Skip to main content

Companies depend on automation, AI and machine learning for cyber security

To defend against cyber attacks, 39% of organisations are reliant on automation, 34% on machine learning and 32% on artificial intelligence (AI), according to the Cisco 2018 annual report conducted on 3,600 chief information security officers. It found that over half of all attacks resulted in financial damages of more than $500,000 (£697,000), including, but not limited to, lost revenue, clients, opportunities, and out-of-pocket costs. The study revealed that adversaries are using Malware sophistication
February 23, 2018 Read time: 2 mins

To defend against cyber attacks, 39% of organisations are reliant on automation, 34% on machine learning and 32% on artificial intelligence (AI), according to the 1028 Cisco 2018 annual %$Linker: 2 External <?xml version="1.0" encoding="utf-16"?><dictionary /> 0 0 0 link-external report Cisco website link false https://www.cisco.com/c/en/us/products/security/security-reports.html false false%> conducted on 3,600 chief information security officers. It found that over half of all attacks resulted in financial damages of more than $500,000 (£697,000), including, but not limited to, lost revenue, clients, opportunities, and out-of-pocket costs.

The study revealed that adversaries are using Malware sophistication to weaponize cloud services, and evade detection through encryption, used as a tool to conceal command-and-control activity. Cisco’s threat researchers observed more than a threefold increase in encrypted network communication used by inspected malware samples over a 12-month period.

Additionally, it showed that supply chain attacks can impact computers for months or  years. It recommends that defenders should be aware of the potential risk of using software or hardware from companies that do not appear to have a responsible security posture.
 
Cisco also found that defenders are implementing a complex mix of products from cross-section vendors for protection, which when combined with the growth breaches, has downstream effects on an organisation’s ability to defend against attacks, such as increased risk of losses. In 2017, security professionals said that 32% of breaches affected more than half of their systems.

The inquiry showed that while use of the cloud is growing, attackers are taking advantage of security teams that are having difficulty defending evolving and expanding cloud environments. 27% of security professionals are using off-premise private clouds; 57% of which said that they host networks there for better data security.

Additional recommendations are available %$Linker: 2 External <?xml version="1.0" encoding="utf-16"?><dictionary /> 0 0 0 link-external here Cisco newsroom website link false https://newsroom.cisco.com/press-release-content false false%>.
 
Centrify has also conducted a study of 800 UK senior level executives which found that 63% believe that investigation, remediation and legal costs are the most important consequence of a breach, followed by disruption to service (47%) and loss of intellectual property (32%).  A full copy of the report can be found on the %$Linker: 2 External <?xml version="1.0" encoding="utf-16"?><dictionary /> 0 0 0 link-external website Centrify website link false https://www.centrify.com/resources/ceo-disconnect-weakening-cybersecurity/ false false%>.

For more information on companies in this article

Related Content

  • USDoT calls for comment on V2X integration
    December 21, 2018
    The US Department of Transportation (USDoT) is seeking public comment on how Vehicle to Everything (V2X) technology should be integrated into the transport environment. The organisation says it intends to maintain the priority use of 5.9Ghz spectrum for transportation safety communications. It points out that the automotive industry and local authorities “are already deploying V2X technology and actively utilising all seven channels of the 5.9 GHz band” and says that technology such as Cellular-V2X (C-V2
  • Last date for ITS World Congress papers - reminder
    January 6, 2015
    The deadline for the ITS World Congress 2015 Call for Papers and Special Interest Sessions submission is fast approaching. Authors must submit technical, scientific, commercial papers and special interest sessions by 19 January. No extensions will be granted.
  • New report investigates cyber security of connected vehicles
    February 9, 2016
    TU-Automotive has just released a new 60-page report, Cyber Security in the Connected Vehicle 2016, which looks at the role of robust cyber security practices and systems in the connected vehicle now and in the future of the automotive industry.
  • Uber to redirect focus to bikes and electric scooters
    August 28, 2018
    Uber intends to focus more on its electric scooter and bike business as it says individual modes of transport are better-suited to inner city travel. Dara Khosrowshahi, Uber’s CEO, believes users will make more frequent, shorter journeys in the future, the Financial Times reports. "During rush hour, it is very inefficient for a one-tonne hulk of metal to take one person ten blocks,” he says. Uber’s Jump electric bikes are now available in eight US cities such as San Francisco and Washington DC, and are