Netskope vuelve a ser reconocido como Líder en el Cuadrante™ Mágico de Gartner® para plataformas SASE. Obtener el Informe

cerrar
cerrar
Su red del mañana
Su red del mañana
Planifique su camino hacia una red más rápida, más segura y más resistente diseñada para las aplicaciones y los usuarios a los que da soporte.
          Descubra Netskope
          Ponte manos a la obra con la plataforma Netskope
          Esta es su oportunidad de experimentar de primera mano la Netskope One plataforma de una sola nube. Regístrese para participar en laboratorios prácticos a su propio ritmo, únase a nosotros para una demostración mensual del producto en vivo, realice una prueba de manejo gratuita de Netskope Private Accesso únase a nosotros para talleres en vivo dirigidos por instructores.
            Líder en SSE. Ahora es líder en SASE de un solo proveedor.
            Netskope ha sido reconocido como Líder con mayor visión tanto en plataformas SSE como SASE
            2X líder en el Cuadrante Mágico de Gartner® para SASE Plataforma
            Una plataforma unificada creada para tu viaje
              Protección de la IA generativa para principiantes
              Protección de la IA generativa para principiantes
              Descubra cómo su organización puede equilibrar el potencial innovador de la IA generativa con sólidas prácticas de seguridad de Datos.
                Prevención de pérdida de datos (DLP) moderna para dummies eBook
                Prevención moderna de pérdida de datos (DLP) para Dummies
                Obtenga consejos y trucos para la transición a una DLP entregada en la nube.
                  Libro SD-WAN moderno para principiantes de SASE
                  SD-WAN moderna para maniquíes SASE
                  Deje de ponerse al día con su arquitectura de red
                    Entendiendo dónde está el riesgo
                    Advanced Analytics transforma la forma en que los equipos de operaciones de seguridad aplican los conocimientos basados en datos para implementar una mejor política. Con Advanced Analytics, puede identificar tendencias, concentrarse en las áreas de preocupación y usar los datos para tomar medidas.
                        Soporte técnico Netskope
                        Soporte técnico Netskope
                        Nuestros ingenieros de soporte cualificados ubicados en todo el mundo y con distintos ámbitos de conocimiento sobre seguridad en la nube, redes, virtualización, entrega de contenidos y desarrollo de software, garantizan una asistencia técnica de calidad en todo momento
                          Vídeo de Netskope
                          Netskope Training
                          La formación de Netskope le ayudará a convertirse en un experto en seguridad en la nube. Estamos aquí para ayudarle a proteger su proceso de transformación digital y aprovechar al máximo sus aplicaciones cloud, web y privadas.

                            The Impact of AI on Cybersecurity: Balancing the Risks and Opportunities

                            Jan 17 2023

                            As artificial intelligence (AI) advances, I am seeing a lot of discussion on LinkedIn and in the online media about the advantages it may bring for either the threat actors (“batten down the hatches, we are all doomed”) or the security defence teams (“it’s OK, relax, AI has you covered”). It has occurred to me that while AI could be a powerful tool for cyber criminals, allowing them to automate attacks and evade detection more effectively, it could also be a powerful tool for security professionals, allowing them to detect and respond to threats more quickly and efficiently.

                            The polarising predictions have also got me wondering … might the impact of AI advances in cybersecurity end up balancing out? Could every advance made by the bad guys be met with equal progress from the good guys? All supported by the same tools? Of course this balancing act only works as long as everyone keeps up with the competition; as cyber criminals become more adept at using AI, security professionals will also have to ensure they are making use of more advanced tools and techniques to defend against these attacks. 

                            So in a boxing match style, let’s take a look at who is in the red corner and who is in the blue.  Exactly how might cybercriminals and security professionals make use of AI? And who will win?

                            In the red corner: The Cyber Criminals

                            1. Using AI for the identification of targets; scanning the internet for vulnerable systems 
                            2. Programming AI-bots to mimic human behaviour in order to more effectively evade detection by security systems
                            3. Generating highly targeted phishing emails with AI, perhaps trained by multiple data sets acquired on the Dark Web so that they include credible details to help lure the target and build trust (with the public becoming more used to interacting with AI-bots for customer service, impersonating these chatbots could become a useful social engineering tool for malicious actors).
                            4. Creating evermore sophisticated malware, such as using AI to find exploitable patterns in security systems and creating malware that is specifically designed to evade detection, or designing AI-powered evolution into malware, so that malicious programmes adapt and evolve over time, making them more difficult to detect and remove. 

                            In the blue corner – The Security Professionals

                            1. Analysing vast amounts of data from multiple sources to identify and track potential threats. Threat Intelligence systems can also learn from past incidents, allowing them to adapt and improve over time. (Generally I would expect much of this AI intelligence gathering to be done by security vendors, and made available to customers and community members.)
                            2. Offering just-in-time training to the workforce before an incident occurs by identifying risky behavioural patterns, and guiding employees to make better decisions for data protection and system security
                            3. Triage; sorting through security incidents and prioritising them based on their level of risk. Using AI recommendations to focus efforts on the most critical issues.
                            4. Detecting patterns that indicate a potential security incident, then automatically triggering a response and alert to security teams (recently proven in its efficacy by NATO).
                            5. Automating incident investigation; helping identify the root cause of an incident and notifying relevant parties. 

                            So who will be the winner in this title bout? I am not sure that bookies have a favourite just yet. AI has the potential to revolutionise cybersecurity, but it won’t remove the requirement for a clear architecture and strategy.  We don’t get to outsource our jobs to the machines and go and make a cuppa just yet. Over the coming months and years, it will be important to understand that AI is not a cure-all, or a standalone solution, but rather a complementary tool to be used in combination with other security measures. Just like a human security team, AI requires continuous monitoring, evaluation, and tuning to ensure that it is performing as expected and to address any bias or inaccuracies in the data. And of course there are plenty of ethical considerations to be handled too. If you have enjoyed this post, I recommend hopping into the archive and reading this one too, from our EMEA CISO Neil Thacker, in which he discusses the EU’s upcoming AI Act, and gives some useful tips for organisations looking to prepare for the inevitable legislation around AI this year.

                            author image
                            Steve Foster
                            Steve Foster has spent his career working to bridge the gap between business need and technical solution. Steve comes from networking, with 20 years of experience.
                            Steve Foster has spent his career working to bridge the gap between business need and technical solution. Steve comes from networking, with 20 years of experience.
                            Conéctese con Netskope

                            Subscribe to the Netskope Blog

                            Sign up to receive a roundup of the latest Netskope content delivered directly in your inbox every month.