Across over 25,000 cloud services, each enterprise generates more than three billion events per month, including uploads, logins, shares, edits, etc. About 21 percent of the files in the cloud contain sensitive data.
On average, an enterprise experiences 12.2 incidents of stolen account credentials stored in the cloud, per month.
Cisco’s 2018 Annual Cybersecurity Report examined trends and patterns in data theft, data loss, and other issues. The report revealed that 32% of security leaders are completely dependent on artificial intelligence  (AI) to protect their sensitive corporate information.
There is no doubt of how beneficial cloud and AI platforms are to businesses. In fact, their benefits go beyond businesses alone, with personal users backing up emails and other personal information in the cloud. However, the dependence on these platforms opens the data to a number of vulnerabilities.
A recent report, The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and Mitigation, indicates that cybercriminals are increasingly using AI for their own immoral gain. Also, several major data breaches have occurred over the years.
There seems to be a race now, between cybercriminals and enterprises, to make the better use of AI and cloud platforms — the former seeks to exploit these platforms while the latter tries to protect everything from business management to network endpoints.
Security challenges with cloud and AI services
Cloud and AI platforms have helped enterprises of all sizes achieve data efficiency. These innovations have not only increased their operational efficiency, but also have cut down their information technology (IT) costs significantly. From helping organisations deliver faster, better, and cost-efficient results, to effectively managing their results, cloud services and AI have been a boon for enterprises.
However, with any boon comes challenges. Among AI applications in cybersecurity, the arrival of Bots or intelligent assistants to improve the accuracy and speed of data analysis is welcomed. As

View Entire Article on ComparetheCloud.com