NATO - AI Cyber Attacks Are A Critical Threat

Cyber attacks, both on national infrastructures and private companies, have ramped up exponentially and become a focal point since the start of the war in Ukraine and Artificial Intelligence (AI) is playing a massive role in cyber attacks and is proving both a “double-edged sword” and a “huge challenge,” according to NATO. 

“Artificial intelligence allows defenders to scan networks more automatically and fend off attacks rather than doing it manually. But the other way around, of course, it's the same game,” David van Weel, NATO’s Assistant Secretary-General for Emerging Security Challenges, speaking at a recent meeting in Estonia.

This is a pressing issue, since it is NATO's policy that a cyber attack on any of its member states could trigger Article 5, meaning an attack on one member is considered an attack on all of them and could trigger a collective response.

AI can be used to try and break into networks by using credentials and algorithms to crack systems and AI-based tools can be used to better detect and protect against threats. Conversely, cyber criminals can use the technology for more sporadic attacks that are harder to defend against because there are so many of them simultaneously. 

Just how to defend against AI -driven cyber attacks were being tested in Estonia’s capital Tallinn at the CR14 NATO Cyber Range. 

Last month, army commanders from over 30 countries (not all of them NATO members) descended on the cyber range to put their skills to the test on how they would defend their country while working with their allies.

Almost 150 personnel were on-site for the event, double the amount who made the journey in 2021 U.S. Cyber Command and U.S. European Command had over 50 people participating and the U.S. led air command and control in the exercise. Romania led on developing the storyline, the United Kingdom took control on the ground, and Poland was in charge of special operations forces.

The results were a closely guarded secret by NATO officials due to security and intelligence concerns, but it is understood that that no one failed the exercise. 

Euronews:    e-Estonia:     AOL:       Politico:      Flipboard:     Argonne:

You Might Also Read: 

Is Europe Ready For Cyber Warfare?:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

 


Cyber Security Intelligence: Captured Organised & Accessible



 

« Three Steps To Protect Your Organisation From Wiper Malware
Cyber Attack On Lisbon Port  »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Daon

Daon

Daon offers a universal biometric authentication platform for mobile devices.

CLUSIF

CLUSIF

Clusif is the reference association for digital security in France. Its mission is to promote the exchange of ideas and feedback through working groups, conferences and publications.

FinlayJames

FinlayJames

FinlayJames supports cyber security companies to meet the increasing demand and pressure on them by finding top talent within the industry for their sales, marketing and technical teams.

Bavarian IT Security Cluster

Bavarian IT Security Cluster

The Bavarian IT Security Cluster works to build regional IT security competencies and increase the competitiveness and market opportunities of its member companies.

Hypersecu Information Systems

Hypersecu Information Systems

Hypersecu Information Systems, Inc. is a solution provider dedicated to multi-factor authentication, public key infrastructure and software copyright protection.

Center for Analysis & Investigation of Cyber-Attacks (CAICA)

Center for Analysis & Investigation of Cyber-Attacks (CAICA)

The Center for Analysis & Investigation of Cyber-Attacks is one of the leading Kazakhstan organisations in the field of information and computer security.

TechCERT

TechCERT

TechCERT is Sri Lanka’s first and largest Computer Emergency Readiness Team (CERT).

LuJam Cyber

LuJam Cyber

LuJam Cyber is a cybersecurity company that provides protection to SME Networks.

Elevate Security

Elevate Security

Elevate is the leading Security Behavior Platform, changing employee security habits while giving security teams unprecedented visibility.

Cyturus Technologies

Cyturus Technologies

Cyturus Technologies delivers cybersecurity business risk quantification services using our proprietary Adaptive Risk Model (ARM).

Nardello & Co

Nardello & Co

Nardello & Co. is a global investigations firm with experienced professionals handling a broad range of issues including Digital Investigations & Cybersecurity.

KirkpatrickPrice

KirkpatrickPrice

KirkpatrickPrice is dedicated to providing you with innovative security guidance and efficient audit services.

Alethea

Alethea

Alethea is a technology company helping companies, nonprofits, and democracies protect themselves from harms stemming from disinformation and social media manipulation.

Turngate

Turngate

Turngate simplify security investigations so you can see employee activities and entitlements in your enterprise in seconds.

Acumen

Acumen

Acumen's cyber security engineers protect your critical systems, in critical moments. We are here when you need us most.

Benchmark Executive Search

Benchmark Executive Search

Benchmark specializes in finding elite talent for startup, emerging-growth and mid-cap companies offering game-changing technologies or innovative services to the federal and commercial markets.