• Latest
  • All
  • How To
Cisco

Cisco 2018 Annual Cybersecurity Report: Defenses to Leverage AI and Machine Learning Tools

July 17, 2018
Private Number calls

How to Handle Private Number Calls in Kenya

May 8, 2025
Kenya Power EV charging stations

Kenya Power Rolls Out 45 EV Charging Stations Across the Country

May 8, 2025
Bayobab

MTN’s Bayobab Connects Uganda and Kenya with New Fiber Route

May 8, 2025
Airtel Africa Starlink partnership

Starlink Is Expanding in Africa Through New Airtel Partnership

May 8, 2025
DHgate Tablet Cases deals
Android FreeType patch

Android May 2025 Security Update Fixes Critical FreeType Zero-Click Vulnerability

May 7, 2025
worldcoin kenya

Court Ruling Orders Worldcoin to Delete All Kenyan Biometric Records

May 7, 2025
smartphones-2024

Smartphone Market Recovers Slightly in Q1 2025 With Apple, Vivo Leading Gains

May 7, 2025
GTA 6 Trailer 2

GTA 6 Trailer 2: Rockstar Confirms Release Date and Dual Protagonists

May 7, 2025
YouTube Premium Duo

YouTube Now Lets Two People Share a Premium Plan

May 6, 2025
Infinix GT20 Pro

Infinix GT 20 Pro Review: You Don’t Need to Overspend on Gaming Power Anymore

May 6, 2025
Emerald PostPay

Safaricom Transitions Customers to New Emerald PostPay Plans

May 6, 2025
Intrusion Detection System

Android 16 Will Let You Track Suspicious Activity on Your Phone

May 6, 2025
Techweez | Tech News, Reviews, Deals, Tips and How To
  • News
  • Entertainment
  • Reviews
  • Features
  • Editorial
No Result
View All Result
Techweez | Tech News, Reviews, Deals, Tips and How To
  • News
  • Entertainment
  • Reviews
  • Features
  • Editorial
No Result
View All Result
Techweez | Tech News, Reviews, Deals, Tips and How To
No Result
View All Result

Cisco 2018 Annual Cybersecurity Report: Defenses to Leverage AI and Machine Learning Tools

Kenn Abuya by Kenn Abuya
July 17, 2018
in News
Reading Time: 2 mins read
256
3
Cisco

CiscoSometime last week, technology corporation Cisco released its 11th 2018 Annual Cybersecurity Report. Most pointers of the report described the sophisticated nature of modern malware, especially in cloud services where cybercriminals continue to weaponize complex black hat tools to evade detection via encryption. According to the report, security experts have highlighted their plans to leverage and invest heavily in tools that use AI and machine learning to reduce adversaries’ time to operate.

It has also been revealed that while encryption is targeted to bolster security, the ever-increasing volume of legitimate and malicious encrypted web traffic, which hit 50 percent as of October, has been a headache for security professionals who must pinpoint and monitor potential threats. In fact, Cisco says it has observed more than a threefold jump in encrypted network communication used by inspected malware samples over a year.

Machine Learning

According to the cybersecurity firm, the use of machine learning can demonstrably alleviate network security threats and beefing up defenses, and over time, the exercise can be automated to autonomously detect unusual patterns in encrypted web traffic, cloud and IoT devices, to mention a few.

More than 3600 chief information security officers interviewed by Cisco maintained that AI and machine learning technologies can be exploited to counter the said issue, but were frustrated by the number of inaccurate projections such systems generate. All in all, the two solutions are still in the early stages of development and will mature over time and learn to separate ‘normal’ activity in the network environments being monitored.

“Last year’s evolution of malware demonstrates that our adversaries continue to learn,” said John N. Stewart, Senior Vice President and Chief Security and Trust Officer, Cisco. “We have to raise the bar now – top-down leadership, business led, technology investments, and practice effective security – there is too much risk, and it is up to us to reduce it.”

Key Highlights in the Annual Report

To begin with, it has been revealed that the financial cost of attacks is no longer a hypothetical number. In other words, it has now been substantiated that more than half of intrusions led to financial damages of over US$500,000 that cuts across lost opportunities, revenues, customers and so much more.

Secondly, supply chain attacks are hitting new heights in terms of velocity and sophistication. Additional concerns are centered around the complexity of security as the scope of breaches continues to expand.

Furthermore, the use of the cloud is growing, and hackers are taking advantage of that adoption and lack of advanced security to spread cyber harm to businesses.

“While the cloud offers better data security, attackers are taking advantage of the fact that security teams are having difficulty defending evolving and expanding cloud environments. The combination of best practices, advanced security technologies like machine learning, and first-line-of-defense tools like cloud security platforms can help protect this environment,” reads the report.

Remedies

Apart from practices that businesses have installed to shield themselves from cybercrime cases, Cisco says that security heads need to confirm that they adhere to corporate policies and practices for application, system and appliance patching.

Also, deeper and more advanced analytics must be performed, in addition to conduction security scanning of microfinance, cloud services, and application administration systems.

Additional highlights of the report can be read here.

Tags: Cisco
SendShare147Tweet92
Kenn Abuya

Kenn Abuya

Kenn Abuya is a friend of technology, with bias in enterprise and mobile tech. Share your thoughts, tips and hate mail at [email protected]

Related Posts

Telecom Technicians in Kenya: CA Introduces Modernized Licensing Guidelines

New Licensing Rules Proposed for Kenya’s Telecom Engineers and IT Experts

December 24, 2024
Clayton Naidoo, General Manager for Sub-Saharan Africa - Cisco

ICT Authority Picks Cisco as Partner in Digital Master Plan Implementation

April 4, 2023
Near 8000 Students and Civil Servants Benefit From Ajira Digital and Cisco Partnership

Near 8000 Students and Civil Servants Benefit From Ajira Digital and Cisco Partnership

February 25, 2021
Sally Kimeu

Networking Corporation Cisco Appoints New Regional Manager for East Africa

October 22, 2019
Cisco

Cisco Launches a KES 60M Incubation Hub in Nairobi

April 8, 2019
Cisco

CISCO: Top 5 Game Changers for 2018

December 22, 2017

Latest

Private Number calls

How to Handle Private Number Calls in Kenya

May 8, 2025
Kenya Power EV charging stations

Kenya Power Rolls Out 45 EV Charging Stations Across the Country

May 8, 2025
Bayobab

MTN’s Bayobab Connects Uganda and Kenya with New Fiber Route

May 8, 2025
Airtel Africa Starlink partnership

Starlink Is Expanding in Africa Through New Airtel Partnership

May 8, 2025
Android FreeType patch

Android May 2025 Security Update Fixes Critical FreeType Zero-Click Vulnerability

May 7, 2025
worldcoin kenya

Court Ruling Orders Worldcoin to Delete All Kenyan Biometric Records

May 7, 2025

Best devices

budget smartwatches 2025

Best Budget Smartwatches To Buy in Kenya 2025

February 13, 2025

Best Infinix Smartphones To Buy in Kenya 2024

February 13, 2025

Best Laptops for Battery Life in 2024

August 21, 2024

Best “Battery Warrior” Smartphones To Buy in 2024

August 22, 2024

How to Handle Private Number Calls in Kenya

May 8, 2025

Kenya Power Rolls Out 45 EV Charging Stations Across the Country

May 8, 2025

Techweez is a fast growing influential source of technology news, reviews and analysis by leading tech geeks in the industry.

Follow Us

Editorials

Trump’s Tariffs Will Be the End of Affordable Tech

5 Ways to Prep Your Tech for Resale

The Weaponization of PDFs: How Cybercriminals Are Exploiting a Trusted Format

Introducing A Brainbox Quiz: Techweez’s Monthly Trivia Night!

5 Most Reliable Virtual Dollar Card Providers in Nigeria

5 Leading Grant Management Software for Nonprofits

More News

Smartphone Market Recovers Slightly in Q1 2025 With Apple, Vivo Leading Gains

GTA 6 Trailer 2: Rockstar Confirms Release Date and Dual Protagonists

YouTube Now Lets Two People Share a Premium Plan

Infinix GT 20 Pro Review: You Don’t Need to Overspend on Gaming Power Anymore

Safaricom Transitions Customers to New Emerald PostPay Plans

Android 16 Will Let You Track Suspicious Activity on Your Phone

  • Terms Of Use
  • Techweez Brand
  • Privacy & Policy
  • Contact Us

© 2024 Techweez - Palahala Media Group may earn a commission when you buy through links on our sites.
A Palahala Media Group Brand. All rights reserved.
.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

Techweez | Tech News, Reviews, Deals, Tips and How To
Crunchy Cookies 🍪 Ahead!

Hey there! Just a heads-up: we're big fans of cookies - both the digital and edible kind! 🍪 We use our cookies and some from third parties to ensure your browsing experience on our site is smooth sailing and secure.

 

But wait, there's more! We also use cookies to gather stats and insights on how you navigate our site. It's like getting a behind-the-scenes peek at your digital adventures!

 

Don't worry, you're in control. You can adjust your cookie settings anytime to suit your preferences. Feeling curious? Dive into our Privacy Policy for all the juicy details. Happy browsing! 🚀

Functional Always active
Listen, this legal stuff is about as exciting as watching paint dry. But it basically says we only use your stuff for what you asked us to do, and nobody else gets to peek!
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
It's those sneaky cookie crumbs websites leave behind to count visitors, like counting ants at a picnic! Totally harmless, just for fun facts. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
Hey there! Just letting you know we use some fancy gizmos to remember your preferences. This way, we can show you ads that are, well, not completely bananas.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Make cookies
{title} {title} {title}
Techweez | Tech News, Reviews, Deals, Tips and How To
Crunchy Cookies 🍪 Ahead!
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
Listen, this legal stuff is about as exciting as watching paint dry. But it basically says we only use your stuff for what you asked us to do, and nobody else gets to peek!
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
It's those sneaky cookie crumbs websites leave behind to count visitors, like counting ants at a picnic! Totally harmless, just for fun facts. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
Hey there! Just letting you know we use some fancy gizmos to remember your preferences. This way, we can show you ads that are, well, not completely bananas.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Make cookies
{title} {title} {title}
No Result
View All Result
  • News
  • Reviews
  • Features
  • Editorial
  • Automotive
  • Entertainment

© 2024 Techweez - Palahala Media Group may earn a commission when you buy through links on our sites.
A Palahala Media Group Brand. All rights reserved.
.