FIVE MINUTES WITH ...
“ Tools that used to be reserved for nation-states , are now available in tool kits that anyone can use ”
way back to Windows XP days . We ' re in those days for the cloud , because we ' re just discovering how people will use the cloud to attack itself .”
Another issue , Kennedy explains , is the increasing accessibility of certain tools that used to be reserved for nation states .
“ If you think about that threat landscape , tools that used to be reserved for nation-states are now available in tool kits that anyone can use . They ' re automated . On the AI front , I ’ ve seen some interesting things about ChatGPT , and people asking questions about how to hack . Anyone can have access to it . That ' s what defenders are up against .”
As Kennedy describes , solving problems with legacy tech signatures will still have a role to play , but utilising AI is key . “ You ' re never going to solve the problem though , because we ' re just burning out defenders . AI is the only way to get a good signal , both in individual attack surfaces and then pulling the narrative together .
“ It ’ s one of our guiding principles that you ' ve got to use AI . But it ' s just a tool , especially in applied AI , and it ' s all about how you use it . The methodology for using it is what defines success versus failure from the customer outcome standpoint . So that ' s been our focus : it ' s not just AI , but how you use AI in the right ways to solve the problem .”
Pushing the envelope of data science techniques When it comes to detecting threats with AI there are a couple of philosophies , Kennedy explains .
“ We ' ve definitely placed our bet , and we believe it gives better outcomes ,”
18 June 2022