What can humans do in the age of machine-versus-machine security?

Tom Allen
clock • 1 min read
What can humans do in the age of machine-versus-machine security?
Image:

What can humans do in the age of machine-versus-machine security?

AI-driven attacks are fast, difficult to spot and launched at scale. Toby Lewis of Darktrace argues that a defensive AI is the best and only possible response

Artifical intelligence offers a step change in the way we approach security - but criminals take the same approach. The emergence of AI-enhanced malware is making cyber-attacks exponentially more dangerous, and harder to identify.

As AI-driven attacks evolve, they will be almost indistinguishable from genuine activity, and conducted at an unprecedented speed and scale. In the face of offensive AI, CISO's must look to defensive AI that can fight back, detect even the most subtle indicators of attack in real-time, and respond with surgical precision to neutralise threats - wherever they strike. 

In this session, recorded at last week's Cybersecurity Festival - Chapter 2, Darktrace's head of threat analysis Toby Brewer discusses how cyber-criminals are leveraging AI tools to create sophisticated cyber weapons; what an AI-powered spoofing threat may look like, and why humans will not be able to spot them; and why defensive AI technologies are uniquely positioned to fight back.

Please be aware that this video is sponsored by Darktrace. When you watch it, we, Incisive Media, will use the lawful basis of ‘legitimate interests' to pass your contact details on to them. Their use of your data will be governed by their privacy policy.

You may also like
Facebook chatbot claims to have a child with 'unique needs and abilities'

Social Networking

Moving fast and breaking things again

clock 19 April 2024 • 3 min read
Stability AI cutting staff in the name of restructuring

Corporate

Following the departure of CEO Emad Mostaque, UK AI unicorn is shedding employees

clock 19 April 2024 • 1 min read
Hackers launch brute-force attacks on business VPNs and more

Threats and Risks

The attacks rely on trial-and-error attempts to crack login credentials

clock 18 April 2024 • 2 min read
Most read

Sign up to our newsletter

The best news, stories, features and photos from the day in one perfectly formed email.

More on Security

Met police disrupt LabHost scam-as-a-service website

Met police disrupt LabHost scam-as-a-service website

Dozens arrested globally and thousands sent warnings

Penny Horwood
clock 18 April 2024 • 3 min read
Last chance to register for Cybersecurity Festival 2024

Last chance to register for Cybersecurity Festival 2024

Book your free place today

clock 18 April 2024 • 2 min read
Interview: Illumio, Security Excellence Awards finalist

Interview: Illumio, Security Excellence Awards finalist

'We are one team, delivering one platform, on one mission to ensure that organisations can realise a future without any high-profile breaches'

Computing Staff
clock 17 April 2024 • 5 min read