The future of cyber security

Experts talk killer robots and reform - but first we need to get over encryption

IP Expo hosted a panel today on the future of cyber security, where the panelists talked about what they expected the future to hold for the industry.

The chair of the session, Wendy Nather, principal security analyst at Duo, talked about how the industry needs to change. She said: "We've been doing a lot of the same things for the last twenty or thirty years: for example, telling people to patch and they will be fine - which has worked really well so far."

Advertisement - Article continues below

Nather added: "For the last several decades, we have been writing these programmes for one another as technologists in a small community, thinking the same way, and the interfaces that we insisted were intuitively obvious were only intuitive if you thought the same way as the people who wrote it. But now the rest of the world is using this technology - it's not just enterprises, it's not just IT people, it's everybody."

Rik Ferguson, global vice-president of security research at Trend Micro, had a dark warning about the future of AI and weaponry.

"One of the things that I find particularly scary is the fact that we have a petition in front of the United Nations from 120 leading academics and scientists to outlaw autonomous weaponry," he said. "Weaponry that can select its own targets and engage with no human interaction. So, we are already in Skynet."

Advertisement
Advertisement - Article continues below

Ferguson added: "I have absolutely no doubt that attackers will begin using AI and machine learning to build autonomous attack machines."

Advertisement - Article continues below

He is also alarmed that AI platforms are open and easy to use, which he said is great for business but he is worried criminals will take advantage of it and "are ready to seize those innovation platforms".

Mikko Hypponen, CRO at F-Secure, agreed: "It's so clear that these autonomous killer robots will become a reality when you think it through."

Hypponen used drones as an example, stating that humans currently pilot them. The obvious weakness is that there is a link between the drone and human which can be cut, disrupted and interfered with.

"If you want to remove that possibility, it's obvious, you let the drone do its work without the human," said Hyponnen. "This is going to happen, and it's scary as hell."

James Lyne, global security advisor at Sophos, said that new and emerging technologies, such as a fleet of interconnected autonomous vehicles, gives the opportunity for attackers, especially terrorists, to attack beyond the scale they have today.

Advertisement - Article continues below

He also highlighted how current problems need to be overcome now in order to progress: "We are on a path to do that in the world of legitimate tech, for what we think are legitimate reasons, while we are still trying to fight over freedom to and freedom from law enforcement over encryption."

Image source: Zach Marzouk

Featured Resources

Navigating the new normal: A fast guide to remote working

A smooth transition will support operations for years to come

Download now

Putting a spotlight on cyber security

An examination of the current cyber security landscape

Download now

The economics of infrastructure scalability

Find the most cost-effective and least risky way to scale

Download now

IT operations overload hinders digital transformation

Clearing the path towards a modernised system of agreement

Download now
Advertisement

Recommended

Visit/security/ransomware/356292/university-of-california-gets-fleeced-by-hackers-for-114-million
ransomware

University of California gets fleeced by hackers for $1.14 million

30 Jun 2020
Visit/security/cyber-security/356289/australia-announces-135b-investment-in-cybersecurity
cyber security

Australia announces $1.35 billion investment in cyber security

30 Jun 2020
Visit/cloud/cloud-security/356288/csa-and-issa-form-cybersecurity-partnership
cloud security

CSA and ISSA form cyber security partnership

30 Jun 2020
Visit/business/policy-legislation/356215/senators-propose-a-bill-aimed-at-ending-warrant-proof-encryption
Policy & legislation

Senators propose a bill aimed at ending warrant-proof encryption

24 Jun 2020

Most Popular

Visit/laptops/29190/how-to-find-ram-speed-size-and-type
Laptops

How to find RAM speed, size and type

24 Jun 2020
Visit/business/policy-legislation/356256/uk-invested-about-ps500m-in-wrong-gps-satellites
Policy & legislation

UK gov buys "wrong" satellites in £500m blunder

29 Jun 2020
Visit/security/34616/the-top-password-cracking-techniques-used-by-hackers
Security

The top 12 password-cracking techniques used by hackers

12 Jun 2020