A Single Partner for Everything You Need Optiv works with more than 450 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
AI & Cybersecurity: Context is King Breadcrumb Home Insights Blog AI & Cybersecurity: Context is King June 17, 2020 AI & Cybersecurity: Context is King In today’s guest post Evans Mehew, founder of FastFulcrum, explains that AI is currently in the “Narrow Intelligence” phase, and it has tremendous importance for defending shifting, expanding attack surfaces. “You keep using that word. I do not think it means what you think it means.” – Inigo Montoya, from The Princess Bride Artificial Intelligence. It’s the flavor of the month. Hands down, Artificial Intelligence (AI) is one of the sexiest terms floating around in both technical industries and popular culture today. We see it in myriad contexts, from ads touting AI-enhanced diapers to the biggest and flashiest science fiction movies. But what does ”Artificial Intelligence” actually mean? There are many different definitions of AI in the wild – some fuzzy and others highly nuanced. For utility’s sake, I prefer Wait But Why creator Tim Urban’s explanation. Per Urban, AI can be defined using three categories (or “calibers”). AI Caliber 1) Artificial Narrow Intelligence (ANI): Sometimes referred to as Weak AI, Artificial Narrow Intelligence specializes in one area. There’s AI that can beat the world chess champion in chess, but that’s the only thing it does. Ask it to figure out a better way to store data on a hard drive, and it’ll look at you blankly. AI Caliber 2) Artificial General Intelligence (AGI): Sometimes referred to as Strong AI, or Human-Level AI, Artificial General Intelligence refers to a computer that is as smart as a human across the board — a machine that can perform any intellectual task a human being can. Creating AGI is a much harder task than creating ANI, and we’ve yet to do it. Professor Linda Gottfredson describes intelligence as “a very general mental capability that, among other things, involves the ability to reason, plan, solve problems, think abstractly, comprehend complex ideas, learn quickly, and learn from experience.” AGI would be able to do all of those things as easily as you can. AI Caliber 3) Artificial Superintelligence (ASI): Oxford philosopher and leading AI thinker Nick Bostrom defines superintelligence as “an intellect that is much smarter than the best human brains in practically every field, including scientific creativity, general wisdom and social skills.” Artificial Superintelligence ranges from a computer that’s just a little smarter than a human to one that’s trillions of times smarter – across the board. Say what you will about cash, it’s context that’s king. Within the context of cybersecurity, all AI is currently Artificial Narrow Intelligence. AIs deployed by cybersecurity experts and threat actors alike are used for specific purposes. All tools in a toolbox have a specific purpose and are used to achieve that purpose in accordance with the technology’s design. In this context, the broad-spectrum, general utility of duct tape is rare. Does this mean we shouldn’t remain mindful of AGI, ASI and the potential issues they’ll pose when they emerge? No. Keep your ears on … things change fast in this space. For now – as far as we know – AGI and ASI have not yet been achieved, but their capability (think SkyNet) is what many people imagine when they hear “Artificial Intelligence.” Cybersecurity is a single arena and context in which we deploy (or will soon) ANI solutions, but we must remember that said arena is beyond colossal. Cracking open the Matryoshka doll of cybersecurity terrain, we have to keep in mind a number of players and layers, including: Nation states Non-governmental actors Corporations Individuals These entities use assorted technologies to various degrees to achieve a multitude of ends, and they all interconnect to form a global economy. The Fourth Industrial Revolution (as defined by Klaus Schwab of the World Economic Forum) will drive global economic gains via further development / interconnection of: AI / robotics Internet of Things Autonomous vehicles 3-D printing Nanotechnology Biotechnology Materials science Energy storage Quantum computing COVID-19 is providing an unexpected accelerant to adoption of automation and other technologies as companies strive to dampen risk vectors and increase efficiencies. All these factors fold together to comprise a highly complex and ever-shifting attack surface. As cybersecurity is intended to defend attack surfaces, the best and proper tools have to be applied to achieve that end. Those tools include Artificial Intelligence. At this point, we’re back to the old “lock & key” dance – a locksmith crafts a best-of-breed lock and the criminal classes meet that technology in kind with a more effective lockpick and accompanying skill set. The locksmith then sets to work on an even stronger lock ... and so on. Defense and offense drive mutual evolution. As AI will be used by both white hat and black hat players, we should pause and consider the intricate complexity and interconnected nature of the aforementioned technologies and domains that will serve as their battleground. That said, deploying benevolent AI to thwart the threat of malignant AI within critical infrastructures is an engraved invitation to the world of unintended consequences. Disruptions from such conflicts could possibly affect: National security Economic stability Mission-critical systems Utilities Telecommunications It may be prudent to approach AI cybersecurity solutions and scenarios by working backward with a weather eye on context – consider probable collateral and peripheral impacts, then craft the appropriate solution and strategy. By: Evans Mehew Director of Content Strategy | Optiv Evans Mehew is the Director of Content Strategy for Optiv. Evans has over 25 years’ experience in information technology, information security, competitive intelligence and global business in industries including finance, healthcare, travel, telecommunications and software development. Evans is an inventor with six granted patents to date (with an additional three pending). Additionally, he served as an adjunct professor in graduate and undergraduate programs for over 16 years, teaching 40 unique classes over that time across a variety of disciplines including security, leadership, technology management and science. Share: Threat Artificial Intelligence Copyright © 2024 Optiv Security Inc. All rights reserved. No license, express or implied, to any intellectual property or other content is granted or intended hereby. This blog is provided to you for information purposes only. While the information contained in this site has been obtained from sources believed to be reliable, Optiv disclaims all warranties as to the accuracy, completeness or adequacy of such information. Links to third party sites are provided for your convenience and do not constitute an endorsement by Optiv. These sites may not have the same privacy, security or accessibility standards. Complaints / questions should be directed to Legal@optiv.com
Copyright © 2024 Optiv Security Inc. All rights reserved. No license, express or implied, to any intellectual property or other content is granted or intended hereby. This blog is provided to you for information purposes only. While the information contained in this site has been obtained from sources believed to be reliable, Optiv disclaims all warranties as to the accuracy, completeness or adequacy of such information. Links to third party sites are provided for your convenience and do not constitute an endorsement by Optiv. These sites may not have the same privacy, security or accessibility standards. Complaints / questions should be directed to Legal@optiv.com
Would you like to speak to an advisor? How can we help you today? Image E-Book Cybersecurity Field Guide #13: A Practical Approach to Securing Your Cloud Transformation Download Now Image Events Register for an Upcoming OptivCon Learn More Ready to speak to an Optiv expert to discuss your security needs?