Skip to main content

Companies depend on automation, AI and machine learning for cyber security

To defend against cyber attacks, 39% of organisations are reliant on automation, 34% on machine learning and 32% on artificial intelligence (AI), according to the Cisco 2018 annual report conducted on 3,600 chief information security officers. It found that over half of all attacks resulted in financial damages of more than $500,000 (£697,000), including, but not limited to, lost revenue, clients, opportunities, and out-of-pocket costs. The study revealed that adversaries are using Malware sophistication
February 23, 2018 Read time: 2 mins

To defend against cyber attacks, 39% of organisations are reliant on automation, 34% on machine learning and 32% on artificial intelligence (AI), according to the 1028 Cisco 2018 annual %$Linker: 2 External <?xml version="1.0" encoding="utf-16"?><dictionary /> 0 0 0 link-external report Cisco website link false https://www.cisco.com/c/en/us/products/security/security-reports.html false false%> conducted on 3,600 chief information security officers. It found that over half of all attacks resulted in financial damages of more than $500,000 (£697,000), including, but not limited to, lost revenue, clients, opportunities, and out-of-pocket costs.

The study revealed that adversaries are using Malware sophistication to weaponize cloud services, and evade detection through encryption, used as a tool to conceal command-and-control activity. Cisco’s threat researchers observed more than a threefold increase in encrypted network communication used by inspected malware samples over a 12-month period.

Additionally, it showed that supply chain attacks can impact computers for months or  years. It recommends that defenders should be aware of the potential risk of using software or hardware from companies that do not appear to have a responsible security posture.
 
Cisco also found that defenders are implementing a complex mix of products from cross-section vendors for protection, which when combined with the growth breaches, has downstream effects on an organisation’s ability to defend against attacks, such as increased risk of losses. In 2017, security professionals said that 32% of breaches affected more than half of their systems.

The inquiry showed that while use of the cloud is growing, attackers are taking advantage of security teams that are having difficulty defending evolving and expanding cloud environments. 27% of security professionals are using off-premise private clouds; 57% of which said that they host networks there for better data security.

Additional recommendations are available %$Linker: 2 External <?xml version="1.0" encoding="utf-16"?><dictionary /> 0 0 0 link-external here Cisco newsroom website link false https://newsroom.cisco.com/press-release-content false false%>.
 
Centrify has also conducted a study of 800 UK senior level executives which found that 63% believe that investigation, remediation and legal costs are the most important consequence of a breach, followed by disruption to service (47%) and loss of intellectual property (32%).  A full copy of the report can be found on the %$Linker: 2 External <?xml version="1.0" encoding="utf-16"?><dictionary /> 0 0 0 link-external website Centrify website link false https://www.centrify.com/resources/ceo-disconnect-weakening-cybersecurity/ false false%>.

UTC

Related Content

  • December 14, 2018
    TfL describes reports of closer ties with Uber as ‘nonsense’
    Transport for London (TfL) has described claims that it is deepening its relationship with Uber as ‘nonsense’. Media reports suggested that London’s transit authority might be going to offer customers access to public transport services via the ride-hailing firm's app. The Financial Times reported that Uber is attempting to add TfL's data about tube and bus timetables into the app. But a spokesperson from TfL told ITS International that the only thing it is putting out is open data – and does no
  • March 19, 2018
    Irdeto and Conjure promote Keystone vehicle access solution
    Irdeto and Conjure are using Intertraffic to present what they claim is the most secure, policy-based vehicle access and safety solution in the connected transport industry. Using a mobile device with a companion application, the solution eliminates the need for physical keys to a car while also providing car and fleet owners with the ability to securely and intuitively provision and manage a host of new car sharing/car riding experiences. Keystone combines secure, tamper-proof policy management that
  • March 20, 2019
    Early bird registrations open for ITS Europe
    ITS Europe has opened early bird registrations for this year’s congress taking place in Eindhoven from the 3-6 June. Under the theme ‘Fulfilling ITS Promises’, the European Programme Committee is presenting seven topics. These include deploying new mobility services – from experiments to experience; a breath of fresh air; connected, cooperative and automated mobility; enhancing the efficiency of freight transport; enablers of digital infrastructure; transport network operations; and disruption start-ups &
  • September 15, 2017
    Contributions now open for ITS World Congress in Copenhagen
    The call for contributions at the ITS World Congress in Copenhagen are now open under the theme ITS – Quality of Life, deadline 29 September 2017. The 25th congress will focus on ITS solutions that contribute to livability, greener environment and lower congestion and will provide experts with the opportunity to present the latest ITS solutions and mobility technologies.