本網站使用Cookies 以優化閣下的用戶體驗。繼續瀏覽網頁,以示閣下同意本站使用Cookies。詳情請參閱Cookie政策私隱政策

確定

返回

The Standard | 是敵是友?人工智能是對抗網絡威脅的雙刃劍 (English only)

媒體報導 @ 英文虎報

2024-01-17

The Standard | 是敵是友?人工智能是對抗網絡威脅的雙刃劍 (English only)

The world is buzzing with excitement over AI. From conducting thorough research to writing witty poems, AI has won the hearts of tech enthusiasts, business executives, and consumers. But, it is also gaining attention among hackers and defenders.

A Forrester Study indicates close to 80% of cybersecurity decision-makers anticipate offensive AI to increase the scale and speed of attacks, and 66% also expect AI to conduct attacks that no human could conceive of.

AI, a double-edged sword for security

AI is a game changer for both businesses and attackers. While businesses are experimenting with AI to drive digital business, threat actors also use AI to power more sophisticated attacks.

The cheap and easily accessible Generative AI (GenAI) tools allow attackers to quickly launch social engineering attacks, such as creating deep fake social media campaigns that destroy businesses' reputations or hyper-realistic phishing that disrupts communications. AI is also a great tool to automate threat actors’ operations by processing more stolen data and launching faster attacks. All these tools are speeding up cyberattack operations, making it extremely difficult for businesses to detect and prevent attacks simply with their legacy tools.

The Standard | 是敵是友?人工智能是對抗網絡威脅的雙刃劍 (English only)

CITIC Telecom CPC recently launched AI-powered TrustCSI™ 3.0 Cybersecurity Suites

To sharpen their defense strategies, businesses should also turn to AI to transform their cybersecurity operations. Aiming to help enterprises take advantage of AI, CITIC Telecom CPC recently launched TrustCSI™ 3.0. This AI-powered suite of cybersecurity solutions and services is designed to strengthen the red/blue practices—a simulation of offensive and defensive cybersecurity drills.

With the support of AI, the red team can conduct comprehensive assessments and attack simulations, while the blue team offers all-encompassing defense services. This holistic approach covers the entire cybersecurity service stack, from staff training and offensive and defensive drills to network protection solutions, security strategy, and service consultation.

The Standard | 是敵是友?人工智能是對抗網絡威脅的雙刃劍 (English only)

CITIC Telecom CPC’s CyberSecurity ReDEFINED conference discussed how “Al-Red/Blue Cybersecurity Practices” approach enables clients to proactively strengthen security measures

Sharpening the Red Teams

To perform effective cybersecurity assessments, more red teams are using AI the way threat actors are. Like attackers, more businesses are turning to intelligence to rapidly analyze networks and applications to uncover potential vulnerabilities.

Designed to identify vulnerabilities across the network infrastructure and web applications, TrustCSI™ IAS Information Assessment Service performs a comprehensive vulnerability scan. On top of assessing web applications, network equipment, and IT infrastructure, IAS also offers thorough service planning, risk prioritization, remediation recommendations, and re-auditing. This comprehensive assessment identifies the enterprise’s vulnerabilities, allowing the red team to understand potential attack paths and use AI to design customized penetration tests.

Hacking without breaking

Penetration test is the essence of offensive cybersecurity. The red team designs and simulates real-world attacks to actively attempt a breakthrough. It is a great exercise to assess an organization's risk posture, but it could be very time-consuming and sometimes costly. The traditional periodic penetration test also falls short of addressing the increasingly dynamic threat landscape.

CITIC Telecom CPC’s Penetration Test with AI provides a lightweight and routine self-testing solution. This automation tool allows businesses to schedule and customize tests to specific targets, like weak password testing, SQL injecting, or XSS testing. By leveraging this tool, businesses can robustly defend against potential threats cost-effectively, fortifying their security measures.

Empowering the Blue Teams

If the rd teams pretend to be the “bad guys,” the blue teams are genuinely the “good guys.” But the “good guys” always have a more demanding job. While the attackers need only one successful exploitation to launch an attack, the defenders must successfully guard every attack.

To help blue teams maintain their success rates, TrustCSI™ 3.0 introduces AI-powered monitoring and protection. The latest SOC-as-a-service (SOCaaS) integrates our local security experts with two global Security Incidents and Events Management (SIEM) technologies to provide intelligent round-the-cloud monitoring.

Instead of relying on a single technology, we use dual SIEM platforms to aggregate and cross-correlate threat intelligence data to identify and highlight potential threats. This Dual SIEM operation revolutionizes threat intelligence management, accelerates detection, and boosts security visibility.

Visualize hidden threats

On top of monitoring known threats in the network, businesses are encountering more unknown threats emerging with the rise of AI. For active investigation and real-time anomalous activity detection, businesses are turning to our Secure AI.

Supported by an advanced machine learning algorithm, Secure AI conducts User and Entity Behavior Analysis (UEBA) to identify the root cause of the anomaly detected quickly. It also formulates findings into actionable insights to predict whether the abnormal behaviors are significant enough to cause harm.

Seeing is believing, especially when it comes to evasive malware. Through the combination of malware detection technologies and visual computing with our classification algorithms, malware can no longer be hidden.

CITIC Telecom CPC’s AI Visual Security effectively processes massive amounts of data to discover hidden features of suspicious files. It also analyzes and classifies the files and turns them into graphic images. The visual presentation allows the blue team to quickly identify different types of malware without going through the file contents and uncover muted threats under the same family, even before they pose any risk.

AI and humans to defend against massive attacks

To prepare for a massive surge of attacks, businesses also turn to automation tools like Security Orchestration, Automation and Response (SOAR) to simplify and speed up remediate processes.

Such automation is only meaningful with a playbook that customizes the business environment and addresses its unique needs. This is when security professionals are essential to integrate experiences from business best practices with efficiencies from machines.

AI is transforming the way attackers operate, and so is the way businesses protect themselves. It uses data and automation across all stages of the cybersecurity framework - Identify & Predict, Protect, Detect, Respond & Recover - to bring faster and more cost-effective cybersecurity.

However, applying AI in this cybersecurity framework is more than investing in the latest AI tools. Human intelligence is crucial in developing a customized, comprehensive, proactive cybersecurity strategy.

With the rapid advancement of AI, it’s only a matter of time before businesses face AI-powered cyberattacks head-on—time to make AI your ally, not your enemy. Harness the power of AI with your trusted security partner to elevate your security measures in the ever-evolving threat landscape.

The Standard | 是敵是友?人工智能是對抗網絡威脅的雙刃劍 (English only)

產品與服務
網絡連接 信息安全管理 雲端運算方案 雲數據中心 互聯網服務 管理服務 歐洲解決方案
解決方案
建築、工程及建造 汽車 銀行、金融服務及保險業 物流及運輸 製造 法律和會計服務 零售 醫療保健
技術與服務
咨詢服務 客戶服務
資源中心
產品單頁 最新優惠 視頻 白皮書 成功案例 網誌
關於我們
我們公司 全球生態圈夥伴 新聞中心 認証及獎項 職位招聘
聯絡我們

一般查詢 / 銷售熱線 +852 2170 7401

客戶服務熱線 +852 2331 8930

聯絡我們

關注我們

Copyright © 中信國際電訊(信息技術)有限公司 CITIC Telecom International CPC Limited

需要幫忙?聯絡CPC聊天機械人
瀏覽器支援:IE11、Firefox、Chrome及Safari 的最新版本
條款及細則
歡迎來到中信國際電訊(信息技術)有限公司。閣下與CPC聊天機器人的對話内容可能會被記錄,以作培訓、質量監控和糾紛處理之用。如閣下點擊「繼續」並使用CPC聊天機器人,即表示閣下接受並同意受本公司之私隱政策約束,並同意本站使用Cookies。詳情請參閱Cookie政策私隱政策
繼續