- Microsoft is launching new AI agents for cybersecurity
- Agents who work with co -drivers will then help automate the defense process
- Areas such as data security, identity management and phishing could obtain an impulse
Microsoft is launching new backup agents to help ensure organizations with end -to -end security platforms from end to end.
The company says that its new agents are designed to “help autonomously with critical areas” such as data security, identity management and phishing.
When working with some of the world’s main software companies, Microsoft expects to offer “game change” protections and help customers “climb, increase and increase the effectiveness of their privacy operations” to help organizations navigate the scenario of threats and the increasingly complex regulatory requirements.
Core problems
Microsoft’s global security chief, Vasu Jakkal, spoke with Techradar ProTo discuss the way IA is changing the cyber panorama, and how new initiatives will help defenders use AI for their advantage.
Jakkal pointed out how AI is overapping the volume of cyber attacks and reducing barriers for access to malicious campaigns, overwhelming security equipment that often do not have access to first level tools and depend on manual processes and ‘fragmented defenses’.
“Therefore, observe these three central problems, the landscape of threats, the operational complexity and the safety of the data, there is no way that humans can climb to keep up with these challenges. In fact, we do not have the human talent in security at this time,” he warns.
To help security equipment to try to navigate this, Microsoft is presenting 11 new co -pilot agents.
Six of these agents will be available on the end -to -end security platform of Microsoft, and are designed to help with the protection of threats, data safety, device management, identity and access, and threat intelligence.
The last launches come along with the launch of Microsoft of five new agent solutions to help boost security teams around the world.
These include an agent for the violation response of Onetrust, an Aviatrx’s network supervisor agent, an Bluevoyant Secops tool tool agent, a Tanium alert triage agent, as well as an optimizing agent of Fletch tasks.
A friendly hand
So that the equipment can keep up with the panorama that evolves rapidly, the backup agents will allow the equipment to manage the high volume safety and IT tasks, and will work without problems together with the existing Microsoft security tools.
Microsoft’s intelligence now processes 84 billion signals per day, revealing the exponential growth of cyber attacks, including 7,000 password attacks per second.
Although you can never completely eliminate the risk of human error, these new tools will seem to be an “other pair of eyes and hand pairs” to help verify two things to reduce the risk factor, explains Jakkal.
“Last year, in a year, we saw 30 billion emails from Phishing. That is a lot. And this volume simply cannot follow the rhythm, humans cannot draw them. Therefore, the Phishing agent can now transmit these emails and alerts, and he can tell him that, he hears, this is a false alarm and this is a true alert, so it reduces that volume.”
The advantage
Jakkal, like many others, describes cybersecurity as a game of cats and mice between cybercriminals and security equipment.
At this time, AI is the attacker’s choice tool and allows a monumental number of intrusions, but the more attacks they are leveraged, the more defenders they can learn.
“Microsoft processes 84 billion signals every day. That intelligence signal is difficult for humans to work through that and scan, but guess what tool it really works well with the data? AI.”
In order for security equipment to win the advantage, defenders must adopt AI, Jakkal argues, since the scarcity of the gap and talent skills is retaining the industry and cyber security equipment, “they simply do not have enough defenders in the world”, so it must look at AI to keep up with demand.
The flood of attacks can not change soon either. Cyber attacks continue to be a profitable effort, and cybercrime is even helping to finance rebel nations worldwide, and with the increase in geopolitical tensions, cyber security equipment must be more alert than ever.
“The attacks are occurring everywhere and because ransomware is a very lucrative industry and, in fact, the global cybernetic crime costs us 9.2 billion dollars, US dollars a year,” concludes Jakkal.
“Therefore, as long as there are money in it, we will see attacks and it can be even worse for a small and medium business because they do not have the staff to address these problems.”