Skip to main content

Companies depend on automation, AI and machine learning for cyber security

To defend against cyber attacks, 39% of organisations are reliant on automation, 34% on machine learning and 32% on artificial intelligence (AI), according to the Cisco 2018 annual report conducted on 3,600 chief information security officers. It found that over half of all attacks resulted in financial damages of more than $500,000 (£697,000), including, but not limited to, lost revenue, clients, opportunities, and out-of-pocket costs. The study revealed that adversaries are using Malware sophistication
February 23, 2018 Read time: 2 mins

To defend against cyber attacks, 39% of organisations are reliant on automation, 34% on machine learning and 32% on artificial intelligence (AI), according to the 1028 Cisco 2018 annual %$Linker: 2 External <?xml version="1.0" encoding="utf-16"?><dictionary /> 0 0 0 link-external report Cisco website link false https://www.cisco.com/c/en/us/products/security/security-reports.html false false%> conducted on 3,600 chief information security officers. It found that over half of all attacks resulted in financial damages of more than $500,000 (£697,000), including, but not limited to, lost revenue, clients, opportunities, and out-of-pocket costs.

The study revealed that adversaries are using Malware sophistication to weaponize cloud services, and evade detection through encryption, used as a tool to conceal command-and-control activity. Cisco’s threat researchers observed more than a threefold increase in encrypted network communication used by inspected malware samples over a 12-month period.

Additionally, it showed that supply chain attacks can impact computers for months or  years. It recommends that defenders should be aware of the potential risk of using software or hardware from companies that do not appear to have a responsible security posture.
 
Cisco also found that defenders are implementing a complex mix of products from cross-section vendors for protection, which when combined with the growth breaches, has downstream effects on an organisation’s ability to defend against attacks, such as increased risk of losses. In 2017, security professionals said that 32% of breaches affected more than half of their systems.

The inquiry showed that while use of the cloud is growing, attackers are taking advantage of security teams that are having difficulty defending evolving and expanding cloud environments. 27% of security professionals are using off-premise private clouds; 57% of which said that they host networks there for better data security.

Additional recommendations are available %$Linker: 2 External <?xml version="1.0" encoding="utf-16"?><dictionary /> 0 0 0 link-external here Cisco newsroom website link false https://newsroom.cisco.com/press-release-content false false%>.
 
Centrify has also conducted a study of 800 UK senior level executives which found that 63% believe that investigation, remediation and legal costs are the most important consequence of a breach, followed by disruption to service (47%) and loss of intellectual property (32%).  A full copy of the report can be found on the %$Linker: 2 External <?xml version="1.0" encoding="utf-16"?><dictionary /> 0 0 0 link-external website Centrify website link false https://www.centrify.com/resources/ceo-disconnect-weakening-cybersecurity/ false false%>.

For more information on companies in this article

Related Content

  • Register for USDOT connected vehicle PlugFests
    May 2, 2014
    The USDOT will hold its next two connected vehicle PlugFests on 13-15 May in Farmington Hills, Michigan and on 24-26 June in Palo Alto, California. PlugFests provide venues for vendor-to-vendor connected vehicle device testing to help ensure that devices and systems meet the base standard requirements and level of interoperability necessary for the Southeast Michigan Connected Vehicle Test Bed Deployment 2014 Project.
  • Elon Musk unveils Los Angeles tunnel plan
    December 19, 2018
    Elon Musk, the boss of Tesla and SpaceX, has opened the first tunnel in a planned network under Los Angeles to help ease congestion in the US city. The world’s media was invited this week to travel in the mile-long tunnel – built by Musk’s Boring Company under the Hawthorne district - in an electric Tesla vehicle. The trip was described as “almost a white knuckle ride” by the BBC: “A bumpy two-minute journey in a modified Model X through a concrete tunnel with a blue neon light in the ceiling.” A C
  • Open dialogue on USDOT ITS Strategic Plan
    July 26, 2013
    The US Department of Transportation (USDOT) is offering the public a great opportunity to share its views and be a part of the development of the Department's next ITS Strategic Plan. This plan will identify the ITS-related research, development, and education areas that the USDOT will focus on for the rest of the decade. Various opportunities exist for the public to provide input, including an online feedback site.
  • Siemens Interview with Sven Gabor Janszky
    March 9, 2017
    We speak to trend researcher Sven Gábor Jánszky, head of the renowned 2b AHEAD think tank in Leipzig, on the world view of Generation Y, the mobility-related preferences of digital citizens and their disruptive effects on the transport systems of the future.