Deep learning: administer the vaccine before the infection takes hold

Staying at the bleeding edge of innovation is the only way to outpace attackers. However, most organizations are settling for a mitigation approach to cybersecurity which only engages once the adversaries have breached the perimeter. Attacks then need to run before they’re picked up and checked to see if they’re malicious, sometimes taking as long as 60 seconds. When dealing with an unknown threat, 60 seconds is too long to wait for analysis. A prevention approach is far more effective, explains Brooks Wallace, VP EMEA at Deep Instinct, as it operates on the basis that the attackers are not permitted to come within arm’s length of the network perimeter. And at the centre of this approach is deep learning. 
Staying at the bleeding edge of innovation is the only way to outpace attackers. However, most organizations are settling for a mitigation approach to cybersecurity which only engages once the adversaries have breached the perimeter. Attacks then need to run before they’re picked up and checked to see if they’re malicious, sometimes taking as long as 60 seconds. When dealing with an unknown threat, 60 seconds is too long to wait for analysis. A prevention approach is far more effective, explains Brooks Wallace, VP EMEA at Deep Instinct, as it operates on the basis that the attackers are not permitted to come within arm’s length of the network perimeter. And at the centre of this approach is deep learning. 

Cybersecurity teams are under more pressure now than ever before. The recovery period after an attack can be a long and painful experience for any business, so teams are naturally looking to increase their efforts to limit the damage caused. 

Mitigation has been the name of the game for the past few decades, but organizations realize that the real goal is to stop criminals before they reach the perimeter. Mitigating the impact of a breach is a critical part of long-term security strategies, as there is now a global recognition across the security industry that a cyberattack is a matter of ‘when’ not ‘if’. However, security teams have become overloaded with responsibilities tied to various solutions across the network, to the point that mitigation activity can become counterproductive. 

To make matters worse, the market is full of technologies labelled as the next best thing in terms of prevention. With buzzwords like artificial intelligence (AI) and machine learning (ML) being flippantly used for most new solutions, it’s hard to tell which products will provide the required level of prevention to stand against the onslaught of cyberattacks.  

Businesses have outgrown past defences   

The cyber landscape has changed at such a fast pace that most technologies implemented a decade ago will no longer be up to the job. Priorities over the years have shifted multiple times depending on the latest attack vectors. Many businesses jumped aboard the endpoint detection and response (EDR) train in an attempt to protect themselves from the next breach. But attacks were evolving at such a rapid pace that it was impossible to keep up – especially as at that point, they were already on the backfoot. 

Swapping out old technology for the latest developments is the ideal scenario. However, due to budget limitations, this isn’t always an option. Larger companies with deeper pockets can deploy a mature security stack with multiple layers of defence and can therefore be more proactive in their approach to security. Smaller organizations, however, are often forced to take a reactive approach, which is where the trouble begins. 

Ideally, businesses need one encompassing solution to add to the security stack that blocks criminal advances before reaching the network perimeter. And luckily, this technology already exists.

The transition from machine learning to deep learning 

There has been hype around machine learning over the past few years. It has been instrumental in developing new and exciting technologies that have played an important role in cyber evolution. However, machine learning still has drawbacks that can work against business priorities. As well as requiring teams to regularly input pre-classified datasets to keep the process up-to-date, machine learning has also featured in criminal campaigns, where adversaries use a business’ own machine learning solutions against them. These pre-classified datasets are vulnerable to compromise, and teams could end up inadvertently submitting tampered information into the machine learning system, meaning the programme starts recognizing malicious code as benign, and vice versa. 

However, deep learning provides a solution to these vulnerabilities. Deep learning is an advanced subset of AI and has been developed to operate similarly to the human brain. The technology consists of neurological networks, meaning over time, the system can ‘learn’ to recognize and predict known and unknown attacks before they take place. While this technology does require vast amounts of raw data, once the initial set-up process has finished, the system can be left to run with minimal interference from the security team. Fully trained, a deep learning solution can identify and block malware in less than 20 milliseconds. 

Deep learning’s capabilities often sound too good to be true, and only in recent years has the technology become viable. Advances in technology such as Graphics Processing Units (GPU) have made true deep learning far more achievable. The rise in awareness is similar to Netflix and Spotify, which 10 years ago were unrecognizable. Now though, they are two of the most well-known brands globally thanks, in part, to their use of deep learning. 

Needless to say, prediction and prevention sit at the heart of deep learning. As deep learning only uses raw data, there is no risk of the datasets being tampered with before they’re fed into the system. Therefore, it is far more resistant to adversarial attacks. 

One of the biggest issues with having multiple solutions for mitigation purposes is that teams are often inundated with alerts. Imagine 10 different systems sending thousands of alerts a day, each one needing to be reviewed by the security team to evaluate the level of risk. Enter deep learning. 

READ MORE:

Once integrated into the existing security stack, deep learning intuitively calculates any potential risks and only alerts the team when further review is needed. Not only does this process contribute to the prevention strategy, but it also reduces the number of alerts by a minimum of 25% each week. Using raw data, deep learning will intuitively predict potential threats and vulnerabilities and will only alert the team when a genuine risk is identified. Everyone can continue with their day in full confidence that the deep learning system is in control, knowing that the technology can instantly identify malware. 

The shift to prevention

Let’s compare the scenario to a physical office. We would much rather have a solution that identifies and blocks burglars before they breach the building, rather than one that prides itself on being the quickest to boot the bad guys out once they’ve broken in. No matter how fast the detection and response systems are, the initial damage has already been done. And given that some malware can take hold only 15 seconds after entering the system, most defences will engage too late.

The average cost of a data breach now stands at a shocking US$4.24mn. The time for mitigation has come to an end, and teams must hold prevention at the heart of all future security developments. Even allowing attackers inside the perimeter for a matter of seconds is too long. While detection and response systems have played an integral part over the years, they no longer stand strong against today’s advancing threats. Deep learning holds the key to attack prediction, and can help lead the charge into a secure future based on prevention over mitigation. 

For more news from Top Business Tech, don’t forget to subscribe to our daily bulletin!

Follow us on LinkedIn and Twitter

Brooks Wallace

Brooks Wallace is VP EMEA at Deep Instinct.

How smart labels are transforming supply chains

Sharath Muddaiah • 27th January 2025

As e-commerce continues to rise globally, the impact of just-in-time manufacturing and rising consumer expectations mean the need for real-time visibility has never been greater. Smart labels directly address this demand, offering solutions to long-standing challenges like shipment delays, theft, and the lack of traceability. With the smart label market projected to grow from $14.1...

The rise of loyalty apps

Sue Azari • 17th January 2025

Increased choice and a consumer more price sensitive than ever before, has made customers far more likely to shop around for the best deals. Price is now the number one factor in brand consideration. In an effort to bag a bargain, loyalty programs have become increasingly popular with consumers, with nine out of ten in...

Rocket launch challenges Elon Musk’s space dominance

Professor Sultan Mahmud • 16th January 2025

Amazon founder Jeff Bezos’s space company has blasted its first rocket into orbit in a bid to challenge the dominance of Elon Musk’s SpaceX. The New Glenn rocket launched from Cape Canaveral Space Force Station in Florida at 02:02 local time (07:02 GMT). It firmly pits the world’s two richest men against each other in...

Giesecke+Devrient launches new Smart Label at CES 2025

Giesecke Devrient • 06th January 2025

G+D has today launched the G+D Smart Label, its innovative tracking solution that transforms any package into an IoT device. Ultra-thin and only slightly larger than a credit card, the new Smart Label proposition has been jointly developed by G+D in conjunction with its hardware partner, Sensos to enable cost-effective, accurate location tracking for a...

Choose an AI solution to transform beyond technology

Kit Cox • 09th December 2024

The first step is knowing exactly what your business wants to achieve with AI; think faster, smarter and more efficient. Once you know what you are working towards, you can start looking for a solution that can help you make it a reality. AI integration can feel like a daunting task at the beginning, so...

A Roadmap to Security and Privacy Compliance

John Lynch Director of Kiteworks • 04th December 2024

Only by understanding the current regulatory environment and implementing robust data protection measures, can organisations enhance their security posture, ensure compliance, and build resilience against the latest cyber threats. This article provides a comprehensive roadmap of how to do it.

Data-Sharing Done Right: Finding the Best Business Approach

Bart Koek • 20th November 2024

To ensure data is not only available, but also accessible to those that need it, businesses recognise that it is vital to focus on collecting, sorting and governing all the data in their organisation. But what happens when data also needs to be accessed and shared across the business? That is where organisations discover a...