<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=2789745&amp;fmt=gif">

By: Adam Barney on April 30th, 2018

Print/Save as PDF

The AI Arms Race

Blog Posts

The AI Arms Race: Disrupt or Be Disrupted


Artificial Intelligence technologies work for the people.  Literally, all the people.  Even though security savants utilize AI technologies to battle cyber-attacks, this same technology has been giving cyber criminals the upper-hand with ransomware attacks that can bring any organization to its knees.  Machines have no moral or ethical compass and because they can churn out massive amounts of data at a break-neck pace for any master, this sets the stage for an all-out, good-versus-evil AI arms race with your organization in the line-of-sight.


Ask yourself the tough questions

What are you doing to protect your organization from critical disruption? It’s not a matter of if, it’s a matter of when.  If you don’t feel a sense of imminent danger about how these sophisticated attacks will cripple your organization, then please, by all means, go back to what it is you were doing.  We don’t want to waste your time-or ours.


“AI unfortunately gives attackers the tools to get a much greater return on their investment,” explains Steve Grobman, chief technology officer at McAfee.


McAfee Labs 2018 threats predictions report warns that hackers learn and adapt from defensive responses and aim to disrupt detection models that exploit newly discovered vulnerabilities faster than defenders can patch them.  The laws of physics require that every action has an equal and opposite reaction, so it only makes sense that hackers are the front-line assembly developing attacks designed to disrupt.  And they are going big.


Infrastructure threats

Critical sectors of infrastructure like power grids and transportation will see threats designed to cause immediate disruption, while others will involve ransomware hijacks of vital business systems with sabotage being the end game if demands are not met.  Just recently, hackers dismantled Ukraine’s energy ministry website on Tuesday, encrypting files in a targeted ransomware attack that officials deemed an “isolated incident.”  The cyber kidnappers posted on the website a message in English demanding 0.1 Bitcoin, equivalent to about $940, to retrieve the encrypted files, Reuters reported.  Currently there is no proof they worked in tandem.  Was this a red herring for a far larger cyberattack to come?


As these and other risks grow in 2018, so will the penalties for companies that fail to address them effectively. On May 25, the General Data Protection Regulation will come into effect in Europe. The first big overhaul of the region’s data protection rules in more than two decades, the GDPR will require companies to report data breaches to regulators—and inform customers their data has been stolen—within 72 hours of discovering a breach. Failure to comply could lead to fines of up to 20 million euros or 4 percent of a company’s global revenues, whichever is greater.

Unless you have been asleep at the wheel, you have seen the headline grabbing stats about data breaches occurring at the highest levels and we urge you to become serious about engaging with a security expert before it’s too late.


Are you really confident in your IT and Security Support?

Can you dig out of the rubble if your business is disrupted?  How long can your business survive a ransomware attack? Framework doesn’t just secure, monitor, and protect your business.  We go the extra mile to truly empower your organization through in-depth knowledge, experience, and top-flight technologies to prepare you for what’s next.  We provide a vast arsenal of tools that work together to provide additional layers of protection for every aspect of your operations.

Sure, you can automate security within your environment, but are you confident it’s the right combination of tools, controls, and consultation to keep your organization smarter, more agile, and protected from disaster and disruption?  Call Framework for a Security assessment today.  Tick tock.