{"title":"Adding AI to NDR in the face of current threats","authors":"Jacques de la Rivière","doi":"10.12968/s1361-3723(23)70043-2","DOIUrl":null,"url":null,"abstract":"Threat actors exhibit highly agile behaviour, capable of evolving and adapting as new vulnerabilities become evident. Most organisations, however, don't have the same kind of flexibility and are constantly fighting last year's battles. Network detection and response (NDR) solutions have arisen to tackle this problem, and now with the added power of artificial intelligence they have the potential to give organisations the ability to react and respond quickly to new threats.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"28 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computer Fraud and Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.12968/s1361-3723(23)70043-2","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"Social Sciences","Score":null,"Total":0}
引用次数: 0
Abstract
Threat actors exhibit highly agile behaviour, capable of evolving and adapting as new vulnerabilities become evident. Most organisations, however, don't have the same kind of flexibility and are constantly fighting last year's battles. Network detection and response (NDR) solutions have arisen to tackle this problem, and now with the added power of artificial intelligence they have the potential to give organisations the ability to react and respond quickly to new threats.
期刊介绍:
Computer Fraud & Security has grown with the fast-moving information technology industry and has earned a reputation for editorial excellence with IT security practitioners around the world. Every month Computer Fraud & Security enables you to see the threats to your IT systems before they become a problem. It focuses on providing practical, usable information to effectively manage and control computer and information security within commercial organizations.