logo
episode-header-image
Feb 2021
40m 57s

The War with Algorithms: Why Your Next S...

MISSION
About this episode

The image of a hooded individual illuminated by the glare of a computer screen hacking into a company’s network is the classic picture of what a cyber attack looks like. The reality, though, is these attackers are almost never a one-man band, but rather a sophisticated team armed with the same technology companies often deploy against them. But what makes these threats from these attackers so devious is not the technology they use, but rather that they never use the same approach twice.

“Cyber is big business and unfortunately it's causing a tremendous amount of business disruption. They continue to increase in sophistication and they have new and novel approaches. There are constantly unknown threats and new threat actors and that's part of the reason it gets very challenging. In some ways, a lot of the focus is people love to hear about all these cool techniques they use, but it's the fact that they're constantly evolving and changing the techniques that make it so difficult for security teams and for what I think of as static security tools to stay current against this range of threats.”

Nicole Eagan is the Chief A.I. Officer at Darktrace, a leader in autonomous cybersecurity A.I. On this episode of IT Visionaries, Nicole dives into why A.I. is a good tool, but not one powerful enough to prevalent today’s cybercriminals. Plus, she explains how security systems must constantly be learning, the impact IoT devices have had on security threats,  and why algorithms are at a war with one another.

Main Takeaways

  • Update Available: Companies are utilizing A.I. to predict and prevent attacks, but there is one major issue: the data sets they are using to prevent attackers from entering their networks are often filled with old datasets. By using old data, your artificial intelligence cannot understand how to protect you from new attacks.
  • The War of Algorithms: Future cyber attacks are no longer going to simply come from hackers infiltrating a network. Instead, these attackers are becoming more sophisticated and will use machine learning techniques to understand the type of behaviors the user is using in order to build a sophisticated attack. The only way to combat these types of attacks, is to use real-time self-learning A.I. systems that can detect abnormalities within a system.
  • Stop Acting in Silos: Security prevention needs to stop operating in silos when it comes to preventing attacks. Cyber criminals are no long attacking users through email or through loca networks, so security teams need to stop focusing on a niche area. Instead, develop an all encompassing self-learning platform that is constantly monitoring all aspects of your business and your employees.

IT Visionaries is brought to you by the Salesforce Platform - the #1 cloud platform for digital transformation of every experience. Build connected experiences, empower every employee, and deliver continuous innovation - with the customer at the center of everything you do. Learn more at salesforce.com/platform

 

 

Up next
Jun 26
What IT Leaders Can Learn from How the Government Buys Tech
IT leaders in regulated industries know the pain of navigating outdated, slow procurement systems – especially when critical missions depend on modern tools. In this episode, Bryana Tucci, Lead of the AWS Marketplace for the US Intelligence Community, shares how government agenci ... Show More
44m 4s
Jun 5
AI in Content Management | Opportunities and Challenges
Feeling buried under content chaos? You're not alone. Ravi Singh, President and Chief Product Officer at Brightspot, joins us to break down how IT leaders can regain control, cut through AI-generated noise, and build scalable, secure content systems. He shares the secrets behind ... Show More
52m 56s
Jun 4
The Future of IT and IT Visionaries
Meet Chris Brandt, the new host of IT Visionaries.In this special episode, outgoing host Albert Chou passes the mic to Chris—a seasoned Technology Strategist with a passion for connecting bold ideas to real business outcomes.Chris’s career spans startups to global enterprises, fr ... Show More
35m 8s
Recommended Episodes
May 2024
2889: Inside the World of Hacktivist DDoS Attacks with NETSCOUT's Richard Hummel
In this Tech Talks Daily Podcast episode, I sit down with Richard Hummel from NETSCOUT to delve into the ever-evolving DDoS threat landscape. Why has there been an explosion in hacktivist groups and DDoS attack activity this year, and what does this mean for organizations across ... Show More
33m 33s
May 2024
AI Is a Cybersecurity Tool and Threat
When it comes to cybersecurity, artificial intelligence is proving to be both a formidable defensive tool and a potential threat. Today, Patrick Hevesi, VP Analyst with Gartner for Technical Professionals, discusses the concept and implications of “dark AI.” He also highlights pr ... Show More
26m 19s
Sep 2019
Preventing Cyber Attacks with John Davis, Federal Chief Security Officer of Palo Alto Networks
From Senior Military Cyber Advisor at the Pentagon to VP and Federal Chief Security Officer at Palo Alto Networks, John Davis is an experienced cyber security professional focused on educating the public on cyber threats and preventing the next national and international cyber at ... Show More
52m 34s
Jan 2023
Criminal-on-criminal action in the dark web. The cyber phases of the hybrid war heat up. ICS vulnerabilities. Codespaces and malware servers. Blank-image attacks. Social engineering.
A hostile takeover of the Solaris contraband market. Ukraine warns that Russian cyberattacks continue. An overview of 2H 2022 ICS vulnerabilities. Codespaces accounts can act as malware servers. Blank-image attacks. Campaigns leveraging HR policy themes. Dinah Davis from Arctic W ... Show More
28m 12s
Sep 2023
Agent Tesla still hits unpatched systems. Hot wallet hacks. AI and DevSecOps. Notes on Fancy Bear and NoName057(16). And some curious trends in the cyber labor market.
There’s a new Agent Tesla variant. Lost credentials and crypto wallet hacks. Tension between DevSecOps and AI. Fancy Bear makes an attempt on Ukrainian energy infrastructure. A look at NoName057(16). Tim Starks from the Washington Post's Cybersecurity 202. Simone Petrella and Hel ... Show More
31m 23s
Jan 2023
The power of web data in cybersecurity. [CyberWire-X]
The public web data domain is a fancy way to say that there is a lot of information sitting on websites around the world that is freely available to anybody who has the initiative to collect it and use it for some purpose. When you do that collection, intelligence groups typicall ... Show More
28m 57s
Nov 2023
Cybercriminals at the service of the state, and an array of new underworld tools.
Data brokers offer information on active US military personnel. Current BlueNoroff activity. A new Gootloader variant is active in the wild. Atlassian vulnerabilities actively exploited. The prevalence of breaches. Update on a Barracuda vulnerability. Hacktivism and the cyber cou ... Show More
28m 16s
Oct 2017
No insight yet into Las Vegas gunman's motive as ISIS inspiration generally discounted. Yahoo! breach affected 3, not 1, billion user accounts. Equifax updates.
In today's podcast, we hear that ISIS claims of responsibility for Las Vegas murders continue to lose plausibility, but the shooter's motives remain a mystery. Yahoo!'s epic breach just got even more epic. Equifax looks little better in the wake of its CEO's Congressional testimo ... Show More
18m 3s
Aug 2023
Quantum computing: A threat to asymmetric encryption.
Rick Howard, the CSO, Chief Analyst, and Senior Fellow at N2K Cyber, discusses the meaning of quantum computing through a cybersecurity perspective with CyberWire Hash Table guests Dr. Georgian Shea, Chief Technologist at the Foundation for Defense of Democracies, and Jonathan Fr ... Show More
17m 33s