{"id":4888,"date":"2021-02-04T07:08:09","date_gmt":"2021-02-04T07:08:09","guid":{"rendered":"https:\/\/techclot.com\/index.php\/2021\/02\/04\/is-ai-the-ultimate-answer-for-cloud-security-lets-know-more\/"},"modified":"2021-02-04T07:08:09","modified_gmt":"2021-02-04T07:08:09","slug":"is-ai-the-ultimate-answer-for-cloud-security-lets-know-more","status":"publish","type":"post","link":"https:\/\/techclot.com\/index.php\/2021\/02\/04\/is-ai-the-ultimate-answer-for-cloud-security-lets-know-more\/","title":{"rendered":"Is AI The Ultimate Answer For Cloud Security? Let&#8217;s Know More"},"content":{"rendered":"<p><a href=\"https:\/\/www.google.com\/url?rct=j&#038;sa=t&#038;url=https:\/\/www.analyticsinsight.net\/is-ai-the-ultimate-answer-for-cloud-security-lets-know-more\/&#038;ct=ga&#038;cd=CAIyHDkyYmU1MGQ5NjY1NjYxZTA6Y28udWs6ZW46R0I&#038;usg=AFQjCNEj07Ibn65t3_zwXSmc3Iaa0HJQcg\">Is AI The Ultimate Answer For Cloud Security? Let&#8217;s Know More<\/a><\/p>\n<div readability=\"101.27003205128\">\n<p class=\"caps\"><img data-recalc-dims=\"1\" decoding=\"async\" class=\"aligncenter size-full wp-image-38855 lazyload\" data-src=\"https:\/\/i0.wp.com\/techclot.com\/wp-content\/uploads\/2021\/02\/tSWuud.jpg?resize=640%2C356&#038;ssl=1\" alt=\"Cloud Security\" width=\"640\" height=\"356\" data-srcset=\"https:\/\/techclot.com\/wp-content\/uploads\/2021\/02\/tSWuud.jpg 900w, https:\/\/analyticsinsight.b-cdn.net\/wp-content\/uploads\/2021\/02\/Cloud-Security-300x167.jpg 300w, https:\/\/analyticsinsight.b-cdn.net\/wp-content\/uploads\/2021\/02\/Cloud-Security-768x427.jpg 768w\" data-sizes=\"auto, (max-width: 900px) 100vw, 900px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 640px; --smush-placeholder-aspect-ratio: 640\/356;\"><\/p>\n<p>In the 21st century, we\u2019re surrounded by activities that require cloud computing. Don\u2019t believe me? Your social media accounts like Facebook and Instagram use the cloud. What happens when you upload a photo? It is stored in the cloud. Love binge-watching Netflix in your free time? The only way you are being able to access your favourite shows and movies is because of the cloud. In short, let\u2019s just say mostly everything on the internet is running on <a href=\"https:\/\/www.analyticsinsight.net\/top-5-cloud-storage-use-cases-for-connecting-cloud-infrastructures\/\">cloud computing<\/a>, and it shows no signs of slowing down. According to <a href=\"https:\/\/www.suse.com\/media\/report\/rightscale_2018_state_of_the_cloud_report.pdf\">Rightscale\u2019s 2018 report<\/a>, 96% of companies are using the cloud to conduct some of their operations.<\/p>\n<p>What\u2019s the issue, you ask? Well, just like everything, this too comes with perils.<\/p>\n<p>Cloud computing is vulnerable to breaches. Many IT professionals highlight that despite the growth of cloud computing, it\u2019s the most vulnerable area within the business. To tackle this problem, many companies have started to rely on artificial intelligence and machine learning to strengthen their cloud security. Additionally, they are increasing their cloud security budgets.<\/p>\n<h4><strong>How will AI help to combat this vulnerability? <\/strong><\/h4>\n<p>Artificial Intelligence is a program that can think by itself and solve problems, just like us humans. Machine learning is a part of AI that uses algorithms to learn from several units of data. The more data it has to analyze, the more it learns based on the patterns to give useful insights.<\/p>\n<p>While it\u2019s not 100% bulletproof, AI and machine learning can be used to detect threats in real-time.<\/p>\n<p>If you are a business using cloud computing, here\u2019s how these technologies can benefit your security strategy.<\/p>\n<p><strong>Big Data Processing <\/strong><\/p>\n<p>If you employ a team to sift through several GBs of data that cybersecurity systems produce, it\u2019s going to be impossible to deal with the massive data. While we can\u2019t do it, machine learning technologies can churn that data to detect potential threats. The more it processes, the more it understands patterns for better detection.<\/p>\n<p><strong>Threat Prediction <\/strong><\/p>\n<p>Artificial Intelligence uses an advanced data-driven approach that can detect and alert vulnerabilities that are present at the time or might happen soon. This is calculated by observing the data coming in and out of protected endpoints. With sufficient data, this approach can detect threats based on known behavior and predictive analysis.<\/p>\n<p><strong>Threat Detection And Blocking<\/strong><\/p>\n<p>What will happen if there is a breach and the systems team is not present in the office to take immediate action? AI and machine learning will do it on their own. When these systems find glitches in the data patterns, they will alert a human or take immediate action by shutting a system under threat down. This gives businesses warnings about potential threats days in advance or detects and blocks a dangerous code within hours.<\/p>\n<p><strong>Self-handling Security Analysis <\/strong><\/p>\n<p>One of the advantages of employing an automated technology like AI and machine learning for cloud security is that it will handle first-level security threats on its own, giving you more time to focus on other complex issues. This means companies can rely less on manpower and use their potential elsewhere by delegating first-level analysis to bots.<\/p>\n<p>While it might not solve every problem, AI will sift through massive amounts of data and analyze patterns to detect an anomaly. While AI and machine learning might respond to first-level threats on their own, that day is still far when it will take care of the breach on its own. Nevertheless, it will help you scatter through bundles of incoming data and warn you of any potential breach, keeping you one step ahead.<\/p>\n<p><!-- AddThis Advanced Settings above via filter on the_content --><!-- AddThis Advanced Settings below via filter on the_content --><!-- AddThis Advanced Settings generic via filter on the_content -->\t\t<\/p><\/div>\n<div readability=\"32\">\n<p><h2>Share This Article<\/h2>\n<p>\t\t\t\t\t<span>Do the sharing thingy<\/span>\n\t\t\t\t<\/p>\n<\/p><\/div>\n<\/p>\n<p>Published at Thu, 04 Feb 2021 04:07:30 +0000<\/p>\n<p><a href=\"https:\/\/www.google.com\/url?rct=j&#038;sa=t&#038;url=https:\/\/news.northeastern.edu\/2021\/02\/03\/she-was-named-one-of-the-100-most-brilliant-women-in-ai-ethics\/&#038;ct=ga&#038;cd=CAIyHDkyYmU1MGQ5NjY1NjYxZTA6Y28udWs6ZW46R0I&#038;usg=AFQjCNHMtQRxy3GDdj0x-xeRdEfAE1e_pQ\">She was named one of the 100 most brilliant women in AI ethics<\/a><\/p>\n<p><p><span>Computer science professor <a href=\"https:\/\/www.khoury.northeastern.edu\/people\/tina-eliassi-rad\/\">Tina Eliassi-Rad<\/a> says she\u2019s proud to be named on an industry list of \u201c<\/span><a href=\"https:\/\/100brilliantwomeninaiethics.com\/\"><b>100 Brilliant Women in AI Ethics<\/b><\/a><span>,\u201d which identifies her as one of the top thinkers in the male-dominated field of artificial intelligence. But she\u2019s even prouder of what the carefully-curated list represents.<\/span><\/p>\n<p><span>\u201cPart of the issue in a field such as computer science is that women and other under-represented minorities aren\u2019t always seen. Initiatives like this one show that there are a lot of women who are qualified to do this work,\u201d says Eliassi-Rad.<\/span><\/p>\n<p><span>Mia Shah-Dand, the CEO of the Oakland, California-based research firm Lighthouse3, created the annual list in 2018. Shah-Dand says she wanted to provide a rebuttal to technology leaders who complained that they couldn\u2019t find accomplished, diverse women to hire.<\/span><\/p>\n<p><span>\u201cI was a little frustrated with all the times I would hear, \u2018There just aren\u2019t enough qualified women,\u2019\u201d says Shah-Dand. \u201cIt\u2019s the same old excuse. Well, we have an entire directory of qualified women now. There is no excuse. At this point in 2021, if you have only men on your staff, it\u2019s intentional.\u201d<\/span><\/p>\n<p><span>According to recent research by the <\/span><a href=\"http:\/\/www3.weforum.org\/docs\/WEF_GGGR_2020.pdf\"><span>World Economic Forum<\/span><\/a><span>, women hold only 26% of data and artificial intelligence jobs across the globe, and even fewer have senior roles.<\/span><\/p>\n<div class=\"spotlight-section spotlight-callout dark-mot small\">\n<article class=\"inner-post\" id=\"post-93686\">\n<section class=\"inner-article-content\" id=\"inner-article-content\">\n<div class=\"spot-inner\">\n<div class=\"spotlight__image_side\">\n<figure class>\n        <a href=\"https:\/\/news.northeastern.edu\/2019\/07\/31\/northeastern-university-launches-national-program-to-boost-the-number-of-women-majoring-in-computing\/\" class=\"media-img \"><img data-recalc-dims=\"1\" decoding=\"async\" class=\"js-inline-gallery-image lazyload\" data-src=\"https:\/\/i0.wp.com\/techclot.com\/wp-content\/uploads\/2021\/02\/0QUM09.jpg?w=640&#038;ssl=1\" alt=\"The Center for Inclusive Computing will utilize the expertise of Northeastern faculty and recruit a set of technical consultants from other universities with first-hand experience in the best practices that have shown to narrow the gender gap in computing. Photo by Liz Linder.\" data-caption=\"The Center for Inclusive Computing will utilize the expertise of Northeastern faculty and recruit a set of technical consultants from other universities with first-hand experience in the best practices that have shown to narrow the gender gap in computing. Photo by Liz Linder.\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\"><\/a><br \/>\n      <\/figure>\n<\/div><\/div>\n<\/section>\n<\/article>\n<\/div>\n<p><span>Shah-Dand says she included Eliassi-Rad on her 2021 list because of the professor\u2019s extensive research on racial, gender and other baked-in biases in artificial intelligence algorithms.&nbsp;<\/span><\/p>\n<p><span>\u201cHer emphasis on algorithmic accountability and fairness was particularly interesting,\u201d says Shah-Dand.<\/span><\/p>\n<p><span>Algorithms, which scan large amounts of data and find whatever information its creators want, are increasingly part of our everyday lives. For example, credit card fraud departments use algorithms to detect abnormal spending, while social media algorithms use viewer interests to determine which ads to run.<\/span><\/p>\n<p><span><span>Eliasi-Rad\u2019s research at Northeastern focuses on<\/span> the unseen but overwhelming influence that artificial intelligence algorithms can make in people\u2019s lives, especially in social media.<\/span><\/p>\n<p><span>\u201cPart of the problem with algorithms is that they can impact life-altering decisions if they\u2019re used in criminal justice or even your credit score,\u201d says Eliassi-Rad. Microlenders, or individuals who issue small loans, will often check a candidate\u2019s Facebook and Twitter feeds when deciding whether to grant a loan. A chance connection with someone who has defaulted on a loan could trigger a denial, says Eliassa-Rad.<\/span><\/p>\n<p><span>\u201cSometimes if you don\u2019t get the right loan in life, you can\u2019t better yourself,\u201d she says.<\/span><\/p>\n<p><span>Eliassi-Rad\u2019s career in computer science was sparked by her father\u2019s early work with autonomous vehicles. She avidly read the many magazines he brought home and decided computer science was the perfect balance between math and electrical engineering. Her focus recently sharpened as she learned about the different class, race, and gender biases in machine learning.<\/span><\/p>\n<p><span>She likens the data used in algorithms to an iconic photo of a police officer\u2019s German shepherd attacking a Black high school student during a 1963 civil rights event in Birmingham, Alabama.<\/span><\/p>\n<div class=\"spotlight-section spotlight-callout dark-mot small_right\">\n<article class=\"inner-post\" id=\"post-98352\">\n<section class=\"inner-article-content\" id=\"inner-article-content\">\n<div class=\"spot-inner\">\n<div class=\"spotlight__image_side\">\n<figure class>\n        <a href=\"https:\/\/news.northeastern.edu\/2020\/05\/04\/northeasterns-center-for-inclusive-computing-awards-grants-to-six-universities-to-help-them-increase-the-number-of-women-in-computing\/\" class=\"media-img \"><img data-recalc-dims=\"1\" decoding=\"async\" class=\"js-inline-gallery-image lazyload\" data-src=\"https:\/\/i0.wp.com\/techclot.com\/wp-content\/uploads\/2021\/02\/nmvuih.jpg?w=640&#038;ssl=1\" alt=\"Photo by Matthew Modoono\/Northeastern University\" data-caption=\"Photo by Matthew Modoono\/Northeastern University\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\"><\/a><br \/>\n      <\/figure>\n<\/div><\/div>\n<\/section>\n<\/article>\n<\/div>\n<p><span>\u201cThe German shepherd isn\u2019t racist, it\u2019s the people teaching the dog,\u201d Eliassa-Rad says. Even if the data used in an algorithm isn\u2019t biased, the algorithm may still produce biased findings.<\/span><\/p>\n<p><span>\u201cAs you are developing an algorithm you are making choices, and those choices have consequences,\u201d Eliassi-Rad says.<\/span><\/p>\n<p><span>Eliassi-Rad and Shah-Dand say the list of top women in AI ethics does more than provide a roster of qualified computer science professionals who also happen to be female, LGTBQ, or women of color. It creates a community to foster networking and support while providing role models for future generations.<\/span><\/p>\n<p><span>\u201cIt\u2019s sort of like a sisterhood,\u201d says Eliassi-Rad, who received an Outstanding Mentor Award from the Office of Science at the US Department of Energy in 2010. \u201cI hope young women see this and think, \u2018I can be somebody like this person.\u2019\u201d<\/span><\/p>\n<p><a href=\"https:\/\/news.northeastern.edu\/media-inquiries\/\"><b><i>For media inquiries<\/i><\/b><\/a><i><span>, please contact <\/span><\/i><i><span>media@northeastern.edu<\/span><\/i><i><span>.&nbsp;<\/span><\/i><\/p>\n<\/p>\n<p>Published at Thu, 04 Feb 2021 02:26:02 +0000<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Is AI The Ultimate Answer For Cloud Security? Let&#8217;s Know More In the 21st century,&#8230;<\/p>\n","protected":false},"author":3,"featured_media":4885,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[3],"tags":[],"class_list":["post-4888","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-artificial-intelligence"],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/techclot.com\/wp-content\/uploads\/2021\/02\/tSWuud.jpg?fit=900%2C500&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p3orZX-1gQ","jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/techclot.com\/index.php\/wp-json\/wp\/v2\/posts\/4888","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techclot.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techclot.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techclot.com\/index.php\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/techclot.com\/index.php\/wp-json\/wp\/v2\/comments?post=4888"}],"version-history":[{"count":0,"href":"https:\/\/techclot.com\/index.php\/wp-json\/wp\/v2\/posts\/4888\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techclot.com\/index.php\/wp-json\/wp\/v2\/media\/4885"}],"wp:attachment":[{"href":"https:\/\/techclot.com\/index.php\/wp-json\/wp\/v2\/media?parent=4888"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techclot.com\/index.php\/wp-json\/wp\/v2\/categories?post=4888"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techclot.com\/index.php\/wp-json\/wp\/v2\/tags?post=4888"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}