Intelligent CIO APAC Issue 52 | Page 55

FEATURE : CYBERSECURITY enhanced by AI , the protection offered by MFA can adjust authentication requirements or outright block a user ’ s access based on perceived risk levels such as changes in a user ’ s typing speed or if a user ’ s access strays beyond normal boundaries .
3 . AI-enabled activity and behaviour tracking and systems monitoring :
Through continuous analysis of activity logs , AI and ML can establish norms for both user and application behaviour . Against those established norms , both technologies can provide near realtime monitoring and identify suspicious activity such as failed login attempts , excessive file access , or other activities that indicate anomalous activity .
4 . AI-enabled ransomware detection : AI and ML can comb through vast amounts of data , analysing network traffic or file access , allowing organisations to spot the signs of an imminent attack – or even one in progress – and neutralise malware .
the transformative power of AI and ML technology to protect , detect and respond to ever-evolving cyber threats . AI & ML powered data security and management platforms offer a step-change in ransomware defence by providing these capabilities and should be a focus for organisations seeking to strengthen their data security and cybersecurity posture to a level that today ’ s worsening cyber landscape demands . p

TO NULLIFY THE LATEST CYBERATTACK

TECHNIQUES BUSINESSES SIMILARLY NEED

TO HARNESS THE POWER OF AI AND ML .

5 . AI-enabled backup data management : AI and ML optimise backup schedules based on critical data needs , usage patterns and seasonality . This includes identifying and retiring inactive data during the backup process . By discerning dormant data suitable for archiving , AI reduces recovery time , eliminates the unnecessary retrieval of unused information and concurrently enhances efficiency while reducing storage costs .
As malicious actors leverage AI and ML to step up the sophistication and relentlessness of their attacks , organisations must leverage the latest data security , protection and recovery capabilities that harness
Brett Chase , Director of Systems Engineering , Cohesity APJ
www . intelligentcio . com INTELLIGENTCIO APAC 55