{"id":624,"date":"2020-06-09T21:35:16","date_gmt":"2020-06-09T16:05:16","guid":{"rendered":"https:\/\/aimonks.com\/aibytes\/?p=624"},"modified":"2020-06-09T21:35:18","modified_gmt":"2020-06-09T16:05:18","slug":"infosys-leverages-ai-ml-to-combat-cyber-threats","status":"publish","type":"post","link":"https:\/\/aimonks.com\/aibytes\/2020\/06\/09\/infosys-leverages-ai-ml-to-combat-cyber-threats\/","title":{"rendered":"Infosys Leverages AI ML To Combat Cyber Threats"},"content":{"rendered":"<span class=\"rt-reading-time\" style=\"display: block;\"><span class=\"rt-label rt-prefix\">Reading Time: <\/span> <span class=\"rt-time\">2<\/span> <span class=\"rt-label rt-postfix\">minutes<\/span><\/span>\n<p>COVID-19 pandemic necessitated a shift towards remote working. <strong>Cyber criminals<\/strong> have been using this opportunity to a full extent, hence highlighting loopholes in the cyber protocol. Vishal Salvi, Chief Information Security Officer &amp; Head Cyber Security Practice, Infosys explains how <strong>Infosys is leveraging technologies such as AI, ML, and security analytics to combat such cyber threats.<\/strong><\/p>\n\n\n\n<p>AI and ML are better equipped to tackle new attacks as hackers usually build on older attacks or slightly altered them to make new ones. AI\/ML leverage information related to past attacks to <strong>spot the emergence of potential risks<\/strong>. ML saves security analysts time by analyzing a large pool of data and<strong> spotting vulnerabilities<\/strong> without needing manual checks.<\/p>\n\n\n\n<p><strong>AI is a double-edged sword <\/strong>as it could develop self-learning automated malware and amplify cyber attacks itself.<\/p>\n\n\n\n<p>Today, 93% of Infosys employees securely work from their homes. <strong>Measures were taken by Infosys to curb cyber attacks:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Secure connectivity models for WFH, VPN with multifactor authentication, and revised security policies accordingly.<\/li><li>Segregated network for VPN clients to allow easy and secure access.<\/li><li>Connectivity endpoints with updated antivirus, anti-advanced persistent threat, security patches, data loss prevention agents.<\/li><li>Hardened security for VDI infrastructure<\/li><li>Secured configuration and heightened auditing of cloud services<\/li><li>Amendment of ruled if behavioral analytics and security operation centers<\/li><li>24&#215;7 open communication channel and created a robust security incident management plan<\/li><\/ul>\n\n\n\n<p>Cyber attacks can&#8217;t be eliminated but can be minimized, and organizations can be more resilient to these attacks with the right security approach. AI and ML are the <strong>new age security solutions<\/strong> that ensure a proactive security position for the organization.<\/p>\n\n\n\n<p>#AIMonks #AI #ML #ArtificialIntelligence #Infosys #Malware #Cybersecurity #CyberThreats<\/p>\n","protected":false},"excerpt":{"rendered":"<p><span class=\"rt-reading-time\" style=\"display: block;\"><span class=\"rt-label rt-prefix\">Reading Time: <\/span> <span class=\"rt-time\">2<\/span> <span class=\"rt-label rt-postfix\">minutes<\/span><\/span> COVID-19 pandemic necessitated a shift towards remote working. Cyber criminals have been using this opportunity to a full extent, hence highlighting loopholes in the cyber protocol. Vishal Salvi, Chief Information Security Officer &amp; Head Cyber Security Practice, Infosys explains how Infosys is leveraging technologies such as AI, ML, and security [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":626,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34],"tags":[35,24,608,305,606,607,33],"class_list":["post-624","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ethics-and-compliance","tag-ai","tag-ai-monks","tag-cyber-threats","tag-cybersecurity","tag-infosys","tag-malware","tag-ml"],"rttpg_featured_image_url":{"full":["https:\/\/aimonks.com\/aibytes\/wp-content\/uploads\/2020\/06\/computer-1294045_640.jpg",448,448,false],"landscape":["https:\/\/aimonks.com\/aibytes\/wp-content\/uploads\/2020\/06\/computer-1294045_640.jpg",448,448,false],"portraits":["https:\/\/aimonks.com\/aibytes\/wp-content\/uploads\/2020\/06\/computer-1294045_640.jpg",448,448,false],"thumbnail":["https:\/\/aimonks.com\/aibytes\/wp-content\/uploads\/2020\/06\/computer-1294045_640-150x150.jpg",150,150,true],"medium":["https:\/\/aimonks.com\/aibytes\/wp-content\/uploads\/2020\/06\/computer-1294045_640-300x300.jpg",300,300,true],"large":["https:\/\/aimonks.com\/aibytes\/wp-content\/uploads\/2020\/06\/computer-1294045_640.jpg",448,448,false],"1536x1536":["https:\/\/aimonks.com\/aibytes\/wp-content\/uploads\/2020\/06\/computer-1294045_640.jpg",448,448,false],"2048x2048":["https:\/\/aimonks.com\/aibytes\/wp-content\/uploads\/2020\/06\/computer-1294045_640.jpg",448,448,false],"hestia-blog":["https:\/\/aimonks.com\/aibytes\/wp-content\/uploads\/2020\/06\/computer-1294045_640-360x240.jpg",360,240,true]},"rttpg_author":{"display_name":"AI Bytes","author_link":"https:\/\/aimonks.com\/aibytes\/author\/aibytes_kashika\/"},"rttpg_comment":0,"rttpg_category":"<a href=\"https:\/\/aimonks.com\/aibytes\/category\/daily-bytes\/ethics-and-compliance\/\" rel=\"category tag\">Ethics and Compliance<\/a>","rttpg_excerpt":"Reading Time: 2 minutes COVID-19 pandemic necessitated a shift towards remote working. Cyber criminals have been using this opportunity to a full extent, hence highlighting loopholes in the cyber protocol. Vishal Salvi, Chief Information Security Officer &amp; Head Cyber Security Practice, Infosys explains how Infosys is leveraging technologies such as AI, ML, and security [&hellip;]","_links":{"self":[{"href":"https:\/\/aimonks.com\/aibytes\/wp-json\/wp\/v2\/posts\/624","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/aimonks.com\/aibytes\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/aimonks.com\/aibytes\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/aimonks.com\/aibytes\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/aimonks.com\/aibytes\/wp-json\/wp\/v2\/comments?post=624"}],"version-history":[{"count":1,"href":"https:\/\/aimonks.com\/aibytes\/wp-json\/wp\/v2\/posts\/624\/revisions"}],"predecessor-version":[{"id":627,"href":"https:\/\/aimonks.com\/aibytes\/wp-json\/wp\/v2\/posts\/624\/revisions\/627"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/aimonks.com\/aibytes\/wp-json\/wp\/v2\/media\/626"}],"wp:attachment":[{"href":"https:\/\/aimonks.com\/aibytes\/wp-json\/wp\/v2\/media?parent=624"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/aimonks.com\/aibytes\/wp-json\/wp\/v2\/categories?post=624"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/aimonks.com\/aibytes\/wp-json\/wp\/v2\/tags?post=624"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}