Oleg Orlov, BlackBerry Regional Director, was the guest in the Skaner CyberDefence24 series. In his interview, talking to Jacek Raubo, Ph.D., Orlov outlined the use of AI in acting against cyber-threats, and also discussed the perception of AI in the context of heightening the levels of cyberspace security.
“The major driver for AI, as a principal concept to combat threats is based on the fact that the human is not catching up with the level of threats, and their sophistication If you look at the statistical data, there is probably about 300,000+ of malware samples, new malware samples, created daily. The security operation centers are overloaded with the alarms. You just go to the newswire and you hear about the successful cyber-attacks. Whether they are geopolitically motivated, or ransomware motivated, it's just every day's news”, Orlov said.
AI and Humans
Orlov says that cyber-criminals remain successful, as humans alone cannot keep up. “That's the reason for the AI approach and that's the strategy that Blackberry is introducing, or implementing it's in its solutions. AI is capable to recognize the new pieces of malware that never have been seen before, new hacking techniques, even though there was no particular evidence of that before”, Orlov said.
The BlackBerry representative also discussed the products offered by his company in the cyberspace security domain. BlackBerry Protect/Cylance Protect is defined as a local agent that is installed on the endpoint device or server, replacing anti-virus software. It remains capable of recognizing threats that it has never detected before. Orlov also mentioned the Zero Trust Network Access - another AI-based product.
Asked whether the cyber-security tools guarantee 100% protection of end devices, he said that “Nothing is perfect and in the cyber defense nothing is perfect, and there are so many other ways that the hackers can attack the infrastructure, not necessarily the endpoint. We have the endpoint product, this is not a product that monitors, for example, network activity, which is another uh uh area of concern for any security operations”.
We encourage you to watch the whole interview!