Close Menu
  • Home
  • Lifestyle
  • Tech
  • Travel
  • Review
  • About
  • Contact
What's Hot

Live the ‘One Piece’ adventure at your fave malls and beyond

April 30, 2026

VIKA Premium Activewear Debuts in the Philippines with “VIKA Her Game,”                             Igniting a New Era of Women’s Sportswear

April 30, 2026

Global Filipino Acts Join Electronic Music’s Major Forces In This Year’s &friends Festival

April 30, 2026
Facebook X (Twitter) Instagram
Manila Republic
  • Home
  • Lifestyle
  • Tech
  • Travel
  • Review
  • About
  • Contact
Manila Republic
Home»Tech»Automation in cybersecurity: salvation for companies or loophole for cybercriminals
Tech

Automation in cybersecurity: salvation for companies or loophole for cybercriminals

Team Manila RepublicBy Team Manila RepublicNovember 12, 2024No Comments4 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email

Sergey Soldatov, Head of Security Operations Center at Kaspersky

Cybersecurity providers are primarily research centers facing with threats and developing technologies for their detection and prevention. They constantly strive to offer the most effective and reliable threat management mechanisms. As the development of any cybersecurity solution is a resource investment and the nature of threats constantly changes, we see that attacks become more complex under the influence of technological advancements in threat management. This is leading us to a new wave of technological advancements in protective solutions.

Attack techniques and procedures are constantly evolving, and the more effectively they are fought against, the faster attack methods progress. Modern endpoint protection mechanisms are necessary to defend against modern threats, capable of resisting new attack tactics and techniques.

What is Endpoint Protection?

The endpoint protection represents modern platforms that combine a variety of technologies to manage threats. The detection logic of these solutions can be implemented in the endpoint or the cloud, and threats detection can be based on malicious objects (files, IP addresses, URLs, memory objects, operating system objects) or on behavioral characteristics.

Under endpoint protection we mean a system that can manage threats fully automatically. Endpoint Protection Platform (EPP) can do it if an attack can be effectively and successfully processed without human involvement. If the attack is more complex and sophisticated, it requires a specific set of technologies to be developed. There is no fundamental difference between modern EPP and “fully automatic EDR” because any task that can be solved completely automatically must be solved within the endpoint protection system.

Threat Intelligence also plays crucial role for high-quality threat detection because the more threat data we have, the broader our threat management capabilities. Furthermore, it’s impossible to develop protection technologies and conduct any threat research without the latest Threat Intelligence.

Automation of malicious software. How do cybersecurity companies combat this threat?

Cybersecurity vendors use various approaches to threat management, often combining detection based on malicious tools with behavioral analysis.

For any identified threat scenario “circular” detection is always used. It means that for the same attack technique multiple management approaches with various technologies, including threat analytics, are developed. This approach significantly reduces the likelihood of missing a threat. If an attack does occur on a host, telemetry from it will be transmitted to the cloud and processed using more advanced algorithms, and automatically created rules will protect others from similar threats.

Should neural networks be used in developing cybersecurity solutions?

A neural network is one of the implementations of machine learning. To train a model, a training set is needed on which the model will adjust its parameters and be able to apply the acquired “experience” on real data. However, it is important to remember that the future never exactly repeats the past, especially if the attacks are led by a person with their limitless improvisational and adaptive abilities.

One solution may be to separate attacks into techniques and procedures, and detect TTPs and their popular combinations. Machine learning, deep learning, and neural networks are tools for addressing threat management tasks. Machine learning is useful, but it is not a magic solution to all problems — it is one of the technological approaches in the arsenal of threat researchers developing threat management mechanisms.

Instead of a conclusion

All scenarios involving completely automated attacks will be automatically neutralized within EPP. In the long term, the focus will be shifted on automating threat management: databases of automatically classifiable techniques and procedures will be replenished, the range of technologies for effectively and efficiently preventing identified attacks in a fully automated manner will expand. However, due to the endless adaptability of attackers, the need for threat research and proactive threat hunting will not disappear, so the development of telemetry for the needs of SOC teams and threat researchers will also continue to remain a significant direction in the development of EPP providers.

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Team Manila Republic

    Related Posts

    Keeper Security Launches Agent Kit to Secure AI-Driven Developer Workflows

    April 30, 2026

    QEMU abused to evade detection and enable ransomware delivery

    April 29, 2026

    Ant International Launches Open-Sourced Agentic Mobile Protocol to Drive AI Commerce

    April 29, 2026
    Leave A Reply Cancel Reply

    Advertisement
    Top Posts

    Live the ‘One Piece’ adventure at your fave malls and beyond

    April 30, 2026

    VIKA Premium Activewear Debuts in the Philippines with “VIKA Her Game,”                             Igniting a New Era of Women’s Sportswear

    April 30, 2026

    Global Filipino Acts Join Electronic Music’s Major Forces In This Year’s &friends Festival

    April 30, 2026

    Indonesian-American songsmith lullaboy to return to the Philippines as part of nine-city Asia tour

    April 30, 2026

    McDonald’s Sulit-Busog Meals Go the Extra Mile, at No Extra Cost

    April 30, 2026
    Advertisement
    Don't Miss

    Live the ‘One Piece’ adventure at your fave malls and beyond

    GabrielApril 30, 2026

    The Great Pirate Era isn’t just streaming – it’s landing in real life. In the…

    VIKA Premium Activewear Debuts in the Philippines with “VIKA Her Game,”                             Igniting a New Era of Women’s Sportswear

    April 30, 2026

    Global Filipino Acts Join Electronic Music’s Major Forces In This Year’s &friends Festival

    April 30, 2026

    Indonesian-American songsmith lullaboy to return to the Philippines as part of nine-city Asia tour

    April 30, 2026
    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo
    © 2026 ThemeSphere. Designed by ThemeSphere.
    • Home
    • Lifestyle
    • Tech
    • Travel
    • Review
    • About
    • Contact

    Type above and press Enter to search. Press Esc to cancel.