MIT Technology Review: Preparing for AI-enabled Cyberattacks

Download Now

To download this white paper you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

Today’s new wave of attacks is outsmarting and outpacing humans, and even starting to incorporate artificial intelligence (AI).

What’s known as “offensive AI” will enable cybercriminals to direct targeted attacks at unprecedented speed and scale while flying under the radar of traditional, rule-based detection tools. Some of the world’s largest and most trusted organizations have already fallen victim to damaging cyberattacks, undermining their ability to safeguard critical data.

With offensive AI on the horizon, organizations need to adopt new defenses to fight back: the battle of algorithms has begun.

Learning outcomes:

  • Learn what types of cyberattack business leaders are most concerned about.
  • Explore the challenges faced by business of responding to AI-enabled cyberattacks, and why human teams are simply not well-equipped enough to defend against them.
  • Discover the ways security leaders predict AI will be used against companies in the future, including increasingly advanced ransomware, impersonation, and supply chain attacks.
  • Understand why defensive AI is the only solution capable of responding to sophisticated attacks.

Brought to you by

Should you download this content your information may be shared with the sponsors indicated above. Please see the privacy policy for Darktrace here: https://www.darktrace.com/en/legal/. Please see Infosecurity Magazine’s privacy policy for more information.