Close Menu
CloudSecNewsHub
  • News
  • Technologies
  • Automation
  • Updates
  • Guides
  • Tools
  • Compliance

Subscribe to Updates

Subscribe to our newsletter and stay updated with the latest news and exclusive offers.

What's Hot

Google Cloud Security Plitz attacks e -hunting, improves vision

May 8, 2025

How to pick up criminal evidence for Microsoft 365

May 8, 2025

Cloud security treatment: American federal edition

May 7, 2025
Facebook X (Twitter) Instagram
Trending
  • Google Cloud Security Plitz attacks e -hunting, improves vision
  • How to pick up criminal evidence for Microsoft 365
  • Cloud security treatment: American federal edition
  • The most prominent report: 2025 Experience of exposure to cloud data
  • Artificial intelligence agents to convert Google Cloud Security Ops
  • The necessity of cloud security in the electronic scene today
  • Gap block: How to simplify QULYS Compliance NCA ECC 2024 for companies
  • Ransomware Spike displays cracks in cloud safety
Facebook X (Twitter) Instagram Pinterest Vimeo
CloudSecNewsHubCloudSecNewsHub
  • News

    How to pick up criminal evidence for Microsoft 365

    May 8, 2025

    The most prominent report: 2025 Experience of exposure to cloud data

    May 7, 2025

    Artificial intelligence agents to convert Google Cloud Security Ops

    May 6, 2025

    Ransomware Spike displays cracks in cloud safety

    May 5, 2025

    Sentinelone wins the best safety point and cloud security at the 2025 SC Awards

    May 1, 2025
  • Technologies

    Gartner: How to build a safe institution cloud environment

    April 21, 2025

    Promote South Korea's national security by adopting the cloud

    April 11, 2025

    “The traditional methods of cloud safety, where organizations depend on the segmented cloud safety tools, are not simply enough”

    April 3, 2025

    Stream.security The cloud solution in actual time in industry with TRP technology designed to dilute proactively from the effect of breach in the cloud

    April 1, 2025

    Skyhawk's creation platform mentioned in 2024 Gartner Emerging Tech Impact Radar: Preventive Cyber ​​Security

    March 28, 2025
  • Automation

    Cloud Security Alliance launches an initiative to automate compliance

    April 30, 2025

    The security automation market to see a great expansion

    April 25, 2025

    GSA FedRAMP '20X' rejuvenation keys to automation, to the approvals in “Weeks” – MERITALK

    April 16, 2025

    Cortex Cloud – cloud safety conversion

    April 11, 2025

    TUFIN extends the possibilities of the security of the cloud and the network with the latest version of the synchronous pavilion

    April 8, 2025
  • Updates

    Google Cloud Security Plitz attacks e -hunting, improves vision

    May 8, 2025

    April 2025 Correction Tuesday: updates and analysis

    April 15, 2025

    Google Cloud 2025: News and updates

    April 12, 2025

    5 Google Big Google Aman ads on the next 2025

    April 9, 2025

    Google offers a unified safety platform and safety agents driven by artificial intelligence

    April 9, 2025
  • Guides

    CISO guide for effective cloud security strategies

    April 30, 2025

    Singapore offers instructions to support the cloud and the elasticity of the first place

    April 29, 2025

    Singapore has new guidelines to enhance flexibility and security for cloud services and data centers

    April 5, 2025

    What is the safety of the cloud? | IBM

    April 3, 2025

    Google gets Wiz for $ 32 billion to boost cloud safety

    March 19, 2025
  • Tools

    Cloud security treatment: American federal edition

    May 7, 2025

    The necessity of cloud security in the electronic scene today

    May 6, 2025

    Crowdstrike (CRWD) launches Amnesty International Security tools to improve the cloud p

    April 30, 2025

    The 5 best CNAPP benefits that you need to know in 2025

    April 26, 2025

    The security coalition cloud launches the latest security report. Saas

    April 26, 2025
  • Compliance

    Gap block: How to simplify QULYS Compliance NCA ECC 2024 for companies

    May 5, 2025

    Ensuring commitment to international standards

    April 29, 2025

    Thales and Deloitte are an alliance to enhance the security and compliance data strategies

    April 22, 2025

    AWS security compliance is easy: IT-Magic Devops solutions for a stronger security situation

    April 21, 2025

    5 ways that banks can achieve smooth security and compliance in 2025

    April 14, 2025
Login
CloudSecNewsHub
Home»News»AWS uses AI to detect new cyber threats
News

AWS uses AI to detect new cyber threats

CloudSecNewsHubBy CloudSecNewsHubDecember 6, 2024No Comments4 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Aws Uses Ai To Detect New Cyber Threats
Share
Facebook Twitter LinkedIn Pinterest Email

Cloud giant Amazon Web Services (AWS) is adding artificial intelligence and automation capabilities to its cybersecurity services to enhance the ability to faster detect threats against cloud workloads and data and to more efficiently triage and respond to cyberattacks when they occur.

In the case of both demos presented at AWS re:Invent this week, speed is a critical factor at a time when cyberattacks are becoming more frequent and more sophisticated, according to AWS.

This sentiment echoes the sentiments of financial services providers (MSSPs) who are adopting AI for a wide range of reasons, including security services for their clients. According to a September survey by D3 Security, 80% of cloud providers surveyed are using emerging technology in some capacity, including 13% for analysis and threat detection and 13% for automation and orchestration.

“Security teams often face an overwhelming number of daily alerts, leading to the potential for misplaced resource priorities and decreased effectiveness,” Betty Cheng, senior developer advocate at AWS, wrote in introducing the cloud provider's new security incident response service. “Manually investigating results strains resources and may cause customers to miss important security alerts. Additionally, coordinating responses across multiple stakeholders, managing permissions in different environments, and documenting procedures adds to the complexity of the process.”

Tools like security incident response and new AI and machine learning-based threat detection capabilities in AWS GuardDuty can reduce the number of manual steps needed when addressing a potential fast-moving or ongoing security incident, Cheng wrote.

Detect and respond to attacks

Security Incident Response automates triage tasks and investigates security findings from Amazon's GuardDuty threat detection service and third-party threat detection tools AWS Security Hub. MSSPs also use the tools in the Security Hub to protect customer environments in AWS or can help customers operate these tools.

Sorting through results from GuardDuty and third-party tools in the Security Hub, the new service will automatically identify high-priority incidents that need attention, and filter security results based on expected behavior. It also extends notification rules and permission settings that were previously configured internally and externally, including external service providers. There is also automatic case history tracking and reporting.

The service also comes with self-service fulfillment and support tools from AWS, and the service dashboard includes metrics that businesses can use to measure their response performance and improve average time to resolution. The service is now available in 12 regions in the US, Asia Pacific, Canada and Europe.

New capabilities in GuardDuty Extended Threat Detection use artificial intelligence and machine learning to identify known and previously unknown attack sequences, which Esra Kayabali, AWS senior solutions architect, wrote, delivers “a more comprehensive, proactive approach to cloud security. This enhancement addresses the increasing complexity of modern cloud environments and the landscape.” Advanced threat intelligence, simplifying threat detection and response.

Enhanced guard duty

GuardDuty's expanded features correlate security signals, enabling them to identify attack sequences within their AWS environments, Kiabali wrote. These sequences involve multiple steps in the attack, from privilege discovery to API manipulation to data exfiltration. Detections appear as “attack sequence results,” which is a new feature to GuardDurty and comes with a Critical Severity.

“GuardDuty has never used Critical Severity, and has reserved this level for outcomes with the utmost confidence and urgency,” she wrote. “These new scores provide a critical severity score and include a natural language summary of the nature and significance of the threat, observable activities mapped to tactics and techniques from the MITRE ATT&CK framework, and guided remediation recommendations based on AWS best practices.”

Amazon GuardDuty Extended Threat Detection is automatically enabled at no additional cost to organizations using GuardDuty in any AWS Region that supports it.

MSSPs are no stranger to artificial intelligence

About two-thirds of MSSPs are now using automation capabilities, and service providers' adoption of AI is expected to follow a similar trend, Walker Barnerd, director of content marketing at D3 Security, wrote in a blog post.

Klik Solutions, a managed IT services provider in Baltimore, Maryland, wrote in a blog post in September that digital transformation has created a rapidly evolving cybersecurity landscape that is leading to a sharp increase in cyber threats that include sophisticated phishing attacks and ransomware.

“Amid this chaotic environment, AI in endpoint security has emerged as a critical tool for defending companies against malicious activity,” the company wrote, adding that as cybercrime tactics become more sophisticated, the need for modern endpoint security becomes even more critical. .

As organizations realize the importance of AI in endpoint security, the role of managed security service providers (MSSPs) has become increasingly vital. “These experts have the experience and resources to effectively implement and manage AI-based security solutions.”

AWS Cyber Detect Threats
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleWhy visibility alone isn't enough in cloud security
Next Article Zscaler research shows that 87% of cyber threats use encryption
admin
CloudSecNewsHub
  • Website

Related Posts

News

How to pick up criminal evidence for Microsoft 365

May 8, 2025
News

The most prominent report: 2025 Experience of exposure to cloud data

May 7, 2025
News

Artificial intelligence agents to convert Google Cloud Security Ops

May 6, 2025
Add A Comment
Leave A Reply Cancel Reply

Top Posts

Debian 12.6 released with 84 security updates and 162 bug fixes

July 15, 20241 Views

Google Cloud Security Plitz attacks e -hunting, improves vision

May 8, 20250 Views

How to pick up criminal evidence for Microsoft 365

May 8, 20250 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Don't Miss
Updates

Google Cloud Security Plitz attacks e -hunting, improves vision

CloudSecNewsHubMay 8, 2025
News

How to pick up criminal evidence for Microsoft 365

CloudSecNewsHubMay 8, 2025
Tools

Cloud security treatment: American federal edition

CloudSecNewsHubMay 7, 2025

Subscribe to Updates

Subscribe to our newsletter and stay updated with the latest news and exclusive offers.

Most Popular

Debian 12.6 released with 84 security updates and 162 bug fixes

July 15, 20241 Views

Google Cloud Security Plitz attacks e -hunting, improves vision

May 8, 20250 Views

How to pick up criminal evidence for Microsoft 365

May 8, 20250 Views
Don't Miss

Google Cloud Security Plitz attacks e -hunting, improves vision

May 8, 2025

How to pick up criminal evidence for Microsoft 365

May 8, 2025

Cloud security treatment: American federal edition

May 7, 2025

Subscribe to Updates

Subscribe to our newsletter and stay updated with the latest news and exclusive offers.

Facebook X (Twitter) Instagram Pinterest
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
  • Disclaimer
© 2025 CloudSecNewsHub. All Rights Reserved

Type above and press Enter to search. Press Esc to cancel.

Sign In or Register

Welcome Back!

Login to your account below.

Lost password?