"Every year, malware becomes easier to manage, and the programs themselves become more sophisticated. Over time, the systems will become so easy to use that even a child will be able to use them. And, unfortunately, this will mean that malware has made friends with machine learning. Maybe it will take a year, maybe a little longer, in any case, there is not much time left to wait," the expert shares his predictions. Malware armed with AI can create new problems for cybersecurity, but it is also possible that they can be prevented by using high-quality security methods.
Schemes: patching software and systems as soon as possible. In special cases, developer companies warn that this or that update has the highest priority, but, in principle, experienced administrators test almost all security updates, thereby minimizing the possibility of viruses penetrating the enterprise perimeter. But many egypt mobile database are irresponsible about installing security patches, leaving hackers an open door for attacks that could have been easily prevented. “Hackers are always looking for easy ways, and if you have closed all known vulnerabilities, the chances that they will get to you are significantly reduced,” says Vishnevsky.
ICC 2019 on Current Aspects of Corporate Cybersecurity
Valery Vasiliev | 06/25/2019
Participants of the second International Cybersecurity Congress (ICC 2019), held in Moscow in June, discussed the most important issues of ensuring corporate cybersecurity in modern conditions.
Cyberthreat landscape. Sergey Plugotarenko (RAEK) spoke about the most relevant factors influencing corporate cybersecurity. He noted that the attribution of cyberattacks has become extremely complex; criminals successfully "sharpen" attacks for specific purposes, turning them into targeted ones and actively using Internet of Things (IoT) devices, artificial intelligence, mobile devices, as well as market models typical for organizing legitimate businesses (for example, offering cyberattacks as a service).
Regulation. Experts include pressure from regulators among the key drivers of strengthening corporate information security. At the same time, there are many complaints about the activities of regulators around the world from information security experts, developers of digital products and their consumers.
The latter include traditional protection
-
- Posts: 816
- Joined: Sun Dec 22, 2024 7:16 am