Archive for the ‘Machine Learning’ Category

How the State Department used AI and machine learning to revolutionize records management – FedScoop

In the digital age, government agencies are grappling with unprecedented volumes of data, presenting challenges in effectively managing, accessing and declassifying information.

The State Department is no exception. According to Eric Stein, deputy assistant secretary for the Office of Global Information Services, the departments eRecords archive system currently contains more than 4 billion artifacts, which includes emails and cable traffic. The latter is how we communicate to and from our embassies overseas, Stein said.

Over time, however, department officials need to declare what can be released to the public and what stays classified a time-consuming and labor-intensive process.

The State Department has turned to cutting-edge technologies like artificial intelligence (AI) and machine learning (ML) to find a more efficient solution. Through three pilot projects, the department has successfully streamlined the document review process for declassification and improved the customer experience when it comes to FOIA (Freedom of Information Act) requests.

An ML-driven declassification effort

At the root of the challenge is Executive Order 13526, which requires that classified records of permanent historical value be automatically declassified after 25 years unless a review determines an exemption. For the State Department, cables are among the most historically significant records produced by the agency. However, current processes and resource levels will not work for reviewing electronic records, including classified emails, created in the early 2000s and beyond, jeopardizing declassification reviews starting in 2025.

Recognizing the need for a more efficient process, the department embarked on a declassification review pilot using ML in October 2022. Stein came up with the pilot idea after participating in an AI Federal Leadership Program supported by major cloud providers, including Microsoft.

For the pilot, the department used cables from 1997 and created a review model based on human decisions from 2020 and 2021 concerning cables marked as confidential and secret in 1995 and 1996. The model uses discriminative AI to score and sort cables into three categories: those it was confident should be declassified, those it was confident shouldnt be declassified, and those that needed manual review.

According to Stein, for the 1997 pilot group of more than 78,000 cables, the model performed the same as human reviewers 97% to 99% of the time and reduced staff hours by at least 60%.

We project [this technology] will lead to millions of dollars in cost avoidance over the next several years because instead of asking for more money for human resources or different tools to help with this, we can use this technology, Stein explained. And then we can focus our human resources on the higher-level and analytical thinking and some of the tougher decisions, as opposed to what was a very manual process.

Turning attention to FOIA

Building on the success of the declassification initiative, the State Department embarked on two other pilots to enhance the Freedom of Information Act (FOIA) processes from June 2023 to February 2024.

Like cable declassification efforts, handling a FOIA request is a highly manual process. According to Stein, sometimes those requests are a single sentence; others are multiple pages. But no matter the length, a staff member must acknowledge the request, advise whether the department will proceed with it, and then manually search for terms in those requests in different databases to locate the relevant information.

Using the lessons learned from the declassification pilot, Stein said State Department staff realized there was an opportunity to streamline certain parts of the FOIA process by simultaneously searching what was already in the departments public reading room and in the record holdings.

If that information is already publicly available, we can let the requester know right away, Stein said. And if not, if there are similar searches and reviews that have already been conducted by the agency, we can leverage those existing searches, which would result in a significant savings of staff hours and response time.

Beyond internal operations, the State Department also sought to improve the customer experience for FOIA requesters by modernizing its public-facing website and search functionalities. Using AI-driven search algorithms and automated request processing, the department aims to find and direct a customer to existing released documents and automate customer engagement early in the request process.

Lessons learned

Since launching the first pilot in 2022, team members have learned several things. The first is to start small and provide the space and time to become familiar with the technology. There are always demands and more work to be done, but to have the time to focus and learn is important, Stein said.

Another lesson is the importance of collaboration. Its been helpful to talk across different communities to not only understand how this technology is beneficial but also what concerns are popping upand discussing those sooner than later, he said. The sooner that anyone can start spending some time thinking about AI and machine learning critically, the better.

Another lesson is to recognize the need to continuously train a model because you cant just do this once and then let it go. You have to constantly be reviewing how were training the model (in light of) world events and different things, he said.

These pilots have also shown how this technology will allow State Department staff to better respond to other needs, including FOIA requests. For example, someone may ask for something in a certain way, but thats not how its talked about internally.

This technology allows us to say, Well, they asked for this, but they may have also meant that, Stein said. So, it allows us to make those connections, which may have been missing in the past.

The State Departments strategic adoption of AI and ML technologies in records management and transparency initiatives underscores the transformative potential of these tools. By starting small, fostering collaboration and prioritizing user-centric design, the department has paved the way for broader applications of AI and ML to support more efficient and transparent government operations.

The report was produced by Scoop News Group for FedScoop, as part of aseries on innovation in government, underwritten byMicrosoft Federal.To learn more about AI for government from Microsoft,sign up hereto receive news and updates on how advanced AI can empower your organization.

See original here:
How the State Department used AI and machine learning to revolutionize records management - FedScoop

Characterization of PANoptosis-related genes in Crohn’s disease by integrated bioinformatics, machine learning and … – Nature.com

GEO dataset integration and immune landscape of CD

We constructed a combined dataset covering 279 CD samples and 224 control samples from mucosa after the removal of batch effects (Fig.2A,B). A broadly uncoordinated immune response is an indispensable hallmark of CD. With the aim of revealing the immune landscape, we scored the immune cell infiltration of CD patients and controls via the ssGSEA method. As illustrated in Fig.2C, the infiltration of 20 immune cells in the CD group and control group was significantly different, among which only the scores of T helper 17 (Th17) cells were lower in CD tissues than in control tissues. We then performed a correlation analysis of distinct immune cells, as shown in Fig.2D. Interestingly, Th17 cells, CD56bright natural killer (NK) cells, CD56dim NK cells and monocytes showed inverse correlations with almost all other immune cells, whereas the other immune cells were generally positively correlated with one another, which deserves special attention.

GEO dataset combination and immune landscape of CD. (A) PCA between datasets before removal of batch effects. (B) PCA between integrated datasets after removal of batch effects. (C) Infiltration levels of 28 immune cell subtypes in CD samples and controls. The blue bars represent controls, and the red bars represent CD samples. *p<0.05; **p<0.01; ***p<0.001; ****p<0.0001. (D) Pearson correlation analysis of distinct immune cells. The purple squares represent positive correlations, and the orange squares represent inverse correlations. GEO Gene Expression Omnibus, CD Crohns disease, PCA principal component analysis.

A total of 1265 DEGs, consisting of 592 upregulated and 673 downregulated genes, were identified through differential expression analysis (Fig.3A). A list of possible PRGs was produced from previous research (Supplementary file 1: Table S1). Subsequently, we intersected the 1265 DEGs with 930 PRGs via a Venn diagram; thus, 130 DE-PRGs were identified (Fig.3B), which were further grouped in a heatmap (Fig.3C). The overall expression of these DE-PRGs in the CD group and control group is shown in Supplementary file 3: Fig. S1. We could conclude that the vast majority of DE-PRGs were expressed at higher levels in CD tissues than in control tissues.

Identification of DE-PRGs. (A) Volcano map of the DEGs with the cutoff threshold set at |log2 (fold change)|>1 and adj. p<0.05. The blue dots represent downregulated DEGs, the red dots represent upregulated DEGs, and the gray dots represent genes with no significant difference. (B) Venn diagram of DEGs and PRGs. Pink circle represents DEGs, blue circle represents PRGs, and their overlapping area represents DE-PRGs. (C) Clustered heatmap of the top 40 DE-PRGs. Each row represents one of the top 40 DE-PRGs, and each column represents one sample, either CD or normal. DE-PRGs differentially expressed PANoptosis-related genes, DEGs differentially expressed genes, PRGs PANoptosis-related genes, CD Crohns disease.

We then examined the latent functions and signaling pathways of the DE-PRGs. GO analysis revealed that these DE-PRGs were predominantly involved in regulation of apoptotic signaling pathway, leukocyte cellcell adhesion, regulation of inflammatory response (biological process); membrane raft, membrane microdomain, focal adhesion (cellular component); ubiquitin-like protein ligase binding, ubiquitin protein ligase binding, and phosphatase binding (molecular function) (Supplementary file 4: Fig. S2A). Additionally, DE-PRGs were notably enriched in apoptosis, proteoglycans in cancer, NOD-like receptor signaling pathway, among others, according to the KEGG results (Supplementary file 4: Fig. S2B). Moreover, a PPI network analysis of the DE-PRGs was performed and a complex network of the DE-PRGs was constructed (Supplementary file 5: Fig. S3).

To screen the hub DE-PRGs, we first capitalized on three algorithms, LASSO, SVM and RF, and discovered 20, 34 and 33 potential hub DE-PRGs, respectively (Fig.4AE). Afterward, 10 hub DE-PRGs were identified through the intersection of the machine learning results, namely CD44, cell death inducing DFFA like effector c (CIDEC), N-myc downstream regulated 1 (NDRG1), nuclear mitotic apparatus protein 1 (NUMA1), proliferation and apoptosis adaptor protein 15 (PEA15), recombination activating 1 (RAG1), S100 calcium binding protein A8 (S100A8), S100 calcium binding protein A9 (S100A9), TIMP metallopeptidase inhibitor 1 (TIMP1) and X-box binding protein 1 (XBP1) (Fig.4F). Next, we probed their interactions, as shown in Fig.4G. Most hub DE-PRGs, such as CD44, PEA15, S100A8, S100A9, TIMP1 and XBP1, were closely interrelated. Moreover, NDRG1, NUMA1 and RAG1 generally presented antagonistic effects on the other hub DE-PRGs. Finally, the diagnostic value of each hub DE-PRG in predicting CD was calculated based on our combined dataset (Fig.4H). All 10 hub DE-PRGs exhibited outstanding predictive performance with area under the curve (AUC) values greater than 0.740. Notably, the AUC reached as high as 0.871 when the 10 hub DE-PRGs were combined (Fig.4H). In addition, we conducted external validation on the GSE102133 and GSE207022 datasets, respectively. The results were satisfactory, with high AUC values (Supplementary file 6: Fig. S4).

Identification of the hub DE-PRGs. (A) Cross-validations of adjusted parameter selection in the LASSO model. Each curve corresponds to one gene. (B) LASSO coefficient analysis. Vertical dashed lines are plotted at the best lambda. (C) SVM algorithm for hub gene selection. (D) Relationship between the number of random forest trees and error rates. (E) Ranking of the relative importance of genes. (F) Venn diagram showing the 10 hub DE-PRGs identified by LASSO, SVM and RF. Pink circle represents potential hub DE-PRGs identified by RF, blue circle represents potential hub DE-PRGs identified by SVM, green circle represents potential hub DE-PRGs identified by LASSO, and their overlapping area represents the final hub DE-PRGs. (G) Chord diagram showing the correlations between the hub DE-PRGs. Red represents positive correlations between different genes and green represents negative correlations between different genes. (H) ROC curves of the hub DE-PRGs in CD diagnosis. DE-PRGs differentially expressed PANoptosis-related genes, LASSO least absolute shrinkage and selection operator, RF random forest, SVM support vector machine, ROC receiver operating characteristic, AUC area under the curve, CD Crohns disease.

Spearman correlation analysis was carried out to determine the interactions between the hub DE-PRGs and immune cells (Fig.5). CD44, PEA15, S100A8, S100A9, TIMP1 and XBP1 demonstrated noteworthy positive correlations with the infiltration of an abundance of immune cells, except for certain immune cells, such as monocytes and CD56bright NK cells. In contrast, NDRG1, NUMA1, and RAG1 were negatively associated with most types of immune cells, excluding a few immune cells such as monocytes. In addition, the CIDEC fell somewhere between these two extremes.

Spearman correlation analysis of hub DE-PRGs with immune cells. The correlations between CD44 (A), CIDEC (B), NDRG1 (C), NUMA1 (D), PEA15 (E), RAG1 (F), S100A8 (G), S100A9 (H), TIMP1 (I) and XBP1 (J) gene expressions with immune cells, respectively. The size of the dots represents the strength of gene correlation with immune cells; the larger the dot, the stronger the correlation. The color of the dots represents the p-value; the greener the color, the lower the p-value. p<0.05 was considered statistically significant. DE-PRGs differentially expressed PANoptosis-related genes.

The top 30 crucial genes related to CD were extracted from the GeneCards database, and their expression levels were compared between CD samples and normal samples (Fig.6A). We could easily conclude that a majority of the CD-related genes (26 out of 30) were differentially expressed, especially COL1A1, CTLA4, IL10 and NOD2. Pearson correlation analysis was subsequently conducted to scrutinize the relationships between these CD-related genes and the hub DE-PRGs (Fig.6B). Notably, CTLA4, one of the most differentially expressed CD-related genes, was significantly associated with each hub DE-PRG. COL1A1, IL10 and NOD2 also presented varying levels of correlation with the hub DE-PRGs. Nevertheless, there were no significant correlations between the hub DE-PRGs and some CD-related genes, including CYBB, IL10RA, RET and VCP.

Expression levels of the top 30 CD-related genes and relationships between them and hub DE-PRGs. (A) Boxplot of the top 30 crucial genes in relation to CD. The blue bars represent controls, and the red bars represent CD samples. (B) Pearson correlation analysis between the top 30 CD-related genes and the 10 hub DE-PRGs. *p<0.05; **p<0.01; ***p<0.001. CD Crohns disease, DE-PRGs differentially expressed PANoptosis-related genes.

Subsequently, a genemiRNA interaction network of the 10 hub DE-PRGs consisting of 226 nodes and 338 edges was constructed (Supplementary file 7: Fig. S5 and Supplementary file 8: Table S3). Apparently, miR-124-3p, miR-34a-5p and miR-27a-3p were most strongly associated with the hub DE-PRGs in CD. After that, we generated a geneTF regulatory network of the 10 hub DE-PRGs (Supplementary file 9: Fig. S6). The 10 hub DE-PRGs were regulated by 35 total TFs. Among them, FOXC1 was found to regulate as many as 7 hub DE-PRGs and S100A8 was regulated by 13 miRNAs (Supplementary file 10: Table S4). In addition, we looked for available drugs that act on the hub DE-PRGs, and a host of drugs were involved (Supplementary file 11: Fig. S7 and Supplementary file 12: Table S5). Specifically, a total of 19 drugs interacted with XBP1, 8 of which inhibited it.

To distinguish different PANoptosis patterns in CD patients, we adopted the NMF method for unsupervised clustering on the basis of the 10 hub DE-PRGs. At k=2, the most stable and optimal PANclusters were identified (Fig.7A). There were 101 and 178 CD samples in PANcluster A and PANcluster B, respectively. The geometrical distance between the two clusters is shown in Fig.7B, validating their gene expression heterogeneity. Thereafter, a boxplot and a heatmap were generated to compare the expression levels of the hub DE-PRGs between PANcluster A and PANcluster B (Fig.7C,D). Specifically, PANcluster A was distinguished by the considerably high expression levels of CIDEC, NDRG1, NUMA1 and RAG1, while the other hub DE-PRGs, that is, CD44, PEA15, S100A8, S100A9, TIMP1 and XBP1, were expressed at higher levels in PANcluster B.

Recognition of PANclusters in CD. (A) Unsupervised clustering matrix generated using NMF method when k=2. (B) PCA plot showing the distribution of PANcluster A and PANcluster B. The red dots represent PANcluster A and the blue dots represent PANcluster B. (C) Boxplot of the expression levels of the hub DE-PRGs in PANcluster A and PANcluster B. The red bars represent PANcluster A, and the blue bars represent PANcluster B. (D) Heatmap of the expression levels of the hub DE-PRGs in PANcluster A and PANcluster B. Each row represents one hub DE-PRG, and each column represents one CD sample. PANclusters PANoptosis patterns, CD Crohns disease, NMF nonnegative matrix factorization, PCA principal component analysis, DE-PRGs differentially expressed PANoptosis-related genes.

GSVA was performed with the aim of shedding light on the functional diversity patterns of the recognized PANclusters. With regard to Hallmark pathways, increased activity of p53 pathway, androgen response and hypoxia were detected in PANcluster A, whereas mTORC1 signaling, inflammatory response, TNF- signaling via NF-B, IL-6/JAK/STAT3 signaling and epithelial mesenchymal transition were increased in PANcluster B (Supplementary file 13: Fig. S8A). In addition, results from the KEGG analysis suggested that PANcluster A had hypoactive ECMreceptor interaction and endocytosis but expressed high levels of genes associated with cytokinecytokine receptor interaction and numerous signaling pathways, including toll-like receptor signaling pathway and NOD-like receptor signaling pathway (Supplementary file 13: Fig. S8B). Concerning the Reactome-based pathways, PANcluster A showed an increase in the cell cycle pathway, while most pathways, such as cytokine signaling in immune system and extracellular matrix-related pathways, were significantly enriched in PANcluster B (Supplementary file 13: Fig. S8C).

To clarify the disparities in the immune system among the PANclusters, we compared their immune microenvironments, as shown in Fig.8A. Remarkably, the enrichment scores of 26 immune cells were much greater in PANcluster B than in PANcluster A. Consequently, CD56bright NK cells and monocytes were the only two exceptions with higher infiltration degrees in PANcluster A, the explanations behind which demand further investigation. In addition, differential gene analysis revealed 533 DEGs, including 171 upregulated and 362 downregulated genes (Fig.8B). To learn more about the biological functions and processes linked to these DEGs, GO and KEGG analyses were performed. The 533 DEGs were markedly enriched in the following terms: positive regulation of cell adhesion, leukocyte cellcell adhesion, and extracellular matrix organization (biological process); collagen-containing extracellular matrix, secretory granule membrane, and basement membrane (cellular component); and extracellular matrix structural constituent, glycosaminoglycan binding, and integrin binding (molecular function) (Fig.8C,D). Moreover, the 533 DEGs were principally involved in many pathways, such as cell adhesion molecules, ECMreceptor interaction and PI3K-Akt signaling pathway (Fig.8E).

Characterization of different PANclusters. (A) Infiltration levels of 28 immune cell subtypes in PANclusters A and B. The red bars represent PANcluster A, and the blue bars represent PANcluster B. (B) Volcano map of DEGs between PANclusters A and B. The blue dots represent downregulated DEGs, the red dots represent upregulated DEGs, and the gray dots represent genes with no significant difference. (C,D) Enriched items in GO analysis based on the DEGs between PANclusters A and B. (E) Enriched items in KEGG analysis based on the DEGs between PANclusters A and B. Node color indicates gene expression level; quadrilateral color indicates z-score. PANclusters PANoptosis patterns, DEGs differentially expressed genes, BP biological process, CC cellular component, MF molecular function, GO Gene Ontology, KEGG Kyoto Encyclopedia of Genes and Genomes.

CD and control samples were acquired from 10 patients who were diagnosed with CD, and their demographic and clinical information is presented in Table 1. qRT-PCR was subsequently conducted to determine the relative expression levels of the 10 hub DE-PRGs (Fig.9A). As expected, the levels of CD44, PEA15, S100A8, S100A9, TIMP1 and XBP1 increased in CD samples compared with those in control samples; while the opposite trend was observed for NDRG1. Moreover, there was no significant difference in the mRNA expression levels of CIDEC, NUMA1 or RAG1. Furthermore, we established classic TNBS and DSS mouse models of CD and collected colon tissues to analyze the expression levels of the hub DE-PRGs in murine colon tissues from the TNBS, DSS and control groups (Fig.9B,C). Generally, the results of the TNBS model were in line with expectations. Specifically, in TNBS-induced colitis, Cd44, Numa1, S100a8, S100a9, Timp1 and Xbp1 were more highly expressed, while Cidec and Rag1 were less expressed. In addition, the levels of Ndrg1 and Pea15a did not significantly differ between the TNBS group and the control group. Consistent with previous work, in the DSS mouse model, the expression levels of Cd44, S100a8, S100a9 and Timp1 were greater in the mice with colitis; while the expression level of Ndrg1 was lower in the mice with colitis. In addition, no significant difference in the expression levels of Cidec, Pea15a or Xbp1 was detected. Unexpectedly, the expression levels of Numa1 and Rag1 in the DSS group were different from those in the CD and TNBS colitis groups.

qRT-PCR validation of the hub DE-PRGs in CD patients (A), TNBS-induced colitis model (B) and DSS-induced colitis model (C). The blue dots represent the normal/control tissues, and the red dots represent the diseased tissues. qRT-PCR quantitative real-time PCR, DE-PRGs differentially expressed PANoptosis-related genes, CD Crohns disease, TNBS 2,4,6-trinitrobenzene sulfonic acid, DSS dextran sodium sulfate, GAPDH glyceraldehyde-3-phosphate dehydrogenase.

Continued here:
Characterization of PANoptosis-related genes in Crohn's disease by integrated bioinformatics, machine learning and ... - Nature.com

Australian Academy of Science Boden Research Conference 2024: Protein Folding: Mechanisms, Health, and Machine … – Australian Academy of Science

Understanding how proteins fold is key to unlocking how cells function and how their structures are built. When proteins fold incorrectly, it can cause cells to malfunction, leading to diseases like Alzheimer's and Parkinson's. Delving into the complexities of protein folding not only enriches our fundamental understanding of biological processes but also paves the way for innovative therapies, and novel drug discoveries.

The 2024 Boden Research Conference aims to bring together a multidisciplinary community of experts to deepen our understanding of protein folding dynamics and propel therapeutic innovation. The conference will assess current knowledge, identify crucial gaps, and guide future research in protein folding and misfolding. The conference will also explore how machine learning can revolutionise the search for new treatments and better diagnosis of diseases.

Join us to discover how the smallest proteins can solve some of our biggest health challenges. Together, we can advance scientific understanding and develop new solutions to combat debilitating diseases.

Date: 25th -26th September, 2024

Time: 8:00am -17:00 pm. A conference dinner will be organised on day one (25th September, 2024) at 18:00 pm

Deadline: Deadline for conference registration is 23:59 13th September, 2024 (AEST) , and deadline for abstract submission is 23:59 15th July, 2024 (AEST).

Cost: Free

Venue:Holmes Building (A09), Science Rd, The University of Sydney, Camperdown NSW 2050, Australia

Program: TBA

Contact: Professor Ken-Tye Yong, The University of Sydney: ken.yong@sydney.edu.au; Dr Morning Liu, The University of Sydney: xiaochen.liu@sydney.edu.au

Read the original post:
Australian Academy of Science Boden Research Conference 2024: Protein Folding: Mechanisms, Health, and Machine ... - Australian Academy of Science

52% of FIs Plan to Lean on ML and AI to Combat Fraud – PYMNTS.com

In the seemingly never-ending war to protect their customers and institutions from fraud, an increasing number of financial institutions (FIs) are deploying machine learning (ML) and artificial intelligence (AI) tools to fight back.

And according to PYMNTS Intelligences Leveraging AI and ML to Thwart Scammers, a report created in collaboration withHawk, those efforts appear to be working.

The report, which is based on surveys with 200 FIs with more than $1 billion in assets under management, revealed that thoseFIs that now use ML or AI to mitigate fraud are seeing steep declines in common forms of fraud.

For instance, tech support impersonation and IRS imposter scams are two of the mostfrequently reported scams, yet FIs using ML or AI anti-fraud solutions were 17% less likely to report experiencing these leading scams than FIs relying solely on more traditional fraud prevention tools. Likewise, they were 18% less likely to report IRS imposter scams as a top concern.

They also reported lower rates of lottery, romance, utility, rentalandSocial Security scams.In fact,as the figure illustrates, FIs leveragingthe MLand AI technology reported lower incidents of nearly every common form of fraud.

The data also finds there is some room for improvement in both ML- and AI-based solutions.The tools were less successful in identifyingcharitable-donationscams. They also missed some fake debt-collection scams. This could be because these two scams are less common (and there would thus be less data for the solutions to work from).

Despite these small hurdles, FIs areapparentlyimpressed. Fifty-two percent of the FIs we surveyed plan to implement or increase their use of ML or AI fraud prevention models.In fact, FIs using AI or ML are 17% more likely to have plans in place to implement additional ML or AI solutions than their counterparts that do not use ML or AI fraud prevention solutions. In other words, many of the FIs now using the advancedtechnologies are ready to expand their ML and AItool chest.

Our study also found that by adopting ML or AI fraud-prevention models, FIs are not only stopping more bad actors from inflicting damage but also increasing the confidence their customers have that their accounts are protected. So, in turn, customer satisfaction rates are likely to increase as fraud levels decline.

For all PYMNTS AI coverage, subscribe to the daily AINewsletter.

Go here to read the rest:
52% of FIs Plan to Lean on ML and AI to Combat Fraud - PYMNTS.com

How Machine Learning Revolutionizes Automation Security with AI-Powered Defense – Automation.com

Summary

Machine learning is sometimes considered a subset of overarching AI. But in the context of digital security, it may be better understood as a driving force, the fuel powering the engine.

The terms AI and machine learning are often used interchangeably by professionals outside the technology, managed IT and cybersecurity trades. But, truth be told, they are separate and distinct tools that can be coupled to power digital defense systems and frustrate hackers.

Artificial iIntelligence has emerged as an almost ubiquitous part of modern life. We experience its presence in everyday household robots and the familiar Alexa voice that always seems to be listening. Practical uses of AI mimic and take human behavior one step further. In cybersecurity, it can deliver 24/7 monitoring, eliminating the need for a weary flesh-and-blood guardian to stand a post.

Machine learning is sometimes considered a subset of overarching AI. But in the context of digital security, it may be better understood as a driving force, the fuel powering the engine. Using programmable algorithms, it recognizes sometimes subtle patterns. This proves useful when deployed to follow the way employees and other legitimate network users navigate systems. Although even discussions regarding AI and machine learning feel redundant, to some degree, they are a powerful one-two punch in terms of automating security decisions.

Integrating AI calls for a comprehensive understanding of mathematics, logical reasoning, cognitive sciencesand a working knowledge of business networks. The professionals who implement AI for security purposes must also possess high-level expertise and protection planning skills. Used as a problem-solving tool, AI can provide real-time alerts and take pre-programmed actions. But it cannot effectively stem the tide of bad actors without support. Enter machine learning.

In this context, machine learning emphasizes software solutions driven by data analysis. Unlike human information processing limitations, machine learning can handle massive swaths of data. What machine learning learns, for lack of a better word, translates into actionable security intel for the overarching AI umbrella.

Some people think about machine learning as a subcategory of AI, which it is. Others comprehend it in a functional way,i.e., two sides to the same coin. But for cybersecurity experts determined to deter, detectand repel threat actors, machine learning is the gasoline that powers AI engines.

Its now essential to leverage machine learning capabilities to develop a so-called intelligent computer that can defend itself, to some degree. Although the relationship between AI and machine learning is diverse and complex, an expert can integrate them into a cybersecurity posture with relative ease. Its simply a matter of repetition and the following steps.

When properly orchestrated and refined to detect user patterns and subtle anomalies, the AI-machine learning relationship helps cybersecurity professionals keep valuable and sensitive digital assets away from prying eyes and greedy digital hands.

First and foremost, its crucial to put AI and machine learning benefits in context. Studies consistently conclude that more than 80% of all cybersecurity failures are caused by human error. Using automated technologies removes many mistake-prone employees and other network users from the equation. Along with minimizing risk, these are benefits of onboarding these automated next-generation technologies.

Improved cybersecurity efficiency. According to the 2023 Global Security Operations Center Study, cybersecurity professionals spend one-third of their workday chasing downfalse positives. This waste of time negatively impacts their ability to respond to legitimate threats, leaving a business at higher than necessary risk. The strategic application of AI and machine learning can be deployed to recognize harmless anomalies and alert a CISO or vCISO only when authentic threats are present.

Increased threat hunting capabilities.Without proactive, automated security measures like MDR (managed detection and response), organizations are too often following an outdated break-and-fix model. Hackers breach systems or deposit malware, and then the IT department spends the remainder of their day, or week, trying to purge the threat and repair the damage. Cybersecurity experts have widely adopted the philosophy that the best defense is a good offense. A thoughtful AI-machine learning strategy can engage in threat hunting without ever needing a coffee break.

Cure business network vulnerabilities.Vulnerability management approaches generally employ technologies that provide proactive automation. They close cybersecurity gaps and cure inherent vulnerabilities by identifying these weaknesses and alerting human decision-makers. Unlike scheduling a routine annual risk assessment, these cutting-edge technologies deliver ongoing analytics and constant vigilance.

Resolve cybersecurity skills gap.Its something of an open secret that there are not enough trained, certified cybersecurity experts to fill corporate positions. Thats one of the reasons why industry leaders tend to outsource managed IT and cybersecurity to third-party firms. Outsourcing helps to onboard the high-level knowledge and skills required to protect valuable digital assets and sensitive information. Without enough cybersecurity experts to safeguard businesses, automation allows the resources available to companies to drill down and identify true threats. Without these advanced technologies being used to bolster network security, its likely the number of debilitating cyberattacks would grow exponentially.

The type of predictive analytics and swift decision-making capabilities this two-prong approach delivers has seemingly endless industry applications. Banking and financial sector organizations can not only use AI and machine learning to repel hackers but also ferret out fraud. Healthcare organizations have a unique opportunity to exceed Health Insurance Portability and Accountability Act (HIPAA) requirements due to the advanced personal identity record protections it affords. Companies conducting business in the global marketplace can also get a leg-up in meeting the EUs General Data Protection Regulation (GDPR) designed to further informational privacy.

Perhaps the greatest benefit organizations garner from AI and machine learning security automation is the ability to detect, respondand expel threat actors and malicious applications. Managed IT cybersecurity experts can help companies close the skills gap by integrating these and other advanced security strategies.

John Funk is a Creative Consultant at SevenAtoms. A lifelong writer and storyteller, he has a passion for tech and cybersecurity. When hes not found enjoying craft beer or playing Dungeons & Dragons, John can be often found spending time with his cats

Check out our free e-newsletters to read more great articles..

Read this article:
How Machine Learning Revolutionizes Automation Security with AI-Powered Defense - Automation.com