{"id":6047,"date":"2020-02-27T23:00:24","date_gmt":"2020-02-27T23:00:24","guid":{"rendered":"https:\/\/www.n-able.com\/?p=6047"},"modified":"2021-04-08T23:02:18","modified_gmt":"2021-04-08T22:02:18","slug":"artificial-intelligence-in-cybersecurity","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/de\/blog\/artificial-intelligence-in-cybersecurity","title":{"rendered":"The Role of Artificial Intelligence in Cybersecurity"},"content":{"rendered":"<p>Most cybercriminals use older, tried-and-true attack methods like basic phishing, malware, or ransomware. However, cybercriminals often develop new methods, add twists on old favorites to evade detection, or build exploits for vulnerabilities before a patch is ready.<\/p>\n<p>These can cause nightmares for IT professionals already stretched thin. Many rarely have time to breathe in a given day, let alone keep up with new threats in the press or sift through threat intelligence data. Defending in an evolving threat landscape can take time and specialization.<\/p>\n<p>Even if you keep up with patches and other updates (and you absolutely should), it\u2019s still reactive to the threat landscape. But artificial intelligence (AI) may have given IT and security professionals alike a true advantage against cybercriminals. Today, I\u2019ll talk about the practical benefits of AI in security\u2014as well as some potential pitfalls.<\/p>\n<h3>What is artificial intelligence?<\/h3>\n<p>You likely have a decent sense of what AI entails. However, let\u2019s talk about the basics just to make sure our terms are covered.<\/p>\n<p>AI refers to machines mimicking intelligent human thought. AI makes decisions based on different variables in an environment and based on its previous knowledge. Machine learning is how an AI system gains its knowledge used to make decisions. This process of learning sets AI apart from more basic computer code\u2014code follows a procedure and logic to make decisions, but it always produces an expected outcome. Machine learning allows the machine to grow and \u201cthink\u201d on its own without having to follow preset logic rules.<\/p>\n<p>So how does this apply to security?<\/p>\n<p>Let\u2019s look at antivirus (AV) versus\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/rmm\/endpoint-detection-and-response?promo=blog\" target=\"_blank\" rel=\"noopener\">AI-driven endpoint protection<\/a>. AV solutions often work based on signatures. You have to keep up with signature definitions to stay protected against the latest threats. This can be a problem because virus definitions can be out-of-date, leaving a gap in coverage against the latest threats. Beyond that, it requires the AV vendor to know about the malware before it can catch it. If a new ransomware strain affects a computer, signature-protection won\u2019t catch it. Plus, cybercriminals often use evasion techniques to fly past these solutions, such as changing signatures (polymorphic malware) or attacking via fileless methods.<\/p>\n<p>AI-driven endpoint protection takes a different tack. It establishes a baseline of behavior for the endpoint using the machine learning training process. Over time, if something out of the ordinary occurs, the system flags it and takes action\u2014whether it\u2019s sending a notification to a technician or even reverting to a safe state after a ransomware attack. For example, if a user account on an endpoint starts mass deleting files or creating new admin accounts on the machine (and this behavior is atypical), the endpoint protection solution can flag this to a technician as a potential attack. This provides proactive protection against threats, rather than waiting for signature updates.<\/p>\n<p>AI can be used in other scenarios beyond just endpoint protection. For example, AI can be used to predict risks for an organization. However, for many small organizations served by MSPs, risk modelling may be overkill\u2014you can typically predict the biggest risks to an organization without the need of AI (or a data scientist on staff). However, if you have the data from an AI solution, definitely make use of it in adapting your security strategy to the customer\u2019s current situation.<\/p>\n<h3>Is AI just another buzzword?<\/h3>\n<p>Ultimately, AI presents a lot of promise. I can imagine a world where AV becomes a relic of the past, replaced by endpoint protection solutions. This isn\u2019t just due to AI\u2014endpoint protection solutions take a wider look at the endpoint and can protect against threats that AV simply can\u2019t. Not all threats are malware-based\u2014the increase of fileless and living-off-the-land attacks show the limitations of malware-only protection. Beyond that, AI can reduce the amount of time (or at least the urgency) of keeping up with the latest security news or threat intelligence.<\/p>\n<p>But, like anything else, don\u2019t put all your eggs into AI\u2019s basket. Everything can be hacked and broken. Everything has flaws, including AI and machine learning. For example, if cybercriminals were able to implant false information into a machine learning environment, they could trick the machine into finding false threats or missing positive threats. This isn\u2019t meant to knock AI security solutions\u2014to the contrary, tricking machine learning algorithms like this is very challenging. Instead, I mention it to say there\u2019s no silver bullet in security. You still need multiple layers in your arsenal\u2014from password protection to email security to backup. That said, don\u2019t dismiss AI as a buzzword either. It can be an essential and effective tool to give you a leg up on the cybercriminals.<\/p>\n<h3>Smarter security with AI<\/h3>\n<p>Artificial intelligence should quickly become an essential tool in your security arsenal. As cybercriminals continue evolving, you can hopefully sleep a little better at night knowing that your security tools evolve with them. When added into the mix as part of a wider security strategy, AI tools can be an effective, practical defense against modern cyberthreats.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>SolarWinds<sup>\u00ae<\/sup>\u00a0Endpoint Detection and Response (EDR) is an endpoint protection solution designed to help detect threats to customer endpoints via AI and machine learning. And it\u2019s available within both\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/n-central?promo=blog\" target=\"_blank\" rel=\"noopener\">SolarWinds RMM<\/a>\u00a0and\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/n-central?promo=blog\" target=\"_blank\" rel=\"noopener\">SolarWinds N&#8209;central<\/a><sup>\u00ae<\/sup>, allowing you to offer other important security layers like backup, patch management, email protection, and web protection.\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/rmm\/endpoint-detection-and-response?promo=blog\" target=\"_blank\" rel=\"noopener\">Learn more today<\/a>.\u00a0<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Has Artificial Intelligence finally given security professionals a real advantage in the fight against cybercriminals. XXXXXX looks at the impact AI will have on the infosec industry.<\/p>\n","protected":false},"author":24,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-6047","post","type-post","status-publish","format-standard","hentry","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>The Role of Artificial Intelligence in Cybersecurity - N-able<\/title>\n<meta name=\"description\" content=\"Has Artificial Intelligence finally given security professionals a real advantage in the fight against cybercriminals. XXXXXX looks at the impact AI will have on the infosec industry.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/de\/blog\/artificial-intelligence-in-cybersecurity\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Role of Artificial Intelligence in Cybersecurity - N-able\" \/>\n<meta property=\"og:description\" content=\"Has Artificial Intelligence finally given security professionals a real advantage in the fight against cybercriminals. XXXXXX looks at the impact AI will have on the infosec industry.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/de\/blog\/artificial-intelligence-in-cybersecurity\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2020-02-27T23:00:24+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-04-08T22:02:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"N-able\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"N-able\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"4\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/artificial-intelligence-in-cybersecurity#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/artificial-intelligence-in-cybersecurity\"},\"author\":{\"name\":\"N-able\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\"},\"headline\":\"The Role of Artificial Intelligence in Cybersecurity\",\"datePublished\":\"2020-02-27T23:00:24+00:00\",\"dateModified\":\"2021-04-08T22:02:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/artificial-intelligence-in-cybersecurity\"},\"wordCount\":915,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/de#organization\"},\"articleSection\":[\"Security\"],\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/artificial-intelligence-in-cybersecurity\",\"url\":\"https:\/\/www.n-able.com\/de\/blog\/artificial-intelligence-in-cybersecurity\",\"name\":\"The Role of Artificial Intelligence in Cybersecurity - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/de#website\"},\"datePublished\":\"2020-02-27T23:00:24+00:00\",\"dateModified\":\"2021-04-08T22:02:18+00:00\",\"description\":\"Has Artificial Intelligence finally given security professionals a real advantage in the fight against cybercriminals. XXXXXX looks at the impact AI will have on the infosec industry.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/artificial-intelligence-in-cybersecurity#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/de\/blog\/artificial-intelligence-in-cybersecurity\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/artificial-intelligence-in-cybersecurity#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Security\",\"item\":\"https:\/\/www.n-able.com\/de\/blog\/category\/security\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Role of Artificial Intelligence in Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/de#website\",\"url\":\"https:\/\/www.n-able.com\/de\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/de#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/de?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/de#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/de\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\",\"name\":\"N-able\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"caption\":\"N-able\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"The Role of Artificial Intelligence in Cybersecurity - N-able","description":"Has Artificial Intelligence finally given security professionals a real advantage in the fight against cybercriminals. XXXXXX looks at the impact AI will have on the infosec industry.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/de\/blog\/artificial-intelligence-in-cybersecurity","og_locale":"de_DE","og_type":"article","og_title":"The Role of Artificial Intelligence in Cybersecurity - N-able","og_description":"Has Artificial Intelligence finally given security professionals a real advantage in the fight against cybercriminals. XXXXXX looks at the impact AI will have on the infosec industry.","og_url":"https:\/\/www.n-able.com\/de\/blog\/artificial-intelligence-in-cybersecurity","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2020-02-27T23:00:24+00:00","article_modified_time":"2021-04-08T22:02:18+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg","type":"image\/jpeg"}],"author":"N-able","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Verfasst von":"N-able","Gesch\u00e4tzte Lesezeit":"4\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/de\/blog\/artificial-intelligence-in-cybersecurity#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/de\/blog\/artificial-intelligence-in-cybersecurity"},"author":{"name":"N-able","@id":"https:\/\/www.n-able.com\/de#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b"},"headline":"The Role of Artificial Intelligence in Cybersecurity","datePublished":"2020-02-27T23:00:24+00:00","dateModified":"2021-04-08T22:02:18+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/de\/blog\/artificial-intelligence-in-cybersecurity"},"wordCount":915,"publisher":{"@id":"https:\/\/www.n-able.com\/de#organization"},"articleSection":["Security"],"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/de\/blog\/artificial-intelligence-in-cybersecurity","url":"https:\/\/www.n-able.com\/de\/blog\/artificial-intelligence-in-cybersecurity","name":"The Role of Artificial Intelligence in Cybersecurity - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/de#website"},"datePublished":"2020-02-27T23:00:24+00:00","dateModified":"2021-04-08T22:02:18+00:00","description":"Has Artificial Intelligence finally given security professionals a real advantage in the fight against cybercriminals. XXXXXX looks at the impact AI will have on the infosec industry.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/de\/blog\/artificial-intelligence-in-cybersecurity#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/de\/blog\/artificial-intelligence-in-cybersecurity"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/de\/blog\/artificial-intelligence-in-cybersecurity#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Security","item":"https:\/\/www.n-able.com\/de\/blog\/category\/security"},{"@type":"ListItem","position":2,"name":"The Role of Artificial Intelligence in Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/de#website","url":"https:\/\/www.n-able.com\/de","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/de#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/de?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/de#organization","name":"N-able","url":"https:\/\/www.n-able.com\/de","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/de#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b","name":"N-able","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","caption":"N-able"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts\/6047","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/comments?post=6047"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts\/6047\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/media?parent=6047"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}