Women In Security Magazine Issue 3

Page 102

LINA YAO

HOW ARTIFICIAL INTELLIGENCE TRANSFORMS CYBERSECURITY by Lina Yao, Scientia Associate Professor at UNSW

As cyberattacks grow in volume and complexity,

Governments and businesses are making every

artificial intelligence (AI) is helping under-resourced

effort to protect themselves, but the volume of

security operations analysts stay ahead of threats.

attacks can be overwhelming for security analysts

By curating threat intelligence from millions of research papers, blogs and news stories, AI can provide instant insights to help cut through the noise of thousands of daily alerts, drastically reducing response times and mis/dis information on the

and unforeseen attacks and threats, such as the notorious ransomware attacks of the past two years that paralysed countless computers and even IoT devices.

internet, etc. The latest advancements in AI can

A security paradigm that is purely responsive will fail

take cybersecurity to a new level, and boost relevant

to provide adequate protection. It can resolve issues

research and application development.

only after they have been discovered, by which time,

According to the Australian Cyber Security Centre’s (ACSC) Annual Cyber Threat Report July 2019 to June 2020, in Australia alone there are, on average, more than six cyberattack incidents every single day, and most of them have moderate or substantial impacts. ACSC says it received 59,806 cybercrime reports in the 12 months to June 2020, almost one every 10 minutes. It says the true figure is probably much larger, because cybercrime in Australia is underreported. Notably, the attacks were mostly targeted at large organisations.

102

and professionals. And there will always be new

WOMEN IN SECURITY MAGAZINE

damage is likely to have already been done.[1] Without long-term vision, only identified and confirmed threats can be dealt with. New ones will not be addressed.

MACHINE LEARNING IS HOT Machine learning is a hot topic in artificial intelligence, and is capable of extracting valuable insights from existing knowledge, such as recordings of experiences, and identified threats or attacks. Machine learning has proved to be very effective in detecting variants of existing malware, attacks and


Turn static files into dynamic content formats.

Create a flipbook

Articles inside

Surviving a crisis - a view from the trenches

6min
pages 120-123

Are you doing enough to protect your organisation’s IT security?

2min
pages 118-119

Take me to cuba

6min
pages 111-113

Whose afraid of Zero Day

6min
pages 114-117

How to embrace the coming technology revolution

4min
pages 108-110

Linking data privacy to security

3min
pages 106-107

transforms cybersecurity

8min
pages 102-105

Back to basics

6min
pages 99-101

AusCERT plenary panel

6min
pages 96-98

Hackers are not who you think they are

2min
pages 91-95

Celebrating information security excellence in 2021

9min
pages 86-89

Factors threatening effective partnerships in crisis situations

2min
page 90

AWSN returning to in-person events around Australia

3min
pages 84-85

Building relationships in the security and risk suite and why it matters

4min
pages 80-81

fighting for women in STEM

8min
pages 76-79

Ten top tips to secure your website

3min
pages 74-75

How SiteMinder’s product and technology teams stayed motivated and innovative during the pandemic, while servicing the traditional hotel industry

5min
pages 72-73

Top 5 digital parenting tips for parents with teens

2min
pages 64-65

Lisa Jiggetts

5min
pages 54-57

Could inclusivity expand the cybersecurity talent pool in australia?

3min
pages 60-61

A Tuesday in the life of a Regional Technical Support Manager

5min
pages 62-63

How to make a midcareer move into cybersecurity

3min
pages 58-59

Gergana Winzer

7min
pages 46-49

Noushin Shabab

4min
pages 52-53

Christina Keing

4min
pages 50-51

Dr Lesley Seebeck

6min
pages 40-41

Anna Liebel

4min
pages 32-33

Jo Stewart-Rattray

5min
pages 34-36

Daniella Traino

6min
pages 30-31

Giulia Traverso

3min
page 37

Shelly Mills

5min
pages 38-39

How to create a culture of belonging and why it matters

8min
pages 18-21

Beware of ransomware

2min
pages 16-17

more diverse workforces

4min
pages 12-15
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.