


How artificial intelligence will help enterprises fight ransomware and prevent cloud security breaches
Every year, the cybersecurity world faces new challenges and obstacles that businesses need to deal with, and we’re seeing, for example, how 2021 is shaping up to be an incredibly dangerous year. Most notably, ransomware has been a hot topic in the industry following a series of high-profile incidents involving organizations such as Kaseya and the Irish Health Service falling victim.
Additionally, the ransomware attack against JBS Corporation clearly demonstrates the potential severity of supply chain attacks. More broadly, the ongoing shift to hybrid working and rapid adoption of cloud computing also means businesses must re-evaluate their security infrastructure to ensure remote workers are adequately protected.
So, how will the lessons of 2021 shape the cybersecurity landscape in the years to come? Here are five aspects of cybersecurity that will evolve in the near future.
1. Cloud security will face increasing pressure
First, ransomware will turn to stealing and encrypting cloud data. Although this sometimes occurs through attacks on third-party data processors (as we saw Labor Party members' data being held to ransom). Next, we will see that under the "shared responsibility" model, client data will increasingly be directly attacked by ransomware gangs.
2. Take proactive steps to minimize ransomware attacks
In terms of protecting against ransomware, we will increasingly see There will be a public crackdown on ransomware gangs, and formal oversight of information security will increase due to the prevalence of ransomware attacks. However, we will also see that many public sectors are ill-prepared to deal with this threat. Finally, we will see that the consequences of ransomware relative to data loss or breach will be relatively reduced, because human-operated ransomware is detected and stopped before it can successfully explode.
It will become increasingly important for enterprises to have a defense-in-depth security architecture that covers the network and endpoints and can quickly detect and stop these attacks. The focus is on prevention rather than performing time-consuming recovery operations from backups or, worse, having to pay a ransom. Business continuity plans must be constantly adjusted to properly account for the heightened risk ransomware poses to individual businesses, while investing appropriately to prevent and minimize downtime caused by attacks.
3. Enterprises have growing demand for managed detection and response services and automation
In addition to ransomware, although The number of managed security services will continue to grow, but key subsidiaries of organizations will face a shortage of talent in the areas of automation, orchestration, and analyst-augmented artificial intelligence. Businesses will recognize that outsourcing a business environment to an external entity can be difficult and that a few well-equipped and supported internal resources can be more effective than a large number of external resources.
4. More use of artificial intelligence to combat malicious use of multi-factor authentication (MFA)
Another area of concern is around multi-factor authentication Factor Authentication (MFA). Some major tech giants like Microsoft and Google are implementing MFA. This is largely because attackers continue to successfully steal credentials and bypass basic authentication processes. However, while MFA is a step that every company should take - criminals continue to prove that it is not enough to keep them at bay. outside the door. In some cases, criminals are even using bots to help them deal with MFA issues, which will continue to be an uphill battle for businesses. As a result, we will see more enterprises turn to AI-powered security tools to help stop attacks that bypass MFA.
5. Governments and regulators pay more attention to cybersecurity
After multiple attacks on the nation’s critical infrastructure, President Biden The executive order on improving cybersecurity issued in May 2021 aims to significantly improve cybersecurity standards. We expect to see other governments taking an increasingly robust approach to meaningful and effective cybersecurity controls, aiming to be more resilient in the face of serious cyberattacks. Initiatives by UK regulators, such as the Penetration Stress Testing Mechanism (CBEST) in financial services and the TBEST regime in telecoms, which will promote a security threat intelligence-led approach to objectively assess vulnerability to attack, will almost certainly Expand to other key departments.
Always Be Prepared Prepare to ensure you have the best protection against potential threats. To achieve this, organizations should look to implement a detection and response strategy. This often involves using a combination of artificial intelligence and machine learning (ML) techniques to look for these intersectional operations that are authorized but exhibit suspicious behavior, as well as certain behaviors that an adversary will exhibit in launching an attack.
If businesses believe they have been compromised and actively look for signs, they will be in a better position to detect attacks and then stop them before they cause damage.
The above is the detailed content of How artificial intelligence will help enterprises fight ransomware and prevent cloud security breaches. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics

This site reported on June 27 that Jianying is a video editing software developed by FaceMeng Technology, a subsidiary of ByteDance. It relies on the Douyin platform and basically produces short video content for users of the platform. It is compatible with iOS, Android, and Windows. , MacOS and other operating systems. Jianying officially announced the upgrade of its membership system and launched a new SVIP, which includes a variety of AI black technologies, such as intelligent translation, intelligent highlighting, intelligent packaging, digital human synthesis, etc. In terms of price, the monthly fee for clipping SVIP is 79 yuan, the annual fee is 599 yuan (note on this site: equivalent to 49.9 yuan per month), the continuous monthly subscription is 59 yuan per month, and the continuous annual subscription is 499 yuan per year (equivalent to 41.6 yuan per month) . In addition, the cut official also stated that in order to improve the user experience, those who have subscribed to the original VIP

Improve developer productivity, efficiency, and accuracy by incorporating retrieval-enhanced generation and semantic memory into AI coding assistants. Translated from EnhancingAICodingAssistantswithContextUsingRAGandSEM-RAG, author JanakiramMSV. While basic AI programming assistants are naturally helpful, they often fail to provide the most relevant and correct code suggestions because they rely on a general understanding of the software language and the most common patterns of writing software. The code generated by these coding assistants is suitable for solving the problems they are responsible for solving, but often does not conform to the coding standards, conventions and styles of the individual teams. This often results in suggestions that need to be modified or refined in order for the code to be accepted into the application

To learn more about AIGC, please visit: 51CTOAI.x Community https://www.51cto.com/aigc/Translator|Jingyan Reviewer|Chonglou is different from the traditional question bank that can be seen everywhere on the Internet. These questions It requires thinking outside the box. Large Language Models (LLMs) are increasingly important in the fields of data science, generative artificial intelligence (GenAI), and artificial intelligence. These complex algorithms enhance human skills and drive efficiency and innovation in many industries, becoming the key for companies to remain competitive. LLM has a wide range of applications. It can be used in fields such as natural language processing, text generation, speech recognition and recommendation systems. By learning from large amounts of data, LLM is able to generate text

Large Language Models (LLMs) are trained on huge text databases, where they acquire large amounts of real-world knowledge. This knowledge is embedded into their parameters and can then be used when needed. The knowledge of these models is "reified" at the end of training. At the end of pre-training, the model actually stops learning. Align or fine-tune the model to learn how to leverage this knowledge and respond more naturally to user questions. But sometimes model knowledge is not enough, and although the model can access external content through RAG, it is considered beneficial to adapt the model to new domains through fine-tuning. This fine-tuning is performed using input from human annotators or other LLM creations, where the model encounters additional real-world knowledge and integrates it

Machine learning is an important branch of artificial intelligence that gives computers the ability to learn from data and improve their capabilities without being explicitly programmed. Machine learning has a wide range of applications in various fields, from image recognition and natural language processing to recommendation systems and fraud detection, and it is changing the way we live. There are many different methods and theories in the field of machine learning, among which the five most influential methods are called the "Five Schools of Machine Learning". The five major schools are the symbolic school, the connectionist school, the evolutionary school, the Bayesian school and the analogy school. 1. Symbolism, also known as symbolism, emphasizes the use of symbols for logical reasoning and expression of knowledge. This school of thought believes that learning is a process of reverse deduction, through existing

Editor |ScienceAI Question Answering (QA) data set plays a vital role in promoting natural language processing (NLP) research. High-quality QA data sets can not only be used to fine-tune models, but also effectively evaluate the capabilities of large language models (LLM), especially the ability to understand and reason about scientific knowledge. Although there are currently many scientific QA data sets covering medicine, chemistry, biology and other fields, these data sets still have some shortcomings. First, the data form is relatively simple, most of which are multiple-choice questions. They are easy to evaluate, but limit the model's answer selection range and cannot fully test the model's ability to answer scientific questions. In contrast, open-ended Q&A

According to news from this site on August 1, SK Hynix released a blog post today (August 1), announcing that it will attend the Global Semiconductor Memory Summit FMS2024 to be held in Santa Clara, California, USA from August 6 to 8, showcasing many new technologies. generation product. Introduction to the Future Memory and Storage Summit (FutureMemoryandStorage), formerly the Flash Memory Summit (FlashMemorySummit) mainly for NAND suppliers, in the context of increasing attention to artificial intelligence technology, this year was renamed the Future Memory and Storage Summit (FutureMemoryandStorage) to invite DRAM and storage vendors and many more players. New product SK hynix launched last year

Editor | KX In the field of drug research and development, accurately and effectively predicting the binding affinity of proteins and ligands is crucial for drug screening and optimization. However, current studies do not take into account the important role of molecular surface information in protein-ligand interactions. Based on this, researchers from Xiamen University proposed a novel multi-modal feature extraction (MFE) framework, which for the first time combines information on protein surface, 3D structure and sequence, and uses a cross-attention mechanism to compare different modalities. feature alignment. Experimental results demonstrate that this method achieves state-of-the-art performance in predicting protein-ligand binding affinities. Furthermore, ablation studies demonstrate the effectiveness and necessity of protein surface information and multimodal feature alignment within this framework. Related research begins with "S
