NATO - AI Cyber Attacks Are A Critical Threat

Cyber attacks, both on national infrastructures and private companies, have ramped up exponentially and become a focal point since the start of the war in Ukraine and Artificial Intelligence (AI) is playing a massive role in cyber attacks and is proving both a “double-edged sword” and a “huge challenge,” according to NATO. 

“Artificial intelligence allows defenders to scan networks more automatically and fend off attacks rather than doing it manually. But the other way around, of course, it's the same game,” David van Weel, NATO’s Assistant Secretary-General for Emerging Security Challenges, speaking at a recent meeting in Estonia.

This is a pressing issue, since it is NATO's policy that a cyber attack on any of its member states could trigger Article 5, meaning an attack on one member is considered an attack on all of them and could trigger a collective response.

AI can be used to try and break into networks by using credentials and algorithms to crack systems and AI-based tools can be used to better detect and protect against threats. Conversely, cyber criminals can use the technology for more sporadic attacks that are harder to defend against because there are so many of them simultaneously. 

Just how to defend against AI -driven cyber attacks were being tested in Estonia’s capital Tallinn at the CR14 NATO Cyber Range. 

Last month, army commanders from over 30 countries (not all of them NATO members) descended on the cyber range to put their skills to the test on how they would defend their country while working with their allies.

Almost 150 personnel were on-site for the event, double the amount who made the journey in 2021 U.S. Cyber Command and U.S. European Command had over 50 people participating and the U.S. led air command and control in the exercise. Romania led on developing the storyline, the United Kingdom took control on the ground, and Poland was in charge of special operations forces.

The results were a closely guarded secret by NATO officials due to security and intelligence concerns, but it is understood that that no one failed the exercise. 

Euronews:    e-Estonia:     AOL:       Politico:      Flipboard:     Argonne:

You Might Also Read: 

Is Europe Ready For Cyber Warfare?:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

 


Cyber Security Intelligence: Captured Organised & Accessible



 

« Three Steps To Protect Your Organisation From Wiper Malware
Cyber Attack On Lisbon Port  »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

KPMG

KPMG

KPMG s a leading provider of professional services including information technology and cyber security consulting.

CERT.BY

CERT.BY

The National Computer Emergency Response Team of the Republic of Belarus.

Bayshore Networks

Bayshore Networks

Bayshore Networks was founded to safely and securely protect Industrial IoT (IIoT) networks, applications, machines and workers from cyber threats.

Disklabs

Disklabs

Disklabs are industry leaders in data recovery, digital forensics and data erasure.

High Sec Labs (HSL)

High Sec Labs (HSL)

High Sec Labs develops high-quality, cyber-defense solutions in the field of network and peripheral isolation.

Cyber Seguridad (Cyberseg)

Cyber Seguridad (Cyberseg)

Cyberseg provides specialized Cybersecurity services, including managed services (SOC / CERTs) and solutions for the protection of critical infrastructures.

Quadron  Cybersecurity Services

Quadron Cybersecurity Services

Quadron Cybersecurity Services is a specialist in digital security, data and system protection.

Global Lifecycle Solutions EMEA (Global EMEA)

Global Lifecycle Solutions EMEA (Global EMEA)

Global EMEA provides full lifecycle services to corporate Clients covering procurement, configuration, support, maintenance and end-of-life asset management.

CyberSwarm

CyberSwarm

CyberSwarm is developing a neuromorphic System-on-a-Chip dedicated to cybersecurity which helps organizations secure communication between connected devices and protect critical business assets.

Document Security Systems (DSS)

Document Security Systems (DSS)

DSS anti-counterfeit, authentication, and brand protection solutions are deployed to prevent attacks which threaten products, digital presence, financial instruments, and identification.

Electric Power Research Institute (EPRI)

Electric Power Research Institute (EPRI)

The Electric Power Research Institute’s Cyber Security Research Laboratory (CSRL) addresses the security issues of critical functions of electric utilities.

Cyber Security Cloud (CSC)

Cyber Security Cloud (CSC)

Cyber Security Cloud provides web application security services worldwide using world's leading cyber threat intelligence and AI technology.

Noblis

Noblis

Noblis is a dynamic science, technology, and strategy organization dedicated to creating forward-thinking technical and advisory solutions in the public interest.

Pratum

Pratum

Pratum is an information security services firm that helps clients solve challenges based on risk, not fear.

Data Defenders

Data Defenders

Data Defenders provide information security technology solutions that empower consumers, businesses and governments with safe and secure IT and cybersecurity infrastructures.

PingSafe

PingSafe

PingSafe is creating the next-generation cloud security platform powered by attackers' intelligence, providing coverage for vulnerabilities that traditional security solutions would otherwise overlook