NATO - AI Cyber Attacks Are A Critical Threat

Cyber attacks, both on national infrastructures and private companies, have ramped up exponentially and become a focal point since the start of the war in Ukraine and Artificial Intelligence (AI) is playing a massive role in cyber attacks and is proving both a “double-edged sword” and a “huge challenge,” according to NATO. 

“Artificial intelligence allows defenders to scan networks more automatically and fend off attacks rather than doing it manually. But the other way around, of course, it's the same game,” David van Weel, NATO’s Assistant Secretary-General for Emerging Security Challenges, speaking at a recent meeting in Estonia.

This is a pressing issue, since it is NATO's policy that a cyber attack on any of its member states could trigger Article 5, meaning an attack on one member is considered an attack on all of them and could trigger a collective response.

AI can be used to try and break into networks by using credentials and algorithms to crack systems and AI-based tools can be used to better detect and protect against threats. Conversely, cyber criminals can use the technology for more sporadic attacks that are harder to defend against because there are so many of them simultaneously. 

Just how to defend against AI -driven cyber attacks were being tested in Estonia’s capital Tallinn at the CR14 NATO Cyber Range. 

Last month, army commanders from over 30 countries (not all of them NATO members) descended on the cyber range to put their skills to the test on how they would defend their country while working with their allies.

Almost 150 personnel were on-site for the event, double the amount who made the journey in 2021 U.S. Cyber Command and U.S. European Command had over 50 people participating and the U.S. led air command and control in the exercise. Romania led on developing the storyline, the United Kingdom took control on the ground, and Poland was in charge of special operations forces.

The results were a closely guarded secret by NATO officials due to security and intelligence concerns, but it is understood that that no one failed the exercise. 

Euronews:    e-Estonia:     AOL:       Politico:      Flipboard:     Argonne:

You Might Also Read: 

Is Europe Ready For Cyber Warfare?:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

 


Cyber Security Intelligence: Captured Organised & Accessible



 

« Three Steps To Protect Your Organisation From Wiper Malware
Cyber Attack On Lisbon Port  »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Cyber8Lab

Cyber8Lab

Cyber8Lab provides cybersecurity training programmes simulating real world cybersecurity incidents such as web defacement, malware, phishing, digital forensics analysis and wireless intrusion.

Vector InfoTech

Vector InfoTech

Vector InfoTech is a leader in Industrial Security, Networks, IT and Telecommunications.

ECOS Technology

ECOS Technology

ECOS Technology specializes in the development and sale of IT solutions for high-security remote access as well as the management of certificates and smart cards.

LinkUp

LinkUp

LinkUp is a leading data-driven job search company. Every day we index millions of job openings directly from employer websites.

InnoValor

InnoValor

InnoValor realises value from digital innovation for organisations and government. We provide advisory services and develop innovative software solutions, based on our background in research.

Red Alert Labs

Red Alert Labs

Red Alert Labs is an IoT security provider. We created an independent security lab with a disruptive business offer to solve the technical and commercial challenges in IoT.

Cyber Command - Estonian Defence Forces

Cyber Command - Estonian Defence Forces

The main mission of the Cyber Command is to carry out operations in cyberspace in order to provide command support for Ministry of Defence’s area of responsibility.

SecZetta

SecZetta

SecZetta provides third-party identity risk solutions that are easy to use, and purpose built to help organizations execute risk-based identity access and lifecycle strategies.

Melius Cyber Security

Melius Cyber Security

Melius Cyber Security has developed a world-leading SaaS platform, Cyber Safe Plus, built around continuous assessment and improvement through vulnerability scanning and penetration testing

Inetum

Inetum

Inetum (formerly Gfi Informatique) is an agile IT services providing digital services and solutions, and a global group that helps companies and institutions to get the most out of digital flow.

Allied Telesis

Allied Telesis

Allied Telesis delivers the secure, flexible, and agile solutions needed to meet the expectations of any industry’s critical mission.

Entro Security

Entro Security

Entro is the first holistic secrets security platform that detects, safeguards, and enriches with context your secrets across code, vaults, chats, and platforms.

NETAND

NETAND

NETAND privileged access and identity management solutions will secure your business from cyber threats.

KBE Information Security

KBE Information Security

KBE is a global consulting firm, with offices in Toronto and Milan, which specializes in the area of IT and information security with over 20 years of experience.

Forensic IT

Forensic IT

Forensic IT is a specialised cyber security firm with expertise in Digital Forensics and Incident Response (DFIR).

Convergint

Convergint

Convergint is a service-based systems integrator working alongside a global network of partners and manufacturers to deliver a range of solutions including cybersecurity.