Direct Technology Group Blog

Direct Technology Group provides professional IT Support and Network Services for Businesses around South Florida. Computer Services, Tech Support, IT Solutions and more!

Researchers From MIT May Have Found the Holy Grail of Network Security

When it comes to cybersecurity, maintenance is key. Whether you choose human-based security or an automated security solution, running into shortcomings is still possible. Human security tends to rely on the word of experts, and anything that doesn’t fit into the guidelines is missed and may therefore get through and wreak havoc. Network security can be a touch overzealous, in a way “crying wolf,” with an excess of false positives that ultimately require human analysis, leading to human frustration.

Blending the two in the past has proven difficult, as the experts with the necessary skills aren’t usually available for the time it takes to label the data for the programs to work properly. However, a team of researchers assembled from MIT’s CSAIL (Computer Science and Artificial Intelligence Laboratory) a PatternEx (a machine-learning startup) recognized these issues and have developed a platform that blends AI and human security attributes in a way that shields from the shortcomings of either.

Dubbed A.I.², this new platform is capable of detecting 85 percent of incoming attacks while reducing reported false positives to 20 percent of what they were originally. To achieve this, the “untrained” machine reports what machine learning tells it are the 200 most important problems in the sample set to a human expert, who then corrects the machine’s work. As the machine progresses through sets of data, it reports fewer and fewer false positives.

In doing so, A.I.² demonstrates machines effectively learning from human teachers, cooperating for the sake of security analysis accuracy.

The implications to the realm of security in the future are massive. It’s difficult not to let the imagination run wild with thoughts of upcoming technologies being influenced by this human-artificial intelligence hybrid.

However, since there is no telling how long it may be before a system like A.I.² could be available to users for purposes of data defense, business owners should still follow best practices. Users should not only be educated on the importance of avoiding typical security risks. They must also be reminded of the importance of compliance to regulatory standards for business security, such as those set by organizations like HIPAA, DSS, and others. They should also be encouraged to review the reports generated by security software.

Additionally, you could always allow Direct Technology Group to help manage your cybersecurity. By intelligently implementing security solutions, we can help your company avoid security issues and keep your IT in top working order. To set up a remote monitoring and maintenance solution, call 954-739-4700 today.

The Vast Majority of Business Owners that Try Clou...
Tip of the Week: Improve Email Open Rates With an ...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, 08 July 2020

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Business Computing Cloud Efficiency Productivity Hackers Network Security Google Malware Data Microsoft Innovation Software User Tips Business Smartphones Backup Miscellaneous Communication Hosted Solutions Hardware Email Workplace Tips communications Computer Mobile Devices Small Business Android Internet Productivity IT Support Business Management Smartphone VoIP Cybersecurity Ransomware Outsourced IT Windows Windows 10 Mobile Device Social Media Upgrade Managed IT Services Browser Tech Term Users Network Microsoft Office Collaboration Passwords IT Services Cloud Computing Bandwidth Employer-Employee Relationship Save Money Windows 10 Business Continuity Automation Holiday Apps Managed IT Services Facebook Office Marketing Chrome Quick Tips Data Backup Gadgets Internet of Things Gmail Saving Money Networking Server Data Recovery Managed Service Wi-Fi Disaster Recovery Wireless Phishing IT Support Alert Information Health Password Mobile Device Management Applications Router Apple Data Breach Remote Computing Settings Hacking Virtualization Access Control Retail Mobility App Business Intelligence VPN Office Tips Managed Service Provider Computers Analytics BYOD Application Data Management Going Green Twitter Laptop Physical Security Website Office 365 Operating System Remote Monitoring Blockchain Cybercrime Patch Management Government Recovery BDR Law Enforcement Excel iPhone Environment Value Entertainment Maintenance Artificial Intelligence Battery WiFi VoIP Big Data Lithium-ion battery Managed IT Service Bring Your Own Device Spam Virus Telephone Systems Social Engineering Biometrics History Google Drive Mouse Safety Printer Workers Compliance Paperless Office Conferencing Humor Mobile Computing Politics Word Voice over Internet Protocol How To Batteries Tech Terms Files eWaste Data storage End of Support User Error Best Practice Payment Cards Current Events Business Technology Virtual Reality Search Vulnerability Shortcut Tablet Hosted Solution Cortana Windows 7 Telephony Education Remote Monitoring and Management PowerPoint Mobile Office Human Resources Covid-19 Cleaning RAM Meetings DDoS Robot Tech Support IT solutions Hard Drives HIPAA Employee-Employer Relationship Processor Customer Relationship Management Hybrid Cloud Telephone System Shadow IT Healthcare Company Culture Risk Management Dark Web Customer Service Cost Management Wireless Charging Sports G Suite Remote Work Internet Exlporer Printer Server Net Neutrality Data Security Tip of the week Streaming Media Fax Server Information Technology Managing Stress The Internet of Things Medical IT Social Network Two-factor Authentication Scam Connectivity Virtual Assistant Data Protection Smart Technology NarrowBand Notifications Eliminating Downtime Hacker Downloads WannaCry Computer Repair Phone System Work/Life Balance User Downtime File Sharing instant Messaging Video Avoiding Downtime Storage Backup and Disaster Recovery Telecommuting Fleet Management Email Management Wireless Technology Bitcoin Automobile Wireless Internet Science Trends Hard Drive IT Service Amazon Network Attached Storage User Security Vulnerabilities OneNote Error SSD Millennials Multi-Factor Authentication Mobile Chromecast Licensing Help Desk Windows 8 A.I. Processors Plug-In Server Management Bluetooth Monitor Gadget Access Cryptocurrency Windows Server 2008 R2 Social Touchscreen Inventory Internet exploMicrosoft Database Holidays Wearable Technology Remote Travel Threats Antivirus Certification Techology Movies Spyware Proactive IT Machine Learning USB Reputation People Printers Bloatware Taskbar Google Maps Microsoft Office 365 Mobile Security Advertising Tactics Virtual Private Network Running Cable Remote Workers Live Streaming Uninterrupted Power Supply Scams Training HaaS Unified Communications HP Spotify Telecommute Customer Sales Time Management Entrepreneur National Security Social Networking Authentication e-waste Private Cloud Internet Explorer Voice over IP Co-Managed IT Multi-Factor Security Consultant WhatsApp Computer Accessories Project Management Personal Information Security Cameras Tablets Flexibility Document Management Cabling Analysis Data loss Knowledge Chrome OS Updates Botnet Authorization Public Cloud Threat eCommerce Memes Digital Management Best Available Touchpad News Cameras Insurance SaaS Wearables Legal Microsoft Teams Staff Comparison File Management Copy Distributed Denial of Service Managed IT Troubleshooting Printing Online Shopping IT Edge Remote Working Budget Memory Electronic Health Records Windows XP Websites Relocation Specifications Managed Services Provider Paste Unified Threat Management Display Update PDF Paper Hosted Desktop WIndows 7 Video Games Employees Programming Reporting Dongle Vendor Windows Media Player Benchmarks Outlook Ink Lead Generation Firewall Cables IT budget PCI DSS Black Market Remote Support Hiring/Firing E-Commerce Solid State Drive Webcam Content Filtering Remote Control SharePoint YouTube Encryption Recycling Profitability Profiles Alerts IT Management Regulations Compliance Staffing Worker Payment Analyitcs Hard Disk Drive GDPR Technology Tips disposal User Tip Distribution Spam Blocking