Healthcare cybersecurity is in triage mode. As systems are stretched to the limits by COVID-19 and technology becomes an essential part of everyday patient interactions, hospital and healthcare IT departments have been left to figure out how to make it all work together, safely and securely. Most notably, the connectivity of everything from thermometers to defibrillators is exponentially increasing the attack surface, presenting vulnerabilities IT professionals might not even know are on their networks. Get the whole story and DOWNLOAD the eBook now – on us!] The result has been a newfound attention from ransomware and other malicious actors circling and waiting for the right time to strike. Rather than feeling overwhelmed in the current cybersecurity environment, it's important for healthcare and hospital IT teams to look at security their networks as a constant work in progress, rather than a single project with a start and end point, according to experts Jeff Horne from Ordr and G. Anthony Reina who participated in Threatpost's November webinar on Heathcare Cybersecurity. "This is a proactive space," Reina said. "This is something where you can't just be reactive. You actually have to be going out there, searching for those sorts of things, and so even on the technologies that we have, you know, we're, we're proactive about saying that security is an evolving, you know, kind of technology, It's not something where we're going to be finished." Healthcare IT pros, and security professionals more generally, also need to get a firm handle on what lives their networks and its potential level of exposure. The fine-tuned expertise of healthcare connected machines, along with the enormous cost to upgrade hardware in many instances, leave holes on a network that simply cannot be patched. "Because, from an IT perspective, you cannot manage what you can't see, and from a security perspective, you can't control and protect what you don't know," Horne said. Threatpost's experts explained how healthcare organizations can get out of triage mode and ahead of the next attack. The webinar covers everything from bread and butter patching to a brand-new secure data model which applies federated learning to functions as critical as diagnosing a brain tumor. Alternatively, a lightly edited transcript of the event follows below. Thank you so much for joining. We have an excellent conversation planned on a critically important topic, Healthcare cybersecurity. My name is Becky Bracken, I'll be your host for today's discussion. Before we get started, I want to remind you there's a widget on the upper right-hand corner of your screen where you can submit questions to our panelists at any time. We encourage you to do that. You'll have to answer questions and we want to make sure we're covering topics most interesting to you, OK, sure. Let's just introduce our panelists today. First we have Jeff Horne. Jeff is currently the CSO at Ordr and his priors include SpaceX.
Words for health and the human body often make their way into the language we use to describe IT. Computers get viruses; companies manage their security hygiene; incident response teams train on their cyber fitness. Framing IT concepts in terms of health can also be useful when looking at security operations centers (SOCs) and jobs in cybersecurity. For many businesses and other entities today, SOCs are not the healthiest they could be. Jobs in cybersecurity can be stressful and overwhelming due to the volume of alerts.
Artificial intelligence is probably the future of security software regarding how many processes it can improve and how little resources it requires. Positively, it will be integrated into the advanced antivirus programs and take on more and more features. Although not all the antiviruses have AI integrated, it is still essential to protect personal gear and information from intruders and hacker attacks. If you need to find a porter antivirus, read professional and common user reviews. This way, you'll be able to see how good is AVG antivirus, Avast, or any other one, before AI can handle all the security processes. So, for starters, artificial intelligence can be classified into two types.
The future of corporate cybersecurity seems to lie in artificial intelligence (AI) and machine learning (ML) solutions, a new report from global IT company Wipro suggests. According to Wipro's annual State of Cybersecurity Report (SOCR), almost half (49 percent) of all cybersecurity-related patents filed in the last four years have centered on AI and ML application. Almost half of the 200 organizations that participated in the report also said they are expanding cognitive detection capabilities to tackle unknown attacks in their Security Operations Centers (SOC). From a global perspective, one of the main threats for organizations in the private sector seems to be potential espionage attacks from nation-states. Almost all (86 percent) cyberattacks that came from state-sponsored actors fall under the espionage category and almost half (46 percent) of those attacks targeted the private sector.
International Business Machines (IBM) - Get Report and Advanced Micro Devices (AMD) - Get Report said they began a development program focused on cybersecurity and artificial intelligence. The development agreement will build on "open-source software, open standards, and open system architectures to drive confidential computing in hybrid cloud environments," the companies said in a statement. The agreement also will "support a broad range of accelerators across high-performance computing and enterprise critical capabilities, such as virtualization and encryption," they said. AMD, Santa Clara, Calif., is one of the world's biggest chipmakers and is thriving. IBM, the storied Armonk, N.Y., technology services company, has struggled to regain the glory of its past, when it led the computer-making industry.
Wipro Limited, a leading global information technology, consulting and business process services company, released its annual State of Cybersecurity Report (SOCR) that presents changing perspectives of cybersecurity globally. The report provides fresh insights on how Artificial Intelligence (AI) will be leveraged as part of defender stratagems as more organizations lock horns with sophisticated cyberattacks and become more resilient. There has been an increase in R&D with 49% of the worldwide cybersecurity related patents filed in the last four years being focussed on AI and Machine Learning (ML) application. Nearly half the organisations are expanding cognitive detection capabilities to tackle unknown attacks in their Security Operations Center (SOC). The report also illustrates a paradigm shift towards cyber resilience amid the rise in global remote work. It considers the impact of COVID-19 pandemic on cybersecurity landscape around the globe and provides a path for organizations to adapt with this new normal.
The Internet of Things is becoming smarter and more complex. Smart device technology is growing at massive levels. Organizations are embedding artificial intelligence or machine learning into their IoT applications and are realizing competitive advantages--including improved operational productivity. Over the past decade, large corporations have been acquiring smaller companies that had been working at the crossing point of artificial intelligence and IoT. Furthermore, major merchants of IoT services are now also providing advanced AI capabilities such as machine-based learning analytics.
Organizations continue to embrace the Internet of Things (IoT), the cloud, and mobile technology. This has influenced considerable changes in the threat landscape and created more vulnerability points. Cybercriminals are leveraging these new vulnerability points to develop and launch sophisticated, high-volume, multi-dimensional attacks. Such attacks mean that data is at risk, and organizations must analyze potentially malicious files. Using artificial intelligence software, organizations can process large volumes of threat data and adequately prevent and respond to breaches and hacks.
FREMONT, CA: Cybercriminals are developing new and sophisticated ways to access controls, firewalls, and jeopardizing highly secure networks. AI-powered solutions are necessary to solve security issues and provide opportunities to develop more robust solutions. AI will substantially boost security systems, minimizing criminal intelligence using million of resources in case of an attack or malicious behavior. AI can enhance and track important processes in the data center. Its calculative powers and constant monitoring abilities offer insights into what would optimize hardware and infrastructure efficiency and security.
The year 2020 has inarguably been an unprecedented year for humanity. With a global pandemic upending people's lives, the cyber world has been no less affected. On the upside, the virus-enforced digital transition in nearly all aspects of our lives has created massive momentum and scale for the uptake of cyber technologies. However, the downside is the increased opportunities this creates for unethical hackers and cyber criminals. In this backdrop, how is the cyber security landscape going to unfold this year?