![]() ![]() ![]() Q: How should cybersecurity executives approach spending?Ī: Some people go ask the CFO for money and treat it as if they’re going to a venture capitalist. In the future, a bridge could autonomously learn it isn’t one of us and alert us to the fact that someone that neither of us knows is on the call. We didn’t know who that was-we had to learn who it was by asking questions. The authentication method for this call is a passcode. That’s a good example of what I’m talking about. Someone who introduces themselves as Nick from California determines they’re on the wrong call and hangs up. Harkins stops the conversation and asks who joined the call. They’re also working on authentication tools where you can learn who a person is by seeing how they type, when they’re on the computer and what activities they’re engaging in. In that way, they can recognize and learn what’s sensitive. But because we know the signatures can be changed pretty easily to get past this software, you’ve got some companies working on using AI to learn the content and context of what’s in that Word document. ![]() With traditional data loss prevention software, if I’ve labeled it as a restrictive secret it would look for that signature. Take something that’s harder, like a Word document that has a business strategy in it. A Social Security number is easy to scan for, because it’s basically a fingerprint. These companies are in essence scanning your internal environment. Q: What are some promising ways companies might soon apply AI to cybersecurity?Ī: Some organizations are starting to use AI to learn what is sensitive data, what’s personal information or top secret. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |