University of Arizona electrical and computer engineering researchers are training a future cybersecurity workforce and creating bioinspired methods for keeping computers secure.
Today, the average American leaves the house with a smartphone that has more computing power than the systems that landed humans on the moon. The Internet of Things (IoT) enables refrigerators to tell you that you’re running out of milk and cars to provide assisted driving. The reality is that the knowledge economy is in full swing, and the modern world’s relationship with technology has advanced to a state where nearly all aspects of our daily lives are touched by the internet.
The cost of data breaches will rise from $3 trillion each year to more than $5 trillion in 2024, an average annual growth of 11%, says a new report from Juniper Research.
The talent crisis is real. As an industry, we can’t wait years for a solution. The good news? Today, companies can use automation to help bridge the talent gap. Incorporating the automation of specific cyber tasks makes it possible to increase efficiency and productivity while maintaining a strong security posture. With the help of security automation, security teams can mitigate active threats, saving time and money.
In the monitoring and surveillance sector, Artificial Intelligence based solutions such as Intelligent Video Analytics (IVA), are entering the mainstream as they reach levels of refinement, usability and affordability.
Security teams today are under-staffed, over-worked, under-funded and struggling to stay abreast of the ever-changing threat landscape. Many security analysts work long hours poring over millions of security events to protect systems and fix vulnerabilities. Simply put, there is too much information and not enough analysts. Fortunately, humans are not the only answer for solving the cybersecurity crisis.
Think back to 2009 and the phone you owned. While the phone you carry today might not look that different, a smartphone or its equivalent is far more powerful than it was just 10 years ago. While it is relatively easy for businesses to track the evolution of phone technology, have they similarly considered how their own corporate security departments have changed during the same period?
New technologies, including cloud computing, the Internet of Things and artificial intelligence, are constantly bringing new opportunities and challenges to attackers and defenders alike. This is not just the age of machines but of machine-scale. As such, IT security analysts need new tools to defend the network.
The under-representation of women and people of color across the field of artificial intelligence is causing a “diversity crisis” that is contributing to the creation of flawed systems and technology, according to a New York University research center report.