
Do you remember the film War Games? Released in 1983, this film starred Matthew Broderick as a high school kid who hacked into a super computer to play games and almost started world war III – but here comes the spoiler – a game of tic tac toe (noughts & crosses for us Europeans) helped the super computer learn and it decided to play chess instead of Global Thermonuclear War. Matthew Broderick`s character just wanted to play games with the computer – but hey that´s Hollywood. The reality is quite different with potential threats, breaches and cyber espionage being a top concern for businesses across all industries.
Attacks and those who are attacking are constantly evolving, changing, and developing new ways to breach secure networks, giving way to IT security professionals consistently monitoring, responding, and dealing with threats as close as they can to Real-Time.
Cybersecurity protections as discussed in previous blogs are the basics, but they follow rules created by the security teams and are manually updated/monitored. AI applications goes further and is particularly effective in Spam filtering, Network Intrusion, Fraud, Credit Scoring & forecasting of incidences.
With more remote working, more mobile device usage Endpoint Security is at the forefront of CSOs & CISOs worldwide as well as those pesky hackers. Our partner, Deep Instinct´s software is designed to protect mobile devices and services against known and unknown malicious attacks in real time. It has an advanced subset of AI, they call “deep neural networks” and the more data received it intuitively understands and learns. We would love to talk to you more about this amazing solution, so feel free to get in touch with us as we are “deep learning” every day too.
