https://urgentcomm.com/wp-content/themes/ucm_child/assets/images/logo/footer-logo.png
  • Home
  • News
  • Multimedia
    • Back
    • Multimedia
    • Video
    • Podcasts
    • Galleries
  • Commentary
    • Back
    • Commentary
    • Urgent Matters
    • View From The Top
    • All Things IWCE
    • Legal Matters
  • Resources
    • Back
    • Resources
    • Events
    • Webinars
    • White Papers
    • Reprints & Reuse
  • IWCE
    • Back
    • IWCE
    • Conference
    • Special Events
    • Exhibitor Listings
    • Premier Partners
    • Floor Plan
    • Exhibiting Information
    • Register for IWCE
  • About Us
    • Back
    • About Us
    • Contact Us
    • Advertise
    • Terms of Service
    • Privacy Statement
    • Cookies Policy
  • Related Sites
    • Back
    • American City & County
    • IWCE
    • Light Reading
    • IOT World Today
    • Mission Critical Technologies
    • Microwave/RF
    • T&D World
    • TU-Auto
  • In the field
    • Back
    • In the field
    • Broadband Push-to-X
    • Internet of Things
    • Project 25
    • Public-Safety Broadband/FirstNet
    • Virtual/Augmented Reality
    • Land Mobile Radio
    • Long Term Evolution (LTE)
    • Applications
    • Drones/Robots
    • IoT/Smart X
    • Software
    • Subscriber Devices
    • Video
  • Call Center/Command
    • Back
    • Call Center/Command
    • Artificial Intelligence
    • NG911
    • Alerting Systems
    • Analytics
    • Dispatch/Call-taking
    • Incident Command/Situational Awareness
    • Tracking, Monitoring & Control
  • Network Tech
    • Back
    • Network Tech
    • Interoperability
    • LMR 100
    • LMR 200
    • Backhaul
    • Deployables
    • Power
    • Tower & Site
    • Wireless Networks
    • Coverage/Interference
    • Security
    • System Design
    • System Installation
    • System Operation
    • Test & Measurement
  • Operations
    • Back
    • Operations
    • Critical Infrastructure
    • Enterprise
    • Federal Government/Military
    • Public Safety
    • State & Local Government
    • Training
  • Regulations
    • Back
    • Regulations
    • Narrowbanding
    • T-Band
    • Rebanding
    • TV White Spaces
    • None
    • Funding
    • Policy
    • Regional Coordination
    • Standards
  • Organizations
    • Back
    • Organizations
    • AASHTO
    • APCO
    • DHS
    • DMR Association
    • ETA
    • EWA
    • FCC
    • IWCE
    • NASEMSO
    • NATE
    • NXDN Forum
    • NENA
    • NIST/PSCR
    • NPSTC
    • NTIA/FirstNet
    • P25 TIG
    • TETRA + CCA
    • UTC
Urgent Communications
  • NEWSLETTER
  • Home
  • News
  • Multimedia
    • Back
    • Video
    • Podcasts
    • Galleries
  • Commentary
    • Back
    • All Things IWCE
    • Urgent Matters
    • View From The Top
    • Legal Matters
  • Resources
    • Back
    • Events
    • Webinars
    • White Papers
    • Reprints & Reuse
    • UC eZines
    • Sponsored content
  • IWCE
    • Back
    • Conference
    • WHY ATTEND
    • Exhibitor Listings
    • Floor Plan
    • Exhibiting Information
    • Registration Opens April 2019-Join Our Mailing List
  • About Us
    • Back
    • About Us
    • Contact Us
    • Advertise
    • Terms of Service
    • Privacy Statement
    • Cookies Policy
  • Related Sites
    • Back
    • American City & County
    • IWCE
    • Light Reading
    • IOT World Today
    • TU-Auto
  • newsletter
  • In the field
    • Back
    • Internet of Things
    • Broadband Push-to-X
    • Project 25
    • Public-Safety Broadband/FirstNet
    • Virtual/Augmented Reality
    • Land Mobile Radio
    • Long Term Evolution (LTE)
    • Applications
    • Drones/Robots
    • IoT/Smart X
    • Software
    • Subscriber Devices
    • Video
  • Call Center/Command
    • Back
    • Artificial Intelligence
    • NG911
    • Alerting Systems
    • Analytics
    • Dispatch/Call-taking
    • Incident Command/Situational Awareness
    • Tracking, Monitoring & Control
  • Network Tech
    • Back
    • Cybersecurity
    • Interoperability
    • LMR 100
    • LMR 200
    • Backhaul
    • Deployables
    • Power
    • Tower & Site
    • Wireless Networks
    • Coverage/Interference
    • Security
    • System Design
    • System Installation
    • System Operation
    • Test & Measurement
  • Operations
    • Back
    • Critical Infrastructure
    • Enterprise
    • Federal Government/Military
    • Public Safety
    • State & Local Government
    • Training
  • Regulations
    • Back
    • Narrowbanding
    • T-Band
    • Rebanding
    • TV White Spaces
    • None
    • Funding
    • Policy
    • Regional Coordination
    • Standards
  • Organizations
    • Back
    • AASHTO
    • APCO
    • DHS
    • DMR Association
    • ETA
    • EWA
    • FCC
    • IWCE
    • NASEMSO
    • NATE
    • NXDN Forum
    • NENA
    • NIST/PSCR
    • NPSTC
    • NTIA/FirstNet
    • P25 TIG
    • TETRA + CCA
    • UTC
acc.com

Artificial Intelligence


Partner content

Building a foundation for artificial intelligence (AI) in cybersecurity

Building a foundation for artificial intelligence (AI) in cybersecurity

  • Written by Brian Buntz / IoT World Today
  • 15th September 2020

Cybersecurity is frequently compared to an endless game of cat and mouse, pitting human aggressors against human guardians in the cyber realm. In the future, that game will change as the role of artificial intelligence begins to supplant manual offense and defense.

A similar concept has gained ground for traditional warfare. “Speed is very important in warfare, and artificial intelligence can move us through the decision-making loop — the decision making cycle — far more quickly,” said John R. Allen, the president of the Brookings Institution and a retired general in a recent webinar.

In terms of cybersecurity, organizations that rely heavily on manual defenses are likely to be overwhelmed — not just by attackers equipped with artificial intelligence (AI), but by the difficulty of defending an exploding number of endpoints — including Internet of Things (IoT) devices.

“By 2025, IoT devices and processes will generate 465 exabytes worth of data per year globally, which is equivalent to 200 million DVDs per day,” said Oluyemi James Odeyinka, technical cloud architect and cybersecurity leader at Walgreens in a session at IoT World in August.

Organizational Maturity Is a Necessity 

But using AI in cybersecurity requires maturity, said David Coher, a former head of reliability and cybersecurity for a major electric utility. “First, it is important to ensure you have a well-defined security program, including thinking through the basics as well as the more advanced threats,” he explained. “It is important to have that base before beginning consideration of AI applications.”

Next, when evaluating AI-powered cybersecurity offerings, Coher recommended developing a concrete understanding of operational risk and needs. “It is important to ask, ‘Do we really have a use for this [new technology]?’ Or, perhaps, ‘What does this [new technology] do better than what we already have?’ By answering these questions, you can both build the case for the expense and improve the design of your security program,” he said.

To read the complete article, visit IoT World Today.

Tags: Applications Critical Infrastructure Cybersecurity Drones/Robots Enterprise Federal Government/Military Funding Internet of Things Interoperability IoT/Smart X News Policy Public Safety Security State & Local Government System Design System Operation Partner content

Related


  • Newscan: Single sign-in for government services expands to states, localities
    Newscan: Single sign-in for government services expands to states, localities
    Web Roundup Items from other news organizations Single sign-in for government services expands to states, localities Iowa taps into FirstNet for 911 backup Top Homeland Security senators want details on agencies hit in SolarWinds, Microsoft intrusions European institutions targeted in cyberattack last week FCC signals potential different outcome for net-neutrality remand 911: Past, present, more […]
  • ‘Life-saving technology’: AST SpaceMobile CEO outlines capabilities of direct-to-smartphone LEO satellite service
    [Editor’s note: This article has been updated to include clarifications about deployment timelines requested from AST SpaceMobile.] First responders and emergency callers subscribing to U.S. carriers and other major service providers will have affordable access to broadband communications beyond the coverage footprint of 4G and 5G terrestrial networks via their normal smart devices in the […]
  • Handcuffs over AI: Solving security challenges with law enforcement
    For the last 20 years, spending to solve cybersecurity goals has exploded to more than $100 billion annually. Security vendors tout advances in detection and protection that will provide the relief that has evaded the craft since its formation. The most recently heralded messiahs are machine learning (ML), security orchestration automation and response (SOAR), and artificial […]
  • Fujitsu: Cyber cretins are casing out private 5G
    Japan’s Fujitsu is inking a partnership with the US-Japanese cybersecurity giant Trend Micro and it’s all around cybersecurity and private 5G. Fujitsu and Trend Micro’s cooperation will kick off with a simulated smart factory environment, and an operational Fujitsu one. It sports a whirring menagerie of high-definition monitoring cameras and automatic guided vehicles. This simulated smart factory […]

Leave a comment Cancel reply

To leave a comment login with your Urgent Comms account:

Log in with your Urgent Comms account

Or alternatively provide your name, email address below:

Your email address will not be published. Required fields are marked *

Related Content

  • Biden's $100 billion broadband plan raises four big questions
  • Newscan: Satellite-technology revolution means there are swarms of spacecraft in orbit
  • Broadband expansion part of American Jobs Plan to rebuild country's infrastructure
  • IoT Cybersecurity Act places security onus on device makers

Commentary


Unlocking the power of ESInets: Different NG911 provisioning approaches exist; level of control is key differentiator

7th April 2021

Ransomware? Let’s call it what it really is: extortionware

21st February 2021

Redefining communications for today’s mobile workforces

18th February 2021
view all

Events


UC Ezines


IWCE 2019 Wrap Up

13th May 2019
view all

Twitter


UrgentComm

Public Safety Technology Alliance (PSTA) to shut down dlvr.it/RxpbTh

16th April 2021
UrgentComm

Klobuchar pledges support for NG911 funding, does not address specifics of proposal dlvr.it/Rxp4Wp

16th April 2021
UrgentComm

Want to stay up-to-date on the latest #criticalcommunications and #publicsafety trends? Sign up for IWCE's Urgent C… twitter.com/i/web/status/1…

15th April 2021
UrgentComm

Ubiquiti’s latest hack highlights troubled security path for operators dlvr.it/RxkzLj

15th April 2021
UrgentComm

Dependency problems increase for open-source components dlvr.it/RxkffD

15th April 2021
UrgentComm

How smart environments will take shape post-COVID-19 dlvr.it/RxkVPH

15th April 2021
UrgentComm

RootMetrics 5G report puts AT&T in first place dlvr.it/RxkVKD

15th April 2021
UrgentComm

Newscan: Cincinnati to pay $6 million to settle suit in death of Kyle Plush who called 911 dlvr.it/RxfsSd

14th April 2021

Newsletter

Sign up for UrgentComm’s newsletters to receive regular news and information updates about Communications and Technology.

Expert Commentary

Learn from experts about the latest technology in automation, machine-learning, big data and cybersecurity.

Business Media

Find the latest videos and media from the market leaders.

Media Kit and Advertising

Want to reach our digital and print audiences? Learn more here.

DISCOVER MORE FROM INFORMA TECH

  • American City & County
  • IWCE
  • Light Reading
  • IOT World Today
  • Mission Critical Technologies
  • Microwave/RF
  • T&D World
  • TU-Auto

WORKING WITH US

  • About Us
  • Contact Us
  • Events
  • Careers

FOLLOW Urgent Comms ON SOCIAL

  • Privacy
  • CCPA: “Do Not Sell My Data”
  • Cookies Policy
  • Terms
Copyright © 2021 Informa PLC. Informa PLC is registered in England and Wales with company number 8860726 whose registered and Head office is 5 Howick Place, London, SW1P 1WG.
This website uses cookies, including third party ones, to allow for analysis of how people use our website in order to improve your experience and our services. By continuing to use our website, you agree to the use of such cookies. Click here for more information on our Cookie Policy and Privacy Policy.
X