Apac
  • Home
  • CXO Insights
  • CIO Speaks
  • Partner Conferences
  • Newsletter
  • Subscribe
  • News
  • About us
Apac
  • Agile

    Artificial Intelligence

    Augmented Reality

    Big Data

    Blockchain

    Cloud

    Cyber Security

    DevOps

    Digital Technology

    Enterprise Security

    HPC

    Internet of Things

    IT Services

    Mobility

    Networking

    Open Source

    POS

    QA and Testing

    Robotics

    SaaS Solutions

    Security

    Simulation

    Smart City

    Startup

    Storage

    Unified Communication

    Virtualization

    Web Development

    Wireless

  • Automotive

    Aviation and Aerospace

    Banking

    Compliance

    Construction

    Contact Center

    E-Commerce

    Education

    Energy

    Engineering

    Field Service

    FinTech

    Gov and Public

    Healthcare

    Insurance

    Legal

    Logistics

    Manufacturing

    Media and Entertainment

    Metals and Mining

    Pharma and Life Science

    Retail

    Sports

    Telecom

    Travel and Hospitality

    Utilities

  • Amazon

    CISCO

    Dynamics 365

    Google

    HP

    IBM

    Intel

    Microsoft

    Microsoft Azure

    Oracle

    Red Hat

    Salesforce

    SAP

    Share Point

    VMware

  • Business Intelligence

    Business Process Management

    CEM

    Cognitive

    Collaboration

    Corporate Finance

    CRM

    Data Center

    Disaster Recovery

    Document Management Systems

    Enterprise Architecture

    Enterprise Asset Management

    Enterprise Performance Management

    ERP

    Fleet Management

    Gamification

    Geographical Information System

    HR Technology

    IT Service Management

    Managed Services

    Payments

    PLM

    Procurement

    Project Management

    Risk Management

    Sales and Marketing

    Workflow

Menu
    • Amazon
    • Banking
    • Blockchain
    • CISCO
    • Cognitive
    • Compliance
    • Contact Center
    • Cyber Security
    • DevOps
    • E-Commerce
    • Field Service
    • Gov and Public
    • Healthcare
    • HR Technology
    • IoT
    • Managed Services
    • Manufacturing
    • Metals and Mining
    • Microsoft
    • Oracle
    • Pharma and Life Science
    • Retail
    More
    DevOps E-Commerce Field Service Gov and Public Healthcare HR Technology IoT Managed Services Manufacturing Metals and Mining Microsoft Oracle Pharma and Life Science Retail
    ×

    Subscribe to our Newsletter

    news
    news

    Join our mailing list for the latest articles, news, and exclusive insights from prominent technology leaders

    loading
    SUBSCRIBE

    Thank You for subscribing with us. We sent you an email regarding this.

    news

    • Home
    • News
    • Cyber Security
    Editor's Pick (1 - 4 of 8)
    left
    Leadership Framework for Building Elite Teams

    Douglas Duncan, CIO, Columbia Insurance Group

    Four Cybersecurity Weak Spots You Should Care About When Others Don't

    Marc Probst, CIO & VP, Intermountain Healthcare

    Secure Text Messaging in an Academic Medical Center - Experience and Lessons

    Kari Cassel, SVP & CIO, UF Health

    It's Time to Turn Security Inside Out

    Gilad Raz, CIO, Varonis

    Top 3 Challenges Growing Businesses Face and How the Cloud Can Help

    Ken Shulman, CIO & CTO, Broadview Networks

    Cloud Security Grows Up

    Kevin Winter, VP & CIO, Booz Allen Hamilton

    Neil Jarvis, CIO, Fujitsu America, Inc

    Moving towards an Intelligent, networked and boundary less world

    Rajeev Batra, CIO, MTS India

    right

    The Fight Is Machine versus Machine, and AI Can Be an Enabler

    By Apac Ciooutlook | Monday, December 03, 2018
    Tweet

    Today, end users are major drivers for transforming the way IT works—from computing to cybersecurity. The point to be noted here is that the change has provided a large surface for the hackers to break into the personal and professional systems. To continue being in the modern, hyperconnected world without the fear of the malicious actors, organizations should take a new approach to secure the endpoints by bringing in the benefits of artificial intelligence (AI) and machine learning.

    Most of the hackers are utilizing machine as weapons to attacks business while organizations still rely on some form of human touch to secure themselves. Although the human element has a major role to play here, it’s time that deals with security in terms of machine versus machine. Security leaders can leverage AI as an augmented intelligence, where machines are working with humans. Machine learning can be the key to shield data in today’s IT world by handling the complicated algorithms necessary to protect data. While AI will protect the data and prevent the intrusions by other machines, security officers can be the second line of defense to verify situations and plan actions to defend.

    Another viewpoint to look at security from machine versus machine perspective is that a tremendous amount of data resides within countless endpoints being used today. Organizations struggle to protect devices, which are owned by the employee and connected to the enterprise networks. Machine learning can empower security team to protect these endpoints

    Read Also

    Preparing for the Security Threats of the Future

    Preparing for the Security Threats of the Future

    Cyberthreats: The Wakeup Calls for the Enterprises

    Cyberthreats: The Wakeup Calls for the Enterprises

    How to Avoid Cybersecurity Risks in 2019

    How to Avoid Cybersecurity Risks in 2019

    What Cybersecurity Measures Should Marketers Adopt in 2019

    What Cybersecurity Measures Should Marketers Adopt in 2019

    Featured Vendors

    SalesFix

    Jason Lawrence, CEO

    Bentley Systems

    Greg Bentley , CEO

    New Editions

    Copyright © 2019 APAC CIOoutlook. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy Policy  |  Sitemap

    follow on linkedinfollow on twitter follow on rss
    This content is copyright protected

    However, if you would like to share the information in this article, you may use the link below:

    https://www.apacciooutlook.com/news/the-fight-is-machine-versus-machine-and-ai-can-be-an-enabler-nwid-5415.html