{"id":133785,"date":"2022-01-08T21:22:17","date_gmt":"2022-01-09T05:22:17","guid":{"rendered":"https:\/\/lifeboat.com\/blog\/2022\/01\/how-combining-human-expertise-and-ai-can-stop-cyberattacks"},"modified":"2022-01-08T21:22:17","modified_gmt":"2022-01-09T05:22:17","slug":"how-combining-human-expertise-and-ai-can-stop-cyberattacks","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2022\/01\/how-combining-human-expertise-and-ai-can-stop-cyberattacks","title":{"rendered":"How combining human expertise and AI can stop cyberattacks"},"content":{"rendered":"<p><a class=\"aligncenter blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/how-combining-human-expertise-and-ai-can-stop-cyberattacks.jpg\"><\/a><\/p>\n<p>Chief information security officers\u2019 <a href=\"https:\/\/venturebeat.com\/2021\/04\/24\/cisos-must-help-their-boards-manage-cyber-risk-heres-how\/\">(CISOs) greatest challenge<\/a> going into 2022 is countering the speed and severity of cyberattacks. The latest real-time monitoring and detection technologies improve the odds of thwarting an attack but aren\u2019t foolproof. CISOs tell VentureBeat that bad actors avoid detection with first-line monitoring systems by modifying attacks on the fly. That\u2019s cause for concern, especially with CISOs in financial services and health care.<\/p>\n<p><b>Enterprises are in react mode<\/b><\/p>\n<p>Enterprises fail to get the most value from threat monitoring, detection, and response cybersecurity strategies because they\u2019re too focused on data collection and security monitoring alone. CISOs tell VentureBeat they\u2019re capturing more telemetry (i.e., remote) data than ever, yet are short-staffed when it comes to deciphering it, which means they\u2019re often in react mode.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Chief information security officers\u2019 (CISOs) greatest challenge going into 2022 is countering the speed and severity of cyberattacks. The latest real-time monitoring and detection technologies improve the odds of thwarting an attack but aren\u2019t foolproof. CISOs tell VentureBeat that bad actors avoid detection with first-line monitoring systems by modifying attacks on the fly. That\u2019s cause [\u2026]<\/p>\n","protected":false},"author":662,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34,45,1495,6],"tags":[],"class_list":["post-133785","post","type-post","status-publish","format-standard","hentry","category-cybercrime-malcode","category-finance","category-health","category-robotics-ai"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/133785","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/662"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=133785"}],"version-history":[{"count":0,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/133785\/revisions"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=133785"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=133785"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=133785"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}