{"id":44082,"date":"2024-02-10T13:54:51","date_gmt":"2024-02-10T18:54:51","guid":{"rendered":"https:\/\/www.itworldcanada.com?p=558507"},"modified":"2024-02-10T13:54:51","modified_gmt":"2024-02-10T18:54:51","slug":"ai-in-cybersecurity-from-a-hands-on-tech-pro-hashtag-trending-the-weekend-edition-features-greg-statton-from-cohesity","status":"publish","type":"post","link":"https:\/\/technewsday.com\/staging\/ai-in-cybersecurity-from-a-hands-on-tech-pro-hashtag-trending-the-weekend-edition-features-greg-statton-from-cohesity\/","title":{"rendered":"AI in cybersecurity from a hands on tech pro: Hashtag Trending, the Weekend Edition features Greg Statton from Cohesity"},"content":{"rendered":"<p>AI in cybersecurity is not a new concept. Almost every security vendor has been working on it for years. In fact, AI was a godsend for cybersecurity.<\/p>\n<p>In the olden days, like 5 years ago, you pretty much needed to know what a threat was, what it did &#8211; what it&#8217;s &#8220;signature&#8221; was to be able to detect it and deal with it.<\/p>\n<p>Vendors set up intricate traps &#8211; honey pots &#8211; they monitored traffic, did everything to stay on top of all the threats.\u00a0 And frankly, they did a pretty good job of it.<\/p>\n<p>But the sheer volume of new attacks and methods is simply overwhelming. According to a Forrester Research report I found online for 2019, 80% of cybersecurity decision-makers expected AI to increase the scale and speed of attacks and 66% expected AI \u201cto conduct attacks that no human could conceive of.&#8221;<\/p>\n<p><iframe title=\"Embed Player\" src=\"https:\/\/play.libsyn.com\/embed\/episode\/id\/29808808\/height\/192\/theme\/modern\/size\/large\/thumbnail\/yes\/custom-color\/020300\/time-start\/00:00:00\/playlist-height\/200\/direction\/backward\/download\/yes\/font-color\/FFFFFF\" height=\"192\" width=\"100%\" scrolling=\"no\" allowfullscreen=\"\" webkitallowfullscreen=\"true\" mozallowfullscreen=\"true\" oallowfullscreen=\"true\" msallowfullscreen=\"true\" style=\"border: none;\"><\/iframe><\/p>\n<p>Well, if you listen to my sister podcast, CyberSecurity Today, that&#8217;s one prediction that came true. The host, my colleague Howard Solomon has no problem finding new threats to talk about &#8211; and he goes to air four times a week.<\/p>\n<p>So at one point, this idea that we can know everything that&#8217;s out there and detect it breaks down.<\/p>\n<p>And then there&#8217;s another problem &#8211; the sheer volume of attacks is astonishing. 20 years ago, a security expert at one of the major banks told me that if their firewall went down for 10 minutes, they&#8217;d be overwhelmed with attacks. Can you imagine what it&#8217;s like today?<\/p>\n<p>And not just volume, it&#8217;s the speed of the attacks. If they get in to your system, they often take their time and set up an attack, spreading throughout your network, so that when they do mount the attack, it&#8217;s massive, fast and overwhelming.<\/p>\n<p>People can&#8217;t move or think that fast.<\/p>\n<\/div>\n<p>Artificial intelligence was a solution that we desperately needed.\u00a0 And it&#8217;s been a godsend.<\/p>\n<p>But then &#8211; and we&#8217;ve all heard about it, a revolution in AI happened a little over a year ago.\u00a0 It&#8217;s called generative AI and it&#8217;s what powers ChatGPT and all those other AI engines that are coming to market almost daily.\u00a0 This type of AI can not only analyze &#8211; it can create &#8211; text, sound, pictures and even video.<\/p>\n<p>And&#8230;guess what else it can create?\u00a0 Yup.<\/p>\n<p>So we&#8217;re in the second wave of AI for cybersecurity.\u00a0 And now, not only the cybersecurity tool makers have it &#8211; but so do the bad guys.<\/p>\n<p>It&#8217;s going to change everything, yet again.<\/p>\n<p>But you know me. I hate hype. I want to dig in and find out what&#8217;s really happening.<\/p>\n<p>And so when I got pitched on a guest working for a company that is bringing a generative AI solution to market, I thought I should bring them in to talk about AI in cybersecurity.<\/p>\n<p>Relax, I&#8217;ve warned him, this is not a sales pitch for their product, but I do believe that we have to talk about this, not just in theory, but what it&#8217;s like in the real world.<\/p>\n<p>My guest today is Greg Statton from a firm called Cohesity.<\/p>\n<p>Hashtag Trending goes to air five days a week with a daily tech newscast. And every weekend we have a special in depth interview with a person or on a topic of interest &#8211; hopeful both.<\/p>\n<p>We love your comments &#8211; suggestions on topics, guests or just in telling us what you like and maybe what you don&#8217;t like. You can reach me at <a href=\"mailto:jlove@itwc.ca\" rev=\"en_rl_none\">jlove@itwc.ca<\/a><\/p>\n<p>And if you like what you hear why not recommend us to a friend? You can send a copy at <a href=\"http:\/\/itworldcanada.com\/podcasts\" rev=\"en_rl_none\">itworldcanada.com\/podcasts<\/a><\/p>\n<p>Or if you are an Apple podcast listener, why not give us a review. It all helps to grow our podcast and help us reach more people.<\/p>\n<p>That&#8217;s our show. Our recording engineer and new associate producer is Midori Nagai. And I&#8217;m your host,\u00a0 Jim Love. Thanks for sharing your weekend with us.<\/p>\n<p>The post <a href=\"https:\/\/www.itworldcanada.com\/article\/ai-in-cybersecurity-from-a-hands-on-tech-pro-hashtag-trending-the-weekend-edition-features-greg-statton-from-cohesity\/558507\">AI in cybersecurity from a hands on tech pro: Hashtag Trending, the Weekend Edition features Greg Statton from Cohesity<\/a> first appeared on <a href=\"https:\/\/www.itworldcanada.com\/\">IT World Canada<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>AI in cybersecurity is not a new concept. Almost every security vendor has been working on it for years. In fact, AI was a godsend for cybersecurity. In the olden days, like 5 years ago, you pretty much needed to know what a threat was, what it did \u2013 what it\u2019s \u201csignature\u201d was to be<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1083,360],"tags":[],"class_list":["post-44082","post","type-post","status-publish","format-standard","hentry","category-hashtag-trending","category-podcasts"],"acf":[],"_links":{"self":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/44082","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/comments?post=44082"}],"version-history":[{"count":3,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/44082\/revisions"}],"predecessor-version":[{"id":44235,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/44082\/revisions\/44235"}],"wp:attachment":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/media?parent=44082"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/categories?post=44082"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/tags?post=44082"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}