point
Menu
Browse by year:

February - 2017 - issue > CIO Insights

Machine-Learning & a Dash of Ambience Mixed With Behavioral Analytics; A Recipe To Cover All Threats?

Santosh Varughese, CIO, Cognetyx
Wednesday, February 8, 2017
Santosh Varughese, CIO, Cognetyx
Headquartered in the U.S., Cognetyx is a virtual defense shield that is cognitive, adaptive and evolving which monitors & surveys all user activity and interactions across your information ecosystem in real-time. The entity protects information assets against cyber security threats, data breaches and privacy violations.

Since cybersecurity threats have become a topic of nightly newscasts, no longer is anyone shocked by their scope and veracity. What is shocking is the financial damage the attacks are predicted to cause as they reverberate throughout the economy. Cyber security ventures predicts global annual cybercrime costs will grow from $3 trillion in 2015 to $6 trillion annually by 2021, which includes damage and destruction of data, stolen money, lost productivity and theft of intellectual property, personal and financial data, embezzlement and fraud. That doesn't even include post-attack disruption to the normal course of business, forensic investigation, restoration and deletion of hacked data, systems and reputational harm.

While traditional security filters like firewalls and reputation lists are good practice, they are no longer enough. Hackers increasingly bypasses perimeter security, enabling cyber thieves to pose as authorized users with access to corporate networks for unlimited periods of time. Organizational threats manifest themselves through changing and complex signals that are difficult to detect with traditional signature-based and rule-based monitoring solutions. These threats include external attacks that evade perimeter defenses and internal attacks by malicious insiders or negligent employees.

CIOs and CISOs need to pick up where those traditional security tools end and realize that it's the data that is ultimately at risk. Cloud deployed security shields need to be placed where the data resides as opposed to monitoring data traveling across the network. The safeguarding of the data is as important, if not more imperative, than just protecting the network or the perimeter.

CIOs need to pick up where those traditional security tools end and investigate AI cybersecurity digital safety nets. IDC forecasts global spending on cognitive systems will reach nearly $31.3 billion in 2019. Some cyber security sleuths deploy a variety of traps, including identifying an offensive file with a threat intelligence platform using signature-based detection and blacklists that scans a computer for known offenders. This identifies whether those types of files exist in the system which are driven by human decisions.


Share on Twitter
Share on LinkedIn
Share on facebook