KEEPNET LABS > Blog > Black Hat Fireside Chat: Deploying ‘AI’ as a weapon to win the ‘attack surface management’ war

Black Hat Fireside Chat: Deploying ‘AI’ as a weapon to win the ‘attack surface management’ war

An advanced weapon is emerging that uses data analysis to hone systems and suppress attacks. Darktrace’s artificial intelligence solutions can help companies restrict access to APIs, neutralize shady IT, protect supply chains and even improve the efficiency of DEVSECOPYRIGHTs.

Black Hat Fireside Chat: Deploying ‘AI’ as a weapon to win the ‘attack surface management’ war

Disabled cybersecurity teams are facing a big problem. “ASM” highly complex, highly dynamic work environment in a new cyber security center, a ruthless enemy should take a large number of actively limiting the damage vulnerability: criminal hacker groups. In short, the control of the attack surface has become the most important pillar of cybersecurity. A robust and comprehensive combat plan in the form of the NIST Cybersecurity System has been carefully developed. And now, an advanced weapon is emerging that uses data analysis to hone systems and suppress attacks.

Guest expert: Justin tactical and vice president in charge of responding to the risk of Fire, this development in the heart of Darktrace businesses to “think like an attacker” is designed to help security systems provider, Darktrace says vice president in charge of responding to tactical and Justin is taking place Darktrace risk of Fire, Black Hat debate, I had the opportunity to visit 2022. We discussed how legacy local cybersecurity systems generate large amounts of telemetry data, which is ideal for large-scale automated data analysis.

That is why it makes a lot of sense that artificial intelligence is often applied when managing attack surfaces. For example, Darktrace’s artificial intelligence solutions can help companies restrict access to APIs, neutralize shady IT, protect supply chains and even improve the efficiency of DEVSECOPS, Fier said. Listen to the accompanying podcast to fully understand our conversation.

Join
Our Newsletter

Sign up to learn about the latest threats, hacking methods, and news.