Automation: moving security from human to machine speed, and all its implications

Information security experts consider machine automation to provide cyber security in an age of under-staffed and over-worked computer security teams.

Cyber Automation 30 May 2019

SANTA CLARA, Calif. – Security teams today are under-staffed, over-worked, under-funded and struggling to stay abreast of the ever-changing threat landscape with machine automation. Many security analysts work long hours poring over millions of security events to protect systems and fix vulnerabilities. Simply put, there is too much information and not enough analysts. Fortunately, humans are not the only answer for solving the cyber security crisis. Security Magazine reports. Continue reading original article

The Military & Aerospace Electronics take:

30 May 2019 -- The process of automation to move security from human to machine speed is the next frontier in cyber security. “Skills shortages, technical complexity and the threat landscape will continue to drive the move to automation and outsourcing,” marketing research firm Gartner says.

Humans are limited in their ability to process vast amounts of information with reasonable response times. This is where trusted computing security solutions that use Machine Learning (ML), Artificial Intelligence (AI) and automation can help as they can handle millions of events in a single day.

Leading the cyber security threats list is the “too much data” problem. The average security team manages more than 50 security-specific tools that generate overwhelming log and event data. They need to be able to sift through all that noise and focus on events that pose the greatest risk to their company.

Related: Military researchers eye built-in trusted computing and cyber security for complex digital chips

Related: Tridium and 3eTI announce strategic alliance, advance cyber security

Related: DARPA ConSec program seeks to reduce opportunities for cyber attack while maintaining trusted computing

John Keller, chief editor
Military & Aerospace Electronics

More in Trusted Computing