Skip to main content

Companies depend on automation, AI and machine learning for cyber security

To defend against cyber attacks, 39% of organisations are reliant on automation, 34% on machine learning and 32% on artificial intelligence (AI), according to the Cisco 2018 annual report conducted on 3,600 chief information security officers. It found that over half of all attacks resulted in financial damages of more than $500,000 (£697,000), including, but not limited to, lost revenue, clients, opportunities, and out-of-pocket costs. The study revealed that adversaries are using Malware sophistication
February 23, 2018 Read time: 2 mins

To defend against cyber attacks, 39% of organisations are reliant on automation, 34% on machine learning and 32% on artificial intelligence (AI), according to the 1028 Cisco 2018 annual %$Linker: 2 External <?xml version="1.0" encoding="utf-16"?><dictionary /> 0 0 0 link-external report Cisco website link false https://www.cisco.com/c/en/us/products/security/security-reports.html false false%> conducted on 3,600 chief information security officers. It found that over half of all attacks resulted in financial damages of more than $500,000 (£697,000), including, but not limited to, lost revenue, clients, opportunities, and out-of-pocket costs.

The study revealed that adversaries are using Malware sophistication to weaponize cloud services, and evade detection through encryption, used as a tool to conceal command-and-control activity. Cisco’s threat researchers observed more than a threefold increase in encrypted network communication used by inspected malware samples over a 12-month period.

Additionally, it showed that supply chain attacks can impact computers for months or  years. It recommends that defenders should be aware of the potential risk of using software or hardware from companies that do not appear to have a responsible security posture.
 
Cisco also found that defenders are implementing a complex mix of products from cross-section vendors for protection, which when combined with the growth breaches, has downstream effects on an organisation’s ability to defend against attacks, such as increased risk of losses. In 2017, security professionals said that 32% of breaches affected more than half of their systems.

The inquiry showed that while use of the cloud is growing, attackers are taking advantage of security teams that are having difficulty defending evolving and expanding cloud environments. 27% of security professionals are using off-premise private clouds; 57% of which said that they host networks there for better data security.

Additional recommendations are available %$Linker: 2 External <?xml version="1.0" encoding="utf-16"?><dictionary /> 0 0 0 link-external here Cisco newsroom website link false https://newsroom.cisco.com/press-release-content false false%>.
 
Centrify has also conducted a study of 800 UK senior level executives which found that 63% believe that investigation, remediation and legal costs are the most important consequence of a breach, followed by disruption to service (47%) and loss of intellectual property (32%).  A full copy of the report can be found on the %$Linker: 2 External <?xml version="1.0" encoding="utf-16"?><dictionary /> 0 0 0 link-external website Centrify website link false https://www.centrify.com/resources/ceo-disconnect-weakening-cybersecurity/ false false%>.

For more information on companies in this article

Related Content

  • Bosch to trial driverless tech on Australia’s high-speed rural roads
    January 24, 2019
    Bosch has received an automated driving system (ADS) permit from the Victorian government to test automated vehicle technology on high-speed rural roads in the south-eastern Australian state. Bosch is to use a $2.3 million grant from the Connected and Automated Vehicle (C/AV) Trial Grants Programme to develop the technology, which will be tested later this year. The C/AV programme funded through the government’s $1.4 million Towards Zero Action Plan – an initiative which provides guidelines on how V
  • ITS World Congress preliminary programme now online
    June 16, 2015
    The preliminary programme of the 22nd ITS World Congress is now available online, with details of all sessions, speakers, social and associated events, as well as the 30-plus demonstr4ations which have been planned for the congress in Bordeaux.
  • Third HeERO international conference
    August 22, 2014
    The third HeERO International Conference will be held in Madrid, Spain, on 27 November 2014. The conference will provide exclusive insight on: the status of eCall deployment in the HeERO1 and HeERO2 pilot sites including: eCall for trucks, powered two-wheeled eCall and filtering instance for PSAP; the outcome of interoperability testing; an update on standards and certification for eCall; and the recommendations for the large scale implementation of the eCall service in Europe. The event will be hoste
  • Five key questions to improve big data governance
    August 22, 2013
    According to ISACA, big data can improve decision making, reduce time to market and increase profits, but it can also raise significant risk, ranging from disastrous data breaches to privacy and compliance concerns. In the field of transportation, big data solutions can drive business results: dynamic pricing, optimised capacity planning and yield management. But inaccurate, incomplete or fraudulently manipulated data pose an increasing risk as enterprises become more dependent on the data to drive decis