Access your Pro+ Content below.
AI in cybersecurity ups your odds against persistent threats
This article is part of the Information Security issue of November 2020, Vol. 21, No. 4
At the start of 2020, the cybersecurity landscape was already complicated: Deepfake videos using synthetic identities to commit fraud. Widespread business use of IoT devices creating a much larger attack surface for cybercriminals. Automated credential stuffing and brute-force attacks constantly generating access-based threats to accounts. Ransomware and phishing attacks on the rise. Nation-states threatening intellectual property. Then came a pandemic that forced millions of workers to become remote employees overnight, driving companies to shift their cybersecurity focus far beyond their own networks. Securing the remote workforce immediately became the No. 1 priority for CISOs and infosec pros. Remote employees working on personal networks were only left more vulnerable to phishing and other attacks that were already huge problems before most people were working from home. Reactive cybersecurity is no longer enough to protect sensitive data. In an era where even attacks are automated, infosec is fighting fire with fire and ...
Access this PRO+ Content for Free!
Features in this issue
When enterprises quickly pivoted to remote work during the pandemic, it prompted a wave of new threats while also widening existing gaps in cybersecurity postures.
Third parties often prove to be the weak links when it comes to IoT cybersecurity. Learn what you can do to minimize the risk while reaping the benefits that outside vendors bring.
News in this issue
AI capabilities can identify and take down cyberthreats in real time but are only part of what your team needs to come out on the winning side of the cybersecurity battle.
AI-powered analytics is critical to an effective, proactive security strategy. Learn how AI-enabled tools work and what your organization needs to do to reap their benefits.
Columns in this issue
Tackle the security challenges COVID-19 wrought by using this playbook from an experienced disaster-zone responder.
Cybersecurity pros have been predicting the firewall's demise for years, yet the device is still with us. But does it have a place in zero-trust networks? One analyst says yes.