A software program dubbed'Mayhem' was poised to win the final round of a three-year contest to teach computers to launch and defend against cyber attacks, earning a 2 million prize for the team that wrote the winning code. The event, known as the Cyber Grand Challenge, concluded Thursday evening in a Las Vegas convention centre ballroom after a digital battle among software programs running on seven supercomputers on a stage in a Las Vegas ballroom. Thousands watched as announcers presented a play-by-play account of the competition. The event, known as the Cyber Grand Challenge, concluded Thursday evening in a Las Vegas convention centre ballroom after a digital battle among software programs. For almost 10 hours, competitors played the classic cybersecurity exercise of Capture the Flag in a specially created computer testbed laden with an array of bugs hidden inside custom, never-before-analyzed software.
Artificial intelligence and machine learning technologies are being integrated into many aspects of our everyday lives. If you use Siri or Amazon Echo, you've already been touched by AI to some degree. One area where this so-called "smart" technology has become particularly valuable is in the realm of cybersecurity. But despite the buzz, it's important to understand the real capabilities of intelligent automation in security.
You may have heard about the Internet of Things (IoT). But you may also have wondered about what it is. Or for that matter, what does it mean to you or an organization. This course is for you if you are curious about the most recent trends and activities in the internet capabilities and concerns about programmed devices. There are complexities and areas of necessary awareness when the industrial sector becomes connected to your home.
Dave Mihelcic is the head of federal strategy and technology at Juniper Networks. If the recent spate of alleged Russian cyberattacks has taught us anything, security breaches can happen so quickly and stealthily, the damage will be done before anyone even realizes there was a hack. In fact, as malicious actors become more insidious, federal network security managers are finding the reaction time between identifying and mitigating potential threats has gone from minutes to milliseconds. Factor in the volume and complexity of the threats, and it becomes evident the challenge has grown well beyond what can be managed through manual intervention. To successfully combat these challenges, cyber operators should consider incorporating machine-learning capabilities into their toolkit.
It's hard to remember the days when artificial intelligence seemed like an intangible, futuristic concept. This has been decades in the making, however, and the past 90 years have seen both renaissances and winters for the field of study. At present, AI is launching a persistent infiltration into our personal lives with the rise of self-driving cars and intelligent personal assistants. In the enterprise, we likewise see AI rearing its head in adaptive marketing and cybersecurity. The rise of AI is exciting, but people often throw the term around in an attempt to win buzzword bingo, rather than to accurately reflect technological capabilities.