Palo Alto Networks Blog 2024年07月04日
Advancing Innovation and Harnessing AI to Secure the Homeland
index_new5.html
../../../zaker_core/zaker_tpl_static/wap/tpl_guoji1.html

 

本文探讨了人工智能在网络安全领域的应用,阐述了AI如何被用于增强网络攻击和防御。作者强调了AI在网络防御中的优势,并介绍了Palo Alto Networks公司利用AI技术提升网络安全防御的案例。文章还强调了AI安全的重要性,并呼吁企业采取“安全AI设计”的理念来保护AI基础设施。

😈 **AI增强网络攻击:** 攻击者利用AI技术提升社会工程攻击的效率,例如生成更逼真的钓鱼邮件,从而提高攻击成功率。AI还能加速攻击速度,扩大攻击范围,寻找新的攻击路径,并加速恶意软件的开发,降低定制恶意软件的成本。 攻击者利用AI技术可以更有效地进行社会工程攻击,例如生成更逼真的钓鱼邮件,从而提高攻击成功率。AI还能加速攻击速度,扩大攻击范围,寻找新的攻击路径,并加速恶意软件的开发,降低定制恶意软件的成本。 AI技术的进步使得攻击者能够更轻松地进行网络攻击,因此,网络防御者必须不断创新,采用最先进的安全工具来应对不断变化的威胁。

🛡️ **AI助力网络防御:** AI可以帮助网络防御者识别和阻止攻击,并提高安全运营中心的效率。Palo Alto Networks公司利用AI技术每天检测到230万个新攻击,并阻止了113亿次攻击。AI还可以帮助安全运营中心提升效率,减少人为干预,提高事件响应速度。 AI可以帮助网络防御者识别和阻止攻击,并提高安全运营中心的效率。Palo Alto Networks公司利用AI技术每天检测到230万个新攻击,并阻止了113亿次攻击。AI还可以帮助安全运营中心提升效率,减少人为干预,提高事件响应速度。 AI驱动的安全运营中心可以帮助防御者更快地发现和应对安全事件,从而提高安全态势。

🔐 **AI安全设计:** AI的应用也带来了新的安全风险,例如AI应用的滥用和恶意模型的传播。为了确保AI安全,企业需要采用“安全AI设计”的理念,从AI应用开发的各个环节入手,保护AI应用、模型和数据安全,并监督员工的AI使用情况。 AI的应用也带来了新的安全风险,例如AI应用的滥用和恶意模型的传播。为了确保AI安全,企业需要采用“安全AI设计”的理念,从AI应用开发的各个环节入手,保护AI应用、模型和数据安全,并监督员工的AI使用情况。 安全AI设计需要从开发、运行和使用等多个方面进行考虑,以确保AI应用的安全可靠。

🤝 **合作共赢:** 网络安全需要各方共同努力,包括政府、企业和个人。网络安全公司可以通过威胁情报共享、人才培养等方式,共同提高网络安全防御能力。 网络安全需要各方共同努力,包括政府、企业和个人。网络安全公司可以通过威胁情报共享、人才培养等方式,共同提高网络安全防御能力。 AI技术在网络安全领域有着巨大的潜力,但同时也带来了新的挑战。只有通过合作和创新,才能更好地应对网络安全威胁,确保网络空间的安全稳定。

As Chief Technology Officer for Unit 42 and a cybersecurity educator, I have a unique vantage point into the cyberthreat landscape. I recently had the honor of testifying before the House Committee on Homeland Security to share the Palo Alto Networks perspective on the intersection of AI and cybersecurity. The hearing was bipartisan in nature, and our company appreciates the commitment from Chairman Green, Ranking Member Thompson, and the rest of the committee to thoughtfully explore this important topic.

Adversarial Innovation

Cyber adversaries are already leveraging AI to advance their trade craft and will continue to do so going forward. For example, we see evidence that adversaries are using AI to enhance what we call social engineering attacks – phishing emails designed to lure users to “click the link.” Historically, these messages have been littered with poor grammar and typos, making their fraudulent nature relatively easy to detect, but they are becoming more accurate and therefore more believable. Adversaries are now able to generate flawless, mistake-free text, enabling click-through rates to skyrocket.

Additionally, bad actors are innovating with AI to accelerate and scale attacks and find new attack vectors. They could execute numerous simultaneous attacks on one company across multiple vulnerabilities. Adversarial use of AI can allow faster lateral movement within networks and more rapid weaponization of reconnaissance data. Going forward, there is the potential for a significant surge in malware variants as the cost of creating customized malware drops substantially.

None of this should be a surprise. Adversaries are always evolving, with or without AI, and we can never be complacent. As cyber defenders, our mission is to understand and track adversarial capabilities while relentlessly innovating and deploying best-in-class security tools to stay ahead.

Harnessing AI for Cyber Defense

This backdrop only heightens the importance of fully harnessing the substantial benefits AI offers for cyber defense.

Indeed, the demonstrated impact of AI-powered cyber defense is already significant. By leveraging Precision AI, each day Palo Alto Networks detects an average of 2.3 million unique attacks that were not present the day before. This process of continuous discovery and analysis allows threat detection to stay ahead of the adversary, blocking an average of 11.3 billion total attacks every day.

A particularly compelling use case for AI-powered cyber defense is upleveling and modernizing the Security Operations Center, or “SOC” as cyber practitioners call it.

For too long, our community’s most precious cyber resources – people – have been inundated with security alerts that require manual triage, forcing them to play an inefficient game of whack-a-mole, while vulnerabilities remain exposed and critical alerts are missed. Making matters more difficult, this legacy approach often requires defenders to stitch together security data from across dozens of disparate cybersecurity products at the same time – a difficult and often counterproductive task to achieve desired cybersecurity outcomes.

This inefficient, manual posture results in suboptimal Mean Time to Detect and Mean Time to Respond times for security operations teams. As the terms suggest, these metrics provide quantifiable data points for network defenders about how quickly they discover potential security incidents and then how quickly they can contain them. Historically, organizations have struggled to execute against these metrics – responding to breaches in close to 6 days on average when many attackers begin exfiltrating data in just hours.

AI-driven SOCs can flip this paradigm and give defenders the upper hand. This technology acts as a force multiplier for cybersecurity professionals to substantially reduce detection and response times. Early customer adoption of this technology is proving transformative – reducing Mean Time to Respond from 2-3 days to under 2 hours and increasing incident close out rates by 5x.

Securing AI by Design

While the adoption of AI continues to soar, so too do the associated security risks. From unauthorized AI usage to the proliferation of malicious models, organizations must rethink how they are safeguarding their AI infrastructure.

Multiple Members of Congress asked me how AI app adoption is changing the way enterprises must think about security. The era of AI indeed does necessitate an evolved security approach that we like to call Securing AI By Design. This approach requires several abilities:

    Securing every step of the AI app development lifecycle and supply chain.Protecting AI applications, models and data from threats in runtime.Overseeing employee AI usage to ensure compliance with internal policies.

These principles are aligned with, and based on, the security concepts already included in the NIST AI Risk Management Framework (RMF). Securing AI by Design builds off the secure by design momentum highlighted in CISA’s recently released pledge, of which Palo Alto Networks is a proud signee.

Collective Defense in the Era of AI

Cyber resilience takes all of us working together. Ultimately, people and partnerships work in concert with technological innovation. To that end, Palo Alto Networks is proud to participate in threat intelligence sharing forums like CISA’s Joint Cyber Defense Collaborative and to steward innovative accelerated onboarding programs like the Unit 42 Academy.

As I reinforced during the hearing, the topics we discussed are important to me on a personal level. I’m honored to have spent decades both as a cybersecurity practitioner partnering with governments to stop threats and as an educator training the cyber workforce of tomorrow.

It’s with that background that I can say confidently that homeland security, national security and critical infrastructure resilience are being enhanced by AI-powered cyber defense at this very moment. And we must keep the pedal to the metal, because our adversaries are certainly not sitting on their hands.

Learn more about the hearing and view the full testimony.

The post Advancing Innovation and Harnessing AI to Secure the Homeland appeared first on Palo Alto Networks Blog.

Fish AI Reader

Fish AI Reader

AI辅助创作,多种专业模板,深度分析,高质量内容生成。从观点提取到深度思考,FishAI为您提供全方位的创作支持。新版本引入自定义参数,让您的创作更加个性化和精准。

FishAI

FishAI

鱼阅,AI 时代的下一个智能信息助手,助你摆脱信息焦虑

联系邮箱 441953276@qq.com

相关标签

人工智能 网络安全 AI防御 AI攻击 安全AI设计
相关文章