Home  >  Article  >  Technology peripherals  >  How generative AI is changing the game for cloud security

How generative AI is changing the game for cloud security

王林
王林forward
2023-07-12 21:13:501365browse

Cloud security and artificial intelligence have a long-term cooperative relationship. Over the past decade, artificial intelligence has been widely used to identify cloud security threats and prioritize their risks, thanks to its pattern recognition and anomaly detection capabilities.

How generative AI is changing the game for cloud security

#However, a lot has changed in the past 10 years. Cloud applications are increasingly being migrated by more people and organizations, and threat actors are starting to view them as prime targets.

Cloud security is more important than ever to an organization’s cybersecurity maturity, and the integration of artificial intelligence with cloud security tools is an important defense against expanding cloud-based threats. layer. Now, according to Google, one of the biggest game-changers for cloud security is generative artificial intelligence.

Sunil Potti, vice president and general manager of Google Cloud Security, said in a blog post at the Google Cloud Security Summit in June: "Generating Modern AI has the potential to reduce the repetitive tasks that plague security teams, such as aggregating and enriching data from multiple sources to more fully understand risks and identify priorities."

Google itself of cloud security efforts include an AI workbench where AI will be used to address and prevent emerging threats, eliminate threat fatigue caused by alert overload, and close talent gaps.

Based on the role of artificial intelligence in cloud security

Traditionally, artificial intelligence has been used to detect and remediate in seconds Hundreds of threats.

Generative AI takes artificial intelligence to a whole new level by focusing on creating new data rather than just analyzing existing data. "[Generative AI] enables the development of realistic synthetic data that can be used to train and test security models without exposing sensitive information," Bob Janssen, vice president of engineering and head of innovation at Delinea, told TechRepublic.

Janssen said generative artificial intelligence has changed the way organizations approach cloud security issues. He added: "It enhances overall security measures by providing realistic synthetic data for testing, simulating complex attack scenarios and minimizing the risk of exposing sensitive information during development."

How does generative artificial intelligence affect cloud security

There is one difference between generative artificial intelligence and the artificial intelligence model currently used in cloud security, and that is generative artificial intelligence Ability to summarize, classify and generate information. With proper training, it can reason on specialized data and provide natural language conversational interactions, facilitating workflow faster than the flat interfaces found in typical security tools.

“These characteristics, applied to cloud security, enable customers to identify and prioritize the most relevant risks in their unique environment or regulatory requirements; quickly generate queries and detect the continuous monitoring threats required ," Potti said. Through natural language interaction and assisted experiences with users, generative AI can guide customers to achieve their desired goals.

At Google, for example, cloud security is being “supercharged” by generative AI so customers can search petabytes of event data using natural language instead of writing custom queries. Another feature provides an easy-to-read explanation of potential attack paths and remediation steps.

#So, AI is still in its early stages, but we are leveraging these superpowers to achieve security outcomes such as early vulnerability detection or on-the-fly triage of potential malware,” Potti said.

The above is the detailed content of How generative AI is changing the game for cloud security. For more information, please follow other related articles on the PHP Chinese website!

Statement:
This article is reproduced at:51cto.com. If there is any infringement, please contact admin@php.cn delete