Blocks advanced persistent threats and let the authorities as questions later... Like a Boomerang!
With all of the brilliant cyber security engineers posting tips on social media today, why can't we create a project to block advanced persistent threats and let the authorities as questions later?
After reading the news of the latest breach, it’s time to build artificial intelligence (AI) to detect, analyze, hunt, and remediate today's and tomorrow's threats.
Creating a public database library of these unique digital signatures designed for AI use by all security teams for rapid detection and digital recognition.
Feed the matching data into a library of famous cyber-heist actors to quickly identify the most likely threats.
Team this with the latest digital geo-spacial-engineering to trace routing intel to improve detection, counter-measures, with proactive defense posture.
Once the solution set is reviewed and approved, Robotic Process Automation - RPA to execute counter-measures going forward.
Combines Cognitive Threat Analytics - CTA meets Next Generation Treat Detection and Response - XDR, and Robotic Process Automation - RPA
Ponemon 2017 Avg. Cost of Data Breach Study (06/2017): $3.62 million. The mean time to identify (MTTI) was 191 days, with a range of 24 to 546 days. The mean time to contain (MTTC) was 66 days with a range of 10 to 164 days and 60% of data breaches are attributed to passwords, un-secure email, and insider employee data compromises.
Operational savings using Robotic Process Automation - RPA by reducing the amount of human intervention necessary to efficiently execute the counter-measures.
Use Cases for Critical-Infrastructures Sectors:
Banking and Financial
Defense Industrial Base