Share

Andrew S. Grove (1)

* By Francisco Camargo

When I decided to use the title of Andrew Grove's book to talk about information security, I didn't do it by chance. In the face of so many leaks, intrusions, identity theft, you can't help but be obsessed with protecting corporate data and customers, especially with the dragon of the LGPD getting closer and with the growing role of Artificial Intelligence in the security of information.

Much has been said that the weakest link in Information Security is the human being.

To get an idea, a Veritas survey found that 71% of employees worldwide and 84% in Brazil admit to sharing confidential and restricted-use corporate data through these platforms. In addition, the percentage of people who save their own copies of corporate files is more than 70%.

Not to mention the issue of passwords made easy or stored under the keyboard and clicks on obvious phishing messages.

With such a vulnerable part of the security chain, the advancement of data protection technologies and the growth of their adoption (the global endpoint security market grows 4.8% per year, according to Valuate Reports) seems to reinforce that these solutions are nothing they are more than human babysitters or adult babysitters.

Tokenization, Anonymization, Cryptography, Zero Day, Zero Trust (look at the paranoia there again), PAM (Privileged Access Management), Password Vault, among other technologies were developed to prevent data from leaking through those who have access to they.

The use of Artificial Intelligence has changed the way Information Security works today.

Most human beings are not paranoid, have good faith and end up believing in other human beings, believe in the information received through different channels, emails, SMS, WhatsApp, Twitter etc. and then these people become victims of social engineering.

Security platforms, based on artificial intelligence, have to behave as paranoid, not believing anything until proven otherwise, as all information is confidential and this is the main concept behind Zero Trust.

Of course, there is the sophistication of attacks, again, the use of artificial intelligence by hackers and now with a lot of help from the dark web, with several marketplaces of stolen data, critical vulnerabilities in software and companies, malware and platforms. , which can be purchased or rented.

In this war, experts who develop advanced solutions to combat these weaknesses have developed the protection of what is closest to the user, their personal device, their endpoint, the XDR - Extended Detection and Response, which is the evolution of EDR, Endpoint Detection and Response.

If EDR added visibility and automated response to endpoints - laptops and workstations, XDR included analyzing and defending many other network data points such as IoT devices, cell phones, native cloud applications, emails and even containers.

To detect and respond in an automated way, XDR solutions based on artificial intelligence, correlate data from different layers of security beyond the endpoint - messaging applications, network, identity etc. - greatly improving the detection of both internal leaks and external invasion attempts.

As popular wisdom says, prevention is better than cure and, in cybersecurity matters, in fact, only the paranoid survive and that is what they are using artificial intelligence to suspect what we believe.

(1)  Book Title of Andrew Grove, engineer, former Intel CEO

* Francisco Camargo is founder and CEO of CLM

Notice: The opinion presented in this article is the responsibility of its author and not of ABES - Brazilian Association of Software Companies

quick access

en_USEN