{"id":13337,"date":"2020-08-26T15:19:41","date_gmt":"2020-08-26T18:19:41","guid":{"rendered":"https:\/\/ostec.blog\/?p=13337"},"modified":"2020-08-26T15:19:41","modified_gmt":"2020-08-26T18:19:41","slug":"how-artificial-intelligence-has-influenced-information-security","status":"publish","type":"post","link":"https:\/\/ostec.blog\/en\/general\/how-artificial-intelligence-has-influenced-information-security\/","title":{"rendered":"How Artificial Intelligence has Influenced Information Security"},"content":{"rendered":"<p>It is already among us! The technologies that use <strong>Artificial Intelligence (AI)<\/strong>are already present in our daily activities, even in some moments in a little perceived way. The recommendation of movies and series that may be of interest to us at Netflix uses <strong>artificial intelligence<\/strong>to recognize patterns, making suggestions based on our preferences. Credit card operators use <strong>AI <\/strong>to identify suspicious expenses, preventing losses to their users. When you say &#8220;ok, Google&#8221; or &#8220;hey, Siri,&#8221; the answer comes from an <strong>Artificial Intelligence<\/strong>software, which learns from you and from many other users, identifying patterns and reacting to the best responses.<\/p>\n<p>With the evolution in machine learning, <strong>Artificial Intelligence<\/strong>has become increasingly intelligent and less artificial, being applied in a multitude of market segments.<\/p>\n<p>As it could not be different, <strong>AI<\/strong>has also been gaining space in products and services associated to digital security, facilitating the day to day of technology professionals and increasing security levels in organizations. In this blog post, we will give an overview of how this concept has been applied in security products, as well as the benefits and challenges for technology to gain space in the current and future market.<\/p>\n<h2>How AI is being applied to information security<\/h2>\n<p>A recent\u00a0<u><a href=\"https:\/\/gtnr.it\/2PsTPTT\">research by Gartner<\/a><\/u>, a global leader in unbiased technology research and advice, has identified <strong>Artificial Intelligence<\/strong>as a prime tool that will enable businesses to survive and grow over the next 5 to 10 years. In addition, research companies also estimate that AI-based solutions will be in almost all software products by 2020.<\/p>\n<p>In digital security, <strong>Artificial Intelligence<\/strong>is closely linked to the prevention of virtual threats in an autonomous way. A digital security product that uses this type of technology can be adapted to analyze and classify several variations of malware, being able to promote increasingly efficient defense mechanisms.<\/p>\n<p>A study by the Massachusetts Institute of Technology (MIT) in 2016 showed that <strong>Artificial Intelligence<\/strong>is capable of detecting 85% of cyberattacks. These systems encounter suspicious activity, confront behaviors based on extensive databases, and make automated decisions. They then report to human experts in order to confirm which events were actual attacks. In the end, <strong>AI <\/strong>incorporates this feedback into its system and thus improves its ability to detect and solve problems.<\/p>\n<h2>The smarter the threat, the smarter the protection needs to be.<\/h2>\n<p>Today we have\u00a0<u><a href=\"https:\/\/glo.bo\/2x0RTJW\">more machines than connected cell phones<\/a><\/u>. There are more than 8.4 billion IoT devices connected and the forecast is that by 2020 they will be more than 20 billion. In this scenario, it is imperative that security solutions are implemented, being capable of &#8220;learning&#8221; and adapting quickly, through situations that may generate security risks to the corporate data. Specifically speaking about perimeter security, we can highlight products characterized as <strong>smarts firewalls<\/strong>, which use <strong>artificial intelligence<\/strong>to raise the level of network security, going beyond the features present in a traditional firewall.<\/p>\n<p>While the conventional firewall model only handles IP and source \/ destination port and flags, statically, a <strong>smart firewall<\/strong>goes further. With deeper analysis within network packets, a smart firewall is able to analyze packet behavior and identify anomalies. While the conventional firewall model only handles IP and source \/ destination port and flags, statically, a smart firewall goes further. With deeper analysis within network packets, a <strong>smart firewall<\/strong>is able to analyze packet behavior and identify anomalies<\/p>\n<h2>Products that can learn<\/h2>\n<p>The great advantage of using <strong>Artificial Intelligence<\/strong>is the possibility of self-learning, based on data. And this is what can be seen in the Cognitive Antivirus developed by the American company Sparkcognition.<\/p>\n<p>Senior Product Manager Keith Moore explains that through the use of cognitive algorithms it is possible to constantly learn new malware behaviors, recognizing how the polymorphic file can attempt to attack in the future. According to him, &#8220;This keeps all endpoints safe from malware that uses domain-generated algorithms, obfuscation, minor codefixes, and many modern tools.&#8221;<\/p>\n<p>In addition to this initiative, other companies around the world are developing <strong>AIs<\/strong>with a focus on self-learning to enable automatic defense of devices and networks. There are countless projects focused on corporate audiences and also on the protection of home networks. The reflection of this movement is an increasing number of products in the market with the &#8220;Smart&#8221; concept.<\/p>\n<p>However, there is still one thing that no technology can do: thinking strategically, choosing the solution that best fits the business reality, and also taking into account tangible and intangible variables.<\/p>\n<p>That&#8217;s why no matter how technology advances, CIOs and IT professionals still need to be aware of the importance of investing in digital security and thus seek to deploy techniques and tools that make corporate environments more secure, taking into account the particularities of each organization.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>It is already among us! The technologies that use Artificial Intelligence (AI)are already present in our daily activities, even in some moments in a little perceived way. The recommendation of movies and series that may be of interest to us at Netflix uses artificial intelligenceto recognize patterns, making suggestions based on our preferences. Credit card [&hellip;]<\/p>\n","protected":false},"author":13,"featured_media":12749,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[984,992],"tags":[1553,1565,1675],"class_list":["post-13337","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","category-learning-and-discovery","tag-firewalls-inteligentes-en","tag-ia-firewalls-en","tag-smart-firewalls-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How Artificial Intelligence has Influenced Information Security - OSTEC | Seguran\u00e7a digital de resultados<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ostec.blog\/en\/general\/how-artificial-intelligence-has-influenced-information-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Artificial Intelligence has Influenced Information Security - OSTEC | Seguran\u00e7a digital de resultados\" \/>\n<meta property=\"og:description\" content=\"It is already among us! The technologies that use Artificial Intelligence (AI)are already present in our daily activities, even in some moments in a little perceived way. The recommendation of movies and series that may be of interest to us at Netflix uses artificial intelligenceto recognize patterns, making suggestions based on our preferences. Credit card [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ostec.blog\/en\/general\/how-artificial-intelligence-has-influenced-information-security\/\" \/>\n<meta property=\"og:site_name\" content=\"OSTEC | Seguran\u00e7a digital de resultados\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ostec\" \/>\n<meta property=\"article:published_time\" content=\"2020-08-26T18:19:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ostec.blog\/wp-content\/uploads\/2018\/09\/Cer\u00e9bro.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"928\" \/>\n\t<meta property=\"og:image:height\" content=\"534\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Thais Souza\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ostecsecurity\" \/>\n<meta name=\"twitter:site\" content=\"@ostecsecurity\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/ostec.blog\/en\/general\/how-artificial-intelligence-has-influenced-information-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/ostec.blog\/en\/general\/how-artificial-intelligence-has-influenced-information-security\/\"},\"author\":{\"name\":\"Thais Souza\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/person\/ca88ecd81da20ed5773cd0959c645c33\"},\"headline\":\"How Artificial Intelligence has Influenced Information Security\",\"datePublished\":\"2020-08-26T18:19:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/ostec.blog\/en\/general\/how-artificial-intelligence-has-influenced-information-security\/\"},\"wordCount\":774,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/ostec.blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/ostec.blog\/en\/general\/how-artificial-intelligence-has-influenced-information-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2018\/09\/Cer\u00e9bro.jpg\",\"keywords\":[\"firewalls inteligentes\",\"ia firewalls\",\"smart firewalls\"],\"articleSection\":[\"General\",\"Learning and discovery\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/ostec.blog\/en\/general\/how-artificial-intelligence-has-influenced-information-security\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ostec.blog\/en\/general\/how-artificial-intelligence-has-influenced-information-security\/\",\"url\":\"https:\/\/ostec.blog\/en\/general\/how-artificial-intelligence-has-influenced-information-security\/\",\"name\":\"How Artificial Intelligence has Influenced Information Security - OSTEC | Seguran\u00e7a digital de resultados\",\"isPartOf\":{\"@id\":\"https:\/\/ostec.blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/ostec.blog\/en\/general\/how-artificial-intelligence-has-influenced-information-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/ostec.blog\/en\/general\/how-artificial-intelligence-has-influenced-information-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2018\/09\/Cer\u00e9bro.jpg\",\"datePublished\":\"2020-08-26T18:19:41+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/ostec.blog\/en\/general\/how-artificial-intelligence-has-influenced-information-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ostec.blog\/en\/general\/how-artificial-intelligence-has-influenced-information-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ostec.blog\/en\/general\/how-artificial-intelligence-has-influenced-information-security\/#primaryimage\",\"url\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2018\/09\/Cer\u00e9bro.jpg\",\"contentUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2018\/09\/Cer\u00e9bro.jpg\",\"width\":928,\"height\":534,\"caption\":\"Grande c\u00e9rebro desenhado em uma placa.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ostec.blog\/en\/general\/how-artificial-intelligence-has-influenced-information-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/ostec.blog\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How Artificial Intelligence has Influenced Information Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ostec.blog\/#website\",\"url\":\"https:\/\/ostec.blog\/\",\"name\":\"OSTEC | Seguran\u00e7a digital de resultados\",\"description\":\"Empresa especializada na oferta de produtos e servi\u00e7os de seguran\u00e7a digital.\",\"publisher\":{\"@id\":\"https:\/\/ostec.blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ostec.blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/ostec.blog\/#organization\",\"name\":\"OSTEC Business Security\",\"url\":\"https:\/\/ostec.blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png\",\"contentUrl\":\"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png\",\"width\":251,\"height\":67,\"caption\":\"OSTEC Business Security\"},\"image\":{\"@id\":\"https:\/\/ostec.blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ostec\",\"https:\/\/x.com\/ostecsecurity\",\"https:\/\/www.instagram.com\/ostecsecurity\/\",\"https:\/\/linkedin.com\/company\/ostec-security\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/person\/ca88ecd81da20ed5773cd0959c645c33\",\"name\":\"Thais Souza\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ostec.blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/400dde6458954de06efa803109767977?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/400dde6458954de06efa803109767977?s=96&d=mm&r=g\",\"caption\":\"Thais Souza\"},\"url\":\"https:\/\/ostec.blog\/en\/author\/thais-souza\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How Artificial Intelligence has Influenced Information Security - OSTEC | Seguran\u00e7a digital de resultados","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ostec.blog\/en\/general\/how-artificial-intelligence-has-influenced-information-security\/","og_locale":"en_US","og_type":"article","og_title":"How Artificial Intelligence has Influenced Information Security - OSTEC | Seguran\u00e7a digital de resultados","og_description":"It is already among us! The technologies that use Artificial Intelligence (AI)are already present in our daily activities, even in some moments in a little perceived way. The recommendation of movies and series that may be of interest to us at Netflix uses artificial intelligenceto recognize patterns, making suggestions based on our preferences. Credit card [&hellip;]","og_url":"https:\/\/ostec.blog\/en\/general\/how-artificial-intelligence-has-influenced-information-security\/","og_site_name":"OSTEC | Seguran\u00e7a digital de resultados","article_publisher":"https:\/\/www.facebook.com\/ostec","article_published_time":"2020-08-26T18:19:41+00:00","og_image":[{"width":928,"height":534,"url":"https:\/\/ostec.blog\/wp-content\/uploads\/2018\/09\/Cer\u00e9bro.jpg","type":"image\/jpeg"}],"author":"Thais Souza","twitter_card":"summary_large_image","twitter_creator":"@ostecsecurity","twitter_site":"@ostecsecurity","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ostec.blog\/en\/general\/how-artificial-intelligence-has-influenced-information-security\/#article","isPartOf":{"@id":"https:\/\/ostec.blog\/en\/general\/how-artificial-intelligence-has-influenced-information-security\/"},"author":{"name":"Thais Souza","@id":"https:\/\/ostec.blog\/#\/schema\/person\/ca88ecd81da20ed5773cd0959c645c33"},"headline":"How Artificial Intelligence has Influenced Information Security","datePublished":"2020-08-26T18:19:41+00:00","mainEntityOfPage":{"@id":"https:\/\/ostec.blog\/en\/general\/how-artificial-intelligence-has-influenced-information-security\/"},"wordCount":774,"commentCount":0,"publisher":{"@id":"https:\/\/ostec.blog\/#organization"},"image":{"@id":"https:\/\/ostec.blog\/en\/general\/how-artificial-intelligence-has-influenced-information-security\/#primaryimage"},"thumbnailUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2018\/09\/Cer\u00e9bro.jpg","keywords":["firewalls inteligentes","ia firewalls","smart firewalls"],"articleSection":["General","Learning and discovery"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/ostec.blog\/en\/general\/how-artificial-intelligence-has-influenced-information-security\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/ostec.blog\/en\/general\/how-artificial-intelligence-has-influenced-information-security\/","url":"https:\/\/ostec.blog\/en\/general\/how-artificial-intelligence-has-influenced-information-security\/","name":"How Artificial Intelligence has Influenced Information Security - OSTEC | Seguran\u00e7a digital de resultados","isPartOf":{"@id":"https:\/\/ostec.blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ostec.blog\/en\/general\/how-artificial-intelligence-has-influenced-information-security\/#primaryimage"},"image":{"@id":"https:\/\/ostec.blog\/en\/general\/how-artificial-intelligence-has-influenced-information-security\/#primaryimage"},"thumbnailUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2018\/09\/Cer\u00e9bro.jpg","datePublished":"2020-08-26T18:19:41+00:00","breadcrumb":{"@id":"https:\/\/ostec.blog\/en\/general\/how-artificial-intelligence-has-influenced-information-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ostec.blog\/en\/general\/how-artificial-intelligence-has-influenced-information-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ostec.blog\/en\/general\/how-artificial-intelligence-has-influenced-information-security\/#primaryimage","url":"https:\/\/ostec.blog\/wp-content\/uploads\/2018\/09\/Cer\u00e9bro.jpg","contentUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2018\/09\/Cer\u00e9bro.jpg","width":928,"height":534,"caption":"Grande c\u00e9rebro desenhado em uma placa."},{"@type":"BreadcrumbList","@id":"https:\/\/ostec.blog\/en\/general\/how-artificial-intelligence-has-influenced-information-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/ostec.blog\/en\/"},{"@type":"ListItem","position":2,"name":"How Artificial Intelligence has Influenced Information Security"}]},{"@type":"WebSite","@id":"https:\/\/ostec.blog\/#website","url":"https:\/\/ostec.blog\/","name":"OSTEC | Seguran\u00e7a digital de resultados","description":"Empresa especializada na oferta de produtos e servi\u00e7os de seguran\u00e7a digital.","publisher":{"@id":"https:\/\/ostec.blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ostec.blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/ostec.blog\/#organization","name":"OSTEC Business Security","url":"https:\/\/ostec.blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ostec.blog\/#\/schema\/logo\/image\/","url":"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png","contentUrl":"https:\/\/ostec.blog\/wp-content\/uploads\/2020\/11\/logo_ostec_250.png","width":251,"height":67,"caption":"OSTEC Business Security"},"image":{"@id":"https:\/\/ostec.blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ostec","https:\/\/x.com\/ostecsecurity","https:\/\/www.instagram.com\/ostecsecurity\/","https:\/\/linkedin.com\/company\/ostec-security"]},{"@type":"Person","@id":"https:\/\/ostec.blog\/#\/schema\/person\/ca88ecd81da20ed5773cd0959c645c33","name":"Thais Souza","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ostec.blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/400dde6458954de06efa803109767977?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/400dde6458954de06efa803109767977?s=96&d=mm&r=g","caption":"Thais Souza"},"url":"https:\/\/ostec.blog\/en\/author\/thais-souza\/"}]}},"_links":{"self":[{"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/posts\/13337","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/comments?post=13337"}],"version-history":[{"count":0,"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/posts\/13337\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/media\/12749"}],"wp:attachment":[{"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/media?parent=13337"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/categories?post=13337"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ostec.blog\/en\/wp-json\/wp\/v2\/tags?post=13337"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}