Japan's New AI-Based Cyber Defence System

Japan’s Ministry of Defense (MoD) plans to invest $240 million in the cyber domain this year, which includes developing an Artificial Intelligence-based system to counter cyber-attacks. The system will autonomously detect malicious e-mails, judge the level of threat using AI and respond against cyber-attack. 

The aim is to develop an all-inclusive AI system that can detect malevolent emails, respond to cyber-attacks in an automated way through machine learning skills and eventually neutralise the effect of attacks on public and private sector targets.

Japan truly woke up to a digital alert in January this year when a massive scale cyber attack was launched on Mitsubishi Electric by a hacking group though to be from China. Media sources reported that critical information about MoD and Nuclear Regulation Authority was  stolen by hackers in the attack. Furthermore, documents related to private firms, railway operators and a car manufacturer visionary approach for the year 2022 were also reportedly accessed by the threat actors.

To prevent any further attacks  on public and private entities, Japan’s MoD has now initiated measures to thwart such attacks shortly and  plans to create a  to strategic a framework to defend the nation's  critical infrastructure from cyber-attacks.

The MoD wants to procure Cyber Information Gathering System in order to gather information on the tactics, techniques and procedures of cyber-attacks against the MoD or Self-Defense Forces. It also wants to expand Cyber Defense Group from 220 personnel to 290 personnel; and conduct a research on cybersecurity measures for network devices used by the Japanese military.

The attack against Mitsubishi Electric only came to light after the company spotted irregular activity on devices located in Japan. Mitsubishi found unauthorised access to the management section at its head office and elsewhere.

The attack is said to have compromised e-mail exchanges between the Japanese MoD, the Nuclear Regulation Authority as well as documents related to projects with private firms, railway operators, communications and car manufacturers.

Asahi Shimbum:      Defense World:      Cybersecurity Insiders:     Japan Times:        ITSecurity News

You Might Also Read:

Critical Infrastructure Is Under Worldwide Attack:

Japan’s Cyber Security Minister Admits He Just Doesn't Get It:

 

 

 

« 5G Security: Possible Risks & Challenges
No, 5G Does Not Spread Coronavirus »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Advent IM

Advent IM

Advent IM is one of the UK’s leading independent cyber security specialists, with a unique approach to providing holistic security management solutions.

Telefonica Tech

Telefonica Tech

Telefónica Cyber Security Tech is focused on the prevention, detection and appropriate response to security incidents aimed at protecting your digital services.

Clearwater Security & Compliance

Clearwater Security & Compliance

Clearwater Compliance specialize in Privacy, Security, Compliance and Risk Management Solutions for Health Care, Law Firms and other businesses.

Tymlez Software & Consulting

Tymlez Software & Consulting

Tymlez Software and Consulting is a start-up specialised in blockchain technology for enterprises.

Silicom Denmark

Silicom Denmark

Silicom Denmark is a premier developer and supplier of FPGA-based interface cards for cyber-security, telecommss, financial trading and other sectors.

LUCY Security

LUCY Security

LUCY is the answer when you want to increase your IT security, maintain your cyber security awareness, or test your IT defenses.

Banshie

Banshie

Banshie is an independent cyber security company with a small team of recognized specialist that are among the best in their field.

Tehtris

Tehtris

TEHTRIS XDR Platform was developed to control and improve the IT security of private and public companies against advanced cyber threats such as cyber espionage or cyber sabotage activities.

IntelliGenesis

IntelliGenesis

IntelliGenesis provide comprehensive cyber, data science, analysis, and software development services that provide tailored, secure solutions for your critical data and intelligence needs.

Input Output (IOHK)

Input Output (IOHK)

IOHK is one of the world's pre-eminent blockchain infrastructure research and engineering companies.

Jit

Jit

Jit empowers developers to own security for the product they are building from day zero.

Trackd

Trackd

At trackd, we’re re-imaging vulnerability remediation for the benefit of the entire cyber security community. Automating Vulnerability Remediation without the Fear of Disruption.

OSP Cyber Academy

OSP Cyber Academy

OSP Cyber Academy are a managed service provider of cyber, information security and data protection training.

CloudDefense.AI

CloudDefense.AI

CloudDefense.AI is an industry-leading multi-layered Cloud Native Application and Protection Platform (CNAPP) that safeguards your cloud infrastructure and cloud-native apps,

Somos

Somos

From voice to messaging to fraud prevention and beyond, Somos are committed to developing innovative solutions that ensure that our ability to maintain trustworthy connections never stops.

Orchid Security

Orchid Security

Orchid Security provides unprecedented insight and action to your identity security with the help of advanced technologies like Large Language Models (LLM).