• Latest
  • All
  • How To
Cisco

Cisco 2018 Annual Cybersecurity Report: Defenses to Leverage AI and Machine Learning Tools

July 17, 2018
Why Can'y You Register a Safaricom SIM Card After 7 PM

Why You Cannot Register a Safaricom SIM Card After 7 PM

July 10, 2025
Former Safaricom Chief Enterprise Business Officer, Cynthia Karuri-Kropac

Frankline Okata Takes Over as Cynthia Karuri-Kropac Exits Safaricom PLC

July 10, 2025
AI

OpenAI and Perplexity Launch Browsers to Rival Google Chrome

July 10, 2025
Vivo-Y29-4G

Vivo Y29 Launches in Kenya at KES 23,999

July 10, 2025
DHgate Tablet Cases deals
galaxy z fold7-galaxy z flip7-samsung

Samsung Unveils Galaxy Z Fold7 and Z Flip7 with Bigger Screens

July 10, 2025
GTA VI

Rockstar May Be Testing 96-Player Servers for GTA 6

July 10, 2025
Former X CEO, Linda Yaccarino

Linda Yaccarino Steps Down as CEO of X After Two Years

July 9, 2025
Apple-WWDC25-iOS-26

iPhone Users Are Not Too Happy With the iOS 26 Liquid Glass Design

July 9, 2025
Official document handover by Bernard Mwonyonyo and Habib Lukaya from Roam.

E-Mobility in Kenya Gets a Lift with New Bike Financing Program

July 9, 2025
Samsung

This Samsung Security Update Could Change How You Use Your Phone

July 9, 2025
tecno ultimate g fold concept

TECNO Joins Tri-Fold Race With Ultimate G Fold Concept Phone

July 10, 2025
Microsoft Edge browser

Microsoft Makes Edge 40% Faster in a Bid to Lure Chrome Users

July 8, 2025
Techweez | Tech News, Reviews, Deals, Tips and How To
  • News
  • Entertainment
  • Reviews
  • Features
  • Editorial
No Result
View All Result
Techweez | Tech News, Reviews, Deals, Tips and How To
  • News
  • Entertainment
  • Reviews
  • Features
  • Editorial
No Result
View All Result
Techweez | Tech News, Reviews, Deals, Tips and How To
No Result
View All Result

Cisco 2018 Annual Cybersecurity Report: Defenses to Leverage AI and Machine Learning Tools

Kenn Abuya by Kenn Abuya
July 17, 2018
in News
Reading Time: 2 mins read
256
3
Cisco

CiscoSometime last week, technology corporation Cisco released its 11th 2018 Annual Cybersecurity Report. Most pointers of the report described the sophisticated nature of modern malware, especially in cloud services where cybercriminals continue to weaponize complex black hat tools to evade detection via encryption. According to the report, security experts have highlighted their plans to leverage and invest heavily in tools that use AI and machine learning to reduce adversaries’ time to operate.

It has also been revealed that while encryption is targeted to bolster security, the ever-increasing volume of legitimate and malicious encrypted web traffic, which hit 50 percent as of October, has been a headache for security professionals who must pinpoint and monitor potential threats. In fact, Cisco says it has observed more than a threefold jump in encrypted network communication used by inspected malware samples over a year.

Machine Learning

According to the cybersecurity firm, the use of machine learning can demonstrably alleviate network security threats and beefing up defenses, and over time, the exercise can be automated to autonomously detect unusual patterns in encrypted web traffic, cloud and IoT devices, to mention a few.

More than 3600 chief information security officers interviewed by Cisco maintained that AI and machine learning technologies can be exploited to counter the said issue, but were frustrated by the number of inaccurate projections such systems generate. All in all, the two solutions are still in the early stages of development and will mature over time and learn to separate ‘normal’ activity in the network environments being monitored.

“Last year’s evolution of malware demonstrates that our adversaries continue to learn,” said John N. Stewart, Senior Vice President and Chief Security and Trust Officer, Cisco. “We have to raise the bar now – top-down leadership, business led, technology investments, and practice effective security – there is too much risk, and it is up to us to reduce it.”

Key Highlights in the Annual Report

To begin with, it has been revealed that the financial cost of attacks is no longer a hypothetical number. In other words, it has now been substantiated that more than half of intrusions led to financial damages of over US$500,000 that cuts across lost opportunities, revenues, customers and so much more.

Secondly, supply chain attacks are hitting new heights in terms of velocity and sophistication. Additional concerns are centered around the complexity of security as the scope of breaches continues to expand.

Furthermore, the use of the cloud is growing, and hackers are taking advantage of that adoption and lack of advanced security to spread cyber harm to businesses.

“While the cloud offers better data security, attackers are taking advantage of the fact that security teams are having difficulty defending evolving and expanding cloud environments. The combination of best practices, advanced security technologies like machine learning, and first-line-of-defense tools like cloud security platforms can help protect this environment,” reads the report.

Remedies

Apart from practices that businesses have installed to shield themselves from cybercrime cases, Cisco says that security heads need to confirm that they adhere to corporate policies and practices for application, system and appliance patching.

Also, deeper and more advanced analytics must be performed, in addition to conduction security scanning of microfinance, cloud services, and application administration systems.

Additional highlights of the report can be read here.

Tags: Cisco
SendShare147Tweet92
Kenn Abuya

Kenn Abuya

Kenn Abuya is a friend of technology, with bias in enterprise and mobile tech. Share your thoughts, tips and hate mail at [email protected]

Related Posts

Telecom Technicians in Kenya: CA Introduces Modernized Licensing Guidelines

New Licensing Rules Proposed for Kenya’s Telecom Engineers and IT Experts

December 24, 2024
Clayton Naidoo, General Manager for Sub-Saharan Africa - Cisco

ICT Authority Picks Cisco as Partner in Digital Master Plan Implementation

April 4, 2023
Near 8000 Students and Civil Servants Benefit From Ajira Digital and Cisco Partnership

Near 8000 Students and Civil Servants Benefit From Ajira Digital and Cisco Partnership

February 25, 2021
Sally Kimeu

Networking Corporation Cisco Appoints New Regional Manager for East Africa

October 22, 2019
Cisco

Cisco Launches a KES 60M Incubation Hub in Nairobi

April 8, 2019
Cisco

CISCO: Top 5 Game Changers for 2018

December 22, 2017

Latest

Why Can'y You Register a Safaricom SIM Card After 7 PM

Why You Cannot Register a Safaricom SIM Card After 7 PM

July 10, 2025
Former Safaricom Chief Enterprise Business Officer, Cynthia Karuri-Kropac

Frankline Okata Takes Over as Cynthia Karuri-Kropac Exits Safaricom PLC

July 10, 2025
AI

OpenAI and Perplexity Launch Browsers to Rival Google Chrome

July 10, 2025
Vivo-Y29-4G

Vivo Y29 Launches in Kenya at KES 23,999

July 10, 2025
galaxy z fold7-galaxy z flip7-samsung

Samsung Unveils Galaxy Z Fold7 and Z Flip7 with Bigger Screens

July 10, 2025
GTA VI

Rockstar May Be Testing 96-Player Servers for GTA 6

July 10, 2025

Best devices

budget smartwatches 2025

Best Budget Smartwatches To Buy in Kenya 2025

February 13, 2025

Best Infinix Smartphones To Buy in Kenya 2024

February 13, 2025

Best Laptops for Battery Life in 2024

August 21, 2024

Best “Battery Warrior” Smartphones To Buy in 2024

August 22, 2024

Why You Cannot Register a Safaricom SIM Card After 7 PM

July 10, 2025

Frankline Okata Takes Over as Cynthia Karuri-Kropac Exits Safaricom PLC

July 10, 2025

Techweez is a fast growing influential source of technology news, reviews and analysis by leading tech geeks in the industry.

Follow Us

Editorials

Abductions and Arrests! Kenyan Government’s Fear and Hate of X Users Makes No Sense

Actors and Film Crews Are Worried About Veo 3 Taking Their Jobs

Samsung QLED TVs Now Officially Certified for Real Quantum Dot Technology

Trump’s Tariffs Will Be the End of Affordable Tech

5 Ways to Prep Your Tech for Resale

The Weaponization of PDFs: How Cybercriminals Are Exploiting a Trusted Format

More News

Linda Yaccarino Steps Down as CEO of X After Two Years

iPhone Users Are Not Too Happy With the iOS 26 Liquid Glass Design

E-Mobility in Kenya Gets a Lift with New Bike Financing Program

This Samsung Security Update Could Change How You Use Your Phone

TECNO Joins Tri-Fold Race With Ultimate G Fold Concept Phone

Microsoft Makes Edge 40% Faster in a Bid to Lure Chrome Users

  • Terms Of Use
  • Techweez Brand
  • Privacy & Policy
  • Contact Us

© 2024 Techweez - Palahala Media Group may earn a commission when you buy through links on our sites.
A Palahala Media Group Brand. All rights reserved.
.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

Techweez | Tech News, Reviews, Deals, Tips and How To
Crunchy Cookies 🍪 Ahead!

Hey there! Just a heads-up: we're big fans of cookies - both the digital and edible kind! 🍪 We use our cookies and some from third parties to ensure your browsing experience on our site is smooth sailing and secure.

 

But wait, there's more! We also use cookies to gather stats and insights on how you navigate our site. It's like getting a behind-the-scenes peek at your digital adventures!

 

Don't worry, you're in control. You can adjust your cookie settings anytime to suit your preferences. Feeling curious? Dive into our Privacy Policy for all the juicy details. Happy browsing! 🚀

Functional Always active
Listen, this legal stuff is about as exciting as watching paint dry. But it basically says we only use your stuff for what you asked us to do, and nobody else gets to peek!
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
It's those sneaky cookie crumbs websites leave behind to count visitors, like counting ants at a picnic! Totally harmless, just for fun facts. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
Hey there! Just letting you know we use some fancy gizmos to remember your preferences. This way, we can show you ads that are, well, not completely bananas.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Make cookies
{title} {title} {title}
Techweez | Tech News, Reviews, Deals, Tips and How To
Crunchy Cookies 🍪 Ahead!
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
Listen, this legal stuff is about as exciting as watching paint dry. But it basically says we only use your stuff for what you asked us to do, and nobody else gets to peek!
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
It's those sneaky cookie crumbs websites leave behind to count visitors, like counting ants at a picnic! Totally harmless, just for fun facts. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
Hey there! Just letting you know we use some fancy gizmos to remember your preferences. This way, we can show you ads that are, well, not completely bananas.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Make cookies
{title} {title} {title}
No Result
View All Result
  • News
  • Reviews
  • Features
  • Editorial
  • Automotive
  • Entertainment

© 2024 Techweez - Palahala Media Group may earn a commission when you buy through links on our sites.
A Palahala Media Group Brand. All rights reserved.
.