential attack surface.