Cyber security in the age of AI - The Nation

Cyber security in the age of AI - The Nation

In a constantly progressing cyber threat landscape where antivirus software and firewalls are considered tools of antiquity, organizations are now looking for more technologically advanced means of safeguarding classified and sensitive information. Artificial intelligence (AI) is taking the position as a warrior against digital threats across the globe. It has not only become popular in military domain, but security companies are also incorporating AI technologies for utilizing deep learning to find out similarities and differences within a data set. Companies like Microsoft are investing 1 billion USD in AI based companies such as Open AI. Only three countries are reported to be working on developing serious military AI technologies: US, Russia and China due to the fact that it promises military advantage to nation’s defensive and offensive military capabilities. With every new technology, comes a new threat. Hence, cyber threats to AI-based systems cannot be over looked. AI has the capacity to get merged with new, sophisticated but untried weaponry such as cyber offensive capabilities. This development is alarming as cyber offensive weapons have the capability to destabilize the balance of military power among the leading nations. With the advent of AI and machine learning, cyberattacks have become more commonly available threats for critical infrastructure – airport flight tracking, banking systems, hospital records, and programs which run the nation’s critical infrastructure and nuclear reactors. Failure by governments to take proactive measures to ensure the security of AI systems “is going to come back to bite us,” Omar Al Olama, minister of state for artificial intelligence for the United Arab Emirates, warned. Studies suggest one of the most significant problems which lie in the destabilizing effects of cyber weaponry, increased by AI technologies on the regional balance of power. Though there are no definite proofs that critical infrastructure command and control sy ..

Support the originator by clicking the read the rest link below.