![]() “AI bots and deepfakes will challenge the very definition of fair and open elections, one of the pillars of any democracy. The methods and sophistication at which false information can be spread is continuing to grow, and voters will need to remain wary of where and how they get information”-Stephen Ritter, CTO, Mitek That risk is further amplified by how quickly video content is spread on social media networks, and it typically takes some time for companies to remove deepfake content from their platforms. This technology will be used to generate false videos of political candidates being made to say or do almost anything, and these videos can be produced in near real-time. “Deepfakes will take center-stage in the 2020 election as real identity becomes harder to verify. Next year, we will see which governments will allow this level of technology within municipalities and discuss the cyber vulnerabilities associated with this type of use case”-Chris Downie, CEO, Flexential ![]() “As we see more instances of AI in 2020 and a continued development of facial recognition technologies, we will begin to see government entities declaring privacy regulations on what data businesses can and cannot use. Torsten George, Cybersecurity Evangelist, Centrify We’ll also see bad actors accessing the data streams of organizations and using the data to further orchestrate more complex attacks”-Dr. Threat actors, many of which will be state-sponsored, will increase their use and sophistication of AI algorithms to analyze organizations’ defense mechanisms and tailor attacks to specific weak areas. “Threat actors will increase the use of AI to analyze defense mechanisms and simulate behavioral patterns, bypassing security controls and leveraging analytics and machine learning to hack into organizations. In 2020, the hardest to detect operations will be the ones that are doing the best job of learning from AI”-Michael Tiffany, Co-Founder and President, White Ops Cybercriminals can develop an information advantage because they don’t care or comply with privacy regulations. This brings up a whole new form of vulnerability, because if it’s suddenly mis-trained, there is no way to test it. We observe the way it works, but we don’t fully understand why. “AI-driven decision making isn’t going anywhere. ![]() Organizations must prioritize education around data sharing, and teach their employees how data can be used to enhance safety and optimize the balance between machine learning and humans in 2020” -Imad Mouline, CTO, Everbridge The physical and cyber security markets are seeing more and more use cases for AI-based threat intelligence and security solutions that become more intelligent with more access to data. ![]() “While privacy rights related to personal data have been top of mind recently, there is one area where consumers are becoming more lenient with sharing their data-their safety. These new defense techniques will be crucial, as it’s likely that cybercriminals will begin executing ‘wetware’ attacks by combining automated content generation and manual human effort to personalize attacks against targets, and evade the current generation of defenses”-Joe Levy, CTO, Sophos “Over the coming years, the rate at which the cybersecurity industry experiments with and adopts new techniques from the scientific machine learning community will continue to increase, allowing systems to make semi- or even fully-autonomous decisions in defending information systems and their users. “Ransomware will continue to both dominate headlines and cause havoc in 2020. The complexity of the attacks and the packaging of Ransomware-as-a-Service will continue to increase, while organizations grapple with both prevention and implementing practices to respond appropriately. Responses by organizations will be split between those who recover from backups, and those with more limited options who opt to pay the ransom”-Danny Allan, Vice President of Product Strategy, Veeam ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |