{"id":1754,"date":"2022-08-29T09:31:27","date_gmt":"2022-08-29T02:31:27","guid":{"rendered":"https:\/\/dt-corp.com.vn\/?p=1754"},"modified":"2022-08-29T09:31:27","modified_gmt":"2022-08-29T02:31:27","slug":"4-ways-ai-capabilities-transform-security","status":"publish","type":"post","link":"https:\/\/dt-corp.com.vn\/?p=1754","title":{"rendered":"4 Ways AI Capabilities Transform Security"},"content":{"rendered":"<div>Many industries have had to tighten belts in the \u201cnew normal\u201d. In cybersecurity, artificial intelligence (AI) can help.<\/div>\n<div><\/div>\n<div>Every day of the new normal we learn how the pandemic\u00a0<a href=\"https:\/\/www.ibm.com\/thought-leadership\/institute-business-value\/en-us\/c-suite-study\/cio\">sped up digital transformation,<\/a>\u00a0as reflected in the new opportunities and new risks. For many, organizational complexity and legacy infrastructure and support processes are the\u00a0<a href=\"https:\/\/www.ibm.com\/thought-leadership\/institute-business-value\/report\/cloud-security-cyber-resilience\">leading barriers to the effectiveness of their security.<\/a><\/div>\n<div><\/div>\n<div>Adding to the dynamics, short-handed teams are overwhelmed with\u00a0<a href=\"https:\/\/securityintelligence.com\/articles\/business-practices-support-cybersecurity-response\/\">too much data<\/a>\u00a0from disparate sources and an abundance of tools, yet a scarcity of insights. These challenges can easily exceed the skills of even the largest, best teams.<\/div>\n<div><\/div>\n<figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" class=\"i-amphtml-intrinsic-sizer\" style=\"box-sizing: border-box; max-width: 100%; display: block !important; height: auto; vertical-align: bottom; border-radius: inherit;\" role=\"presentation\" src=\"data:;base64,<svg height=\"331px\" width=\"774px\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" version=\"1.1\"\/>&#8221; alt=&#8221;&#8221; aria-hidden=&#8221;true&#8221; \/><img decoding=\"async\" class=\"i-amphtml-fill-content i-amphtml-replaced-content\" src=\"https:\/\/securityintelligence.com\/wp-content\/uploads\/2022\/06\/IBV-Image-1.png\" \/><\/figure>\n<div>\n<p><em>Source: IBM<\/em><\/p>\n<\/div>\n<div>\n<p>In a time of greater challenges and fewer resources, how can security leaders become more effective, minimize their expenses and get the most out of their employees without burning them out? A recent study from the\u00a0<a href=\"https:\/\/www.ibm.com\/thought-leadership\/institute-business-value\/en-us\/\">IBM Institute for Business Value (IBV)<\/a>\u00a0suggests people are investing in AI and automation to address many of these challenges.<\/p>\n<\/div>\n<div>\n<p>The IBV partnered with\u00a0<a href=\"https:\/\/www.apqc.org\/\" target=\"_blank\" rel=\"noopener nofollow\">APQC (American Productivity and Quality Center)<\/a>\u00a0in a survey of 1,000 business leaders to find out how\u00a0<a href=\"https:\/\/www.ibm.com\/security\/artificial-intelligence\">AI<\/a>\u00a0is being used to support their operations and to quantify its impact on performance.<\/p>\n<h2>AI: Defense In a Fast-Paced World<\/h2>\n<\/div>\n<div>\n<p>The\u00a0<a href=\"https:\/\/www.ibm.com\/thought-leadership\/institute-business-value\/report\/ai-cybersecurity\">in-depth report<\/a>\u00a0contemplates questions that are top-of-mind for today\u2019s leaders. How do AI and automation help? Where in the security life cycle do these tools have the greatest impact? Can pairing AI with automation deliver a higher return on security investment?<\/p>\n<\/div>\n<div>\n<div>\n<p>There are four primary ways AI technologies are transforming security operations:<\/p>\n<\/div>\n<div>\n<ol role=\"list\" start=\"1\">\n<li role=\"listitem\" aria-setsize=\"-1\" data-aria-level=\"1\" data-aria-posinset=\"1\" data-font=\"Calibri\" data-leveltext=\"%1.\" data-listid=\"6\">Machine learning helps identify patterns,\u00a0<a href=\"https:\/\/www.ibm.com\/case-studies\/credico-security\/\">take inventory of new assets<\/a>\u00a0and services and refine the performance of AI models.<\/li>\n<\/ol>\n<\/div>\n<\/div>\n<div>\n<div>\n<ol role=\"list\" start=\"2\">\n<li role=\"listitem\" aria-setsize=\"-1\" data-aria-level=\"1\" data-aria-posinset=\"2\" data-font=\"Calibri\" data-leveltext=\"%1.\" data-listid=\"6\">Reasoning tools help inform data analysis, enhance scenario modeling and foresee new attack vectors.<\/li>\n<\/ol>\n<\/div>\n<div>\n<ol role=\"list\" start=\"3\">\n<li role=\"listitem\" aria-setsize=\"-1\" data-aria-level=\"1\" data-aria-posinset=\"3\" data-font=\"Calibri\" data-leveltext=\"%1.\" data-listid=\"6\">Natural language processing can be used to mine text data sources, improve threat intelligence and enrich knowledge resources.<\/li>\n<\/ol>\n<\/div>\n<div>\n<ol role=\"list\" start=\"4\">\n<li role=\"listitem\" aria-setsize=\"-1\" data-aria-level=\"1\" data-aria-posinset=\"4\" data-font=\"Calibri\" data-leveltext=\"%1.\" data-listid=\"6\">Automation can help orchestrate time-intensive tasks, improve response times and reduce the burden for human analysts.<\/li>\n<\/ol>\n<\/div>\n<div>\n<p>According to survey respondents, adopting\u00a0<a href=\"https:\/\/www.ibm.com\/security\/artificial-intelligence\">AI-powered automation<\/a>\u00a0has enabled them to operate\u00a0<a href=\"https:\/\/www.ibm.com\/case-studies\/novaland\/\">faster<\/a>, with greater flexibility.<\/p>\n<p>How are they doing this? One of the survey\u2019s most compelling findings is that the mix of\u00a0<a href=\"https:\/\/securityintelligence.com\/posts\/what-is-ai-and-how-can-it-improve-an-organizations-security-posture\/\">AI and automation<\/a>\u00a0is being used to offload routine triage tasks. It enables skilled analysts to focus on higher-value investigations that require human expertise and judgment.<\/p>\n<\/div>\n<\/div>\n<div>\n<h2>Practical Use of AI<\/h2>\n<\/div>\n<div>\n<p>The report offers actionable insights into how security leaders are using AI and automation to support their protection, prevention, detection and response processes. For example:<\/p>\n<\/div>\n<figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" class=\"i-amphtml-intrinsic-sizer\" style=\"box-sizing: border-box; max-width: 100%; display: block !important; height: auto; vertical-align: bottom; border-radius: inherit;\" role=\"presentation\" src=\"data:;base64,<svg height=\"680px\" width=\"635px\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" version=\"1.1\"\/>&#8221; alt=&#8221;&#8221; aria-hidden=&#8221;true&#8221; \/><img decoding=\"async\" class=\"i-amphtml-fill-content i-amphtml-replaced-content\" src=\"https:\/\/securityintelligence.com\/wp-content\/uploads\/2022\/06\/IBV-Image-2.png\" \/><\/figure>\n<div>\n<p><em>Source: IBM Security Services based on an analysis of aggregated 2021 performance data. Note: Performance thresholds depicted are expected to improve on a continuing basis.\u00a0<\/em><\/p>\n<\/div>\n<div>\n<p>Investing in security AI and automation is leading to tangible performance benefits. Compared to non-AI adopters, AI adopters can save more than 14 weeks in threat detection and response:<\/p>\n<\/div>\n<figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" class=\"i-amphtml-intrinsic-sizer\" style=\"box-sizing: border-box; max-width: 100%; display: block !important; height: auto; vertical-align: bottom; border-radius: inherit;\" role=\"presentation\" src=\"data:;base64,<svg height=\"544px\" width=\"531px\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" version=\"1.1\"\/>&#8221; alt=&#8221;&#8221; aria-hidden=&#8221;true&#8221; \/><img decoding=\"async\" class=\"i-amphtml-fill-content i-amphtml-replaced-content\" src=\"https:\/\/securityintelligence.com\/wp-content\/uploads\/2022\/06\/IBV-Image-3.png\" \/><\/figure>\n<div>\n<p><em>Source: IBM<\/em><\/p>\n<p>Importantly, these organizations are achieving this level of performance while also reducing costs and complexity.<\/p>\n<h2>Backed By Research<\/h2>\n<\/div>\n<div>\n<p>Other IBM security research studies have found similar results. The\u00a0<a href=\"https:\/\/www.ibm.com\/security\/data-breach?utm_medium=OSocial&amp;utm_source=Blog&amp;utm_content=SSSWW&amp;utm_id=Security-Intelligence-Blog-Inline-Hyperlink\">2022 Cost of a Data Breach<\/a>\u00a0report from IBM and Ponemon Institute found security AI and automation had the greatest positive impact on reducing the overall\u00a0<a href=\"https:\/\/www.ibm.com\/account\/reg\/us-en\/signup?formid=urx-51643\">costs of a data breach<\/a>. To address emerging threats, the\u00a0<a href=\"https:\/\/www.ibm.com\/security\/data-breach\/threat-intelligence\/\">IBM X-Force annual Threat Intelligence Index<\/a>\u00a0suggests best practices such as adopting a\u00a0<a href=\"https:\/\/www.ibm.com\/security\/zero-trust\">zero trust<\/a>\u00a0approach, automating incident response and deploying extended detection and response.<\/p>\n<\/div>\n<div>\n<p>For security leaders, the key takeaway is that investing in AI and automation enables you to make more of your skilled talent while also improving your overall performance.<\/p>\n<\/div>\n<div>\n<p>Want to dig into the data or get more insights? Read the full report\u00a0<a href=\"https:\/\/www.ibm.com\/thought-leadership\/institute-business-value\/report\/ai-cybersecurity\">here<\/a>. Learn more about AI and cybersecurity\u00a0<a href=\"https:\/\/www.ibm.com\/security\/artificial-intelligence\">here<\/a>.<\/p>\n<p>Source: <a href=\"https:\/\/securityintelligence.com\/posts\/ai-capabilities-transform-security\/\">securityintelligence.com<\/a> <a tabindex=\"1\" title=\"Security Intelligence\" href=\"https:\/\/securityintelligence.com\/\"><img decoding=\"async\" class=\"i-amphtml-fill-content i-amphtml-replaced-content\" src=\"https:\/\/securityintelligence.com\/wp-content\/themes\/sapphire\/images\/logo-white.svg\" alt=\"Security Intelligence Logo\" \/><\/a><a tabindex=\"1\" title=\"Security Intelligence\" href=\"https:\/\/securityintelligence.com\/\"><img decoding=\"async\" class=\"i-amphtml-fill-content i-amphtml-replaced-content\" src=\"https:\/\/securityintelligence.com\/wp-content\/themes\/sapphire\/images\/logo-white.svg\" alt=\"Security Intelligence Logo\" \/><\/a><\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p class=\"tx-excerpt\">Many industries have had to tighten belts in the \u201cnew normal\u201d. In cybersecurity, artificial intelligence (AI) can help. Every day of the new normal we learn how the pandemic\u00a0sped up digital transformation,\u00a0as reflected","protected":false},"author":3,"featured_media":1755,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[13],"tags":[],"class_list":["post-1754","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"https:\/\/dt-corp.com.vn\/wp-content\/uploads\/2022\/08\/AI-Security.jpeg.webp","_links":{"self":[{"href":"https:\/\/dt-corp.com.vn\/index.php?rest_route=\/wp\/v2\/posts\/1754","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dt-corp.com.vn\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dt-corp.com.vn\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dt-corp.com.vn\/index.php?rest_route=\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/dt-corp.com.vn\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1754"}],"version-history":[{"count":1,"href":"https:\/\/dt-corp.com.vn\/index.php?rest_route=\/wp\/v2\/posts\/1754\/revisions"}],"predecessor-version":[{"id":1756,"href":"https:\/\/dt-corp.com.vn\/index.php?rest_route=\/wp\/v2\/posts\/1754\/revisions\/1756"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/dt-corp.com.vn\/index.php?rest_route=\/wp\/v2\/media\/1755"}],"wp:attachment":[{"href":"https:\/\/dt-corp.com.vn\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1754"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dt-corp.com.vn\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1754"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dt-corp.com.vn\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1754"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}