DELL unveils AI cybersecurity features

DELL has recently released the details on their newest cybersecurity and data storage options. These include several features that look promising in early detection of system penetration and helping prevent attacks.

These details tie well into the established debate around AI in both cybercrime and cybersecurity. The threat aspect is well understood, primarily focused around:

Target research

The more attackers know about potential victims, the better chance they have for a successful attack. Attackers use AI to identify victims, locate critical assets and assess vulnerabilities.

Personalization and customization

With LLMs, phishing messages can be personalized to better target particular people, as well as generating more relevant and timely messages to be used in social engineering or phishing efforts. Moreover, the generation by LLMs can sometimes bypass traditional spam filters.

Automation and Scaling

AI can automate not only the above tasks but also those an attacker must execute after successfully infecting a system. This means that criminals can greatly speed up and scale up their operations.

At the same time, the threats are balanced by machine learning in a defensive role. One of the best uses found so far, and one present in DELL’s newest release, is tracking behavior patterns and identifying out-of-pattern actions that can help reveal a hack. Timely intervention can help prevent damage from being done.

Besides prevention, recovery is next

As we have covered previously, one of the biggest steps that an organization can take to help preserve their systems is having a recovery plan and process in place. This involves concrete steps for, after an attack has occurred, repairing as much of the damage as you can – quickly and efficiently.

Step one for a successful recovery plan is and will remain having a well-implemented backup that allows you to roll back unwanted changes – whether those be accidental or malicious. The 3-2-1 backup rule (three copies of data, on two different media, with one copy off-site) is a widely recommended approach, providing much needed redundancy.

While DELL and other actors continue to advance the frontline of cybersecurity with better prevention and detection measures, it is important not to neglect the other side of the coin and keep your data protected and accessible, no matter what comes.

 

Your Data In Your Hands – With TECH-ARROW

by Matúš Koronthály