Is artificial intelligence, machine learning the answer to defending against cybersecurity attacks?

Apr 11, 2022

2 min

Amanda Fennell

Federal officials have warned U.S. financial institutions to prepare for the possibility of Russia-linked cyberattacks in the wake of the ongoing war in Ukraine.


Two new tools are helping cybersecurity professionals fight the vast volume of threats and attacks— artificial intelligence (AI) and machine learning.


While AI and machine learning security techniques are still in their infancy, they are proving to be valuable assets in assisting analysts in finding vulnerabilities in data sets too large to cover effectively manually. AI and machine learning can detect novel malicious code, catch fraudulent charges on a credit card or fraudulent network login attempts, block phishing messages on an email service and assist companies with cloud management in spotting anomalies that traditional cyber defense technologies may not pick up.


However, according to consulting firm McKinsey & Company, hacking is becoming a multibillion-dollar enterprise, complete with institutional hierarchies and R&D budgets. Criminals are using some of the same advanced tools, such as AI and machine learning, to launch cyber-attacks.



Amanda Fennell, information technology and cybersecurity expert in Tulane University’s School of Professional Advancement, is available to speak about how AI and machine learning are being used by institutions to protect their data and systems — and how hackers are using these same tools against them.


“AI shows tremendous promise for security, particularly around anomaly detection,” Fennell said. “Like any application of machine learning, it takes a very detailed understanding of the data you have, getting that data to a normalized, clean state and finding the right algorithms to apply.”


Fennell is available to speak about how AI and machine learning are sustainable in the never-ending fight against cyberhackers. For interviews, contact Roger Dunaway at roger@tulane.edu or 504-452-2906.


“Removing the ‘low hanging fruit’ like phishing detection, strange user login behavior, etc., are easier and quicker wins. It isn't until we, as an industry, start using the technology to find when people are using our products in strange workflows or noticing unusual data movements - either by location or slow transfers over long periods- that we'll be maximizing the possible benefits of machine learning techniques in our industry,” Fennell said.


Connect with:
Amanda Fennell

Amanda Fennell

Adjunct Professor

Amanda Fennell is an information technology and cybersecurity expert.

Digital ForensicsSecurity StrategyCybersecurity EducationCybersecurityInformation Technology

You might also like...

Check out some other posts from Tulane University

1 min

Expert: Historic password breach creates public urgency for better password protection

Cybercriminals recently executed a significant breach, stealing the world’s most extensive collection of passwords. These stolen credentials, a staggering 10 billion unique passwords, have been uploaded to the notorious RockYou2024 database, a hub for cybercriminal activity. Tulane University cybersecurity expert Demetrice Rogers says the stolen passwords are a significant vulnerability for most users and underscore the need for strong password management. With malicious actors now armed with an extensive database of nearly 10 billion unique passwords, the risk of successful hacks on unsuspecting users is significantly higher. "The massive growth of the RockYou2024 password list shows just how tough it’s getting to keep our accounts safe. Hackers will love this list, making it a go-to tool for breaking into accounts. We need strong, unique passwords and multi-factor authentication to stay one step ahead. Think of it like locking your doors and setting the alarm—essential steps to keep the cybercriminals out." Rogers can cover: • How users can check to see if their information and passwords are included in the leak. • The importance of creating strong, unique passwords for each account and using reputable password managers to generate and store them securely. (Many users use the same password across multiple websites, making an attacker’s job much easier.) • Why adopting multi-factor authentication is increasingly important to ensure account security.

2 min

Are soaring home insurance rates in Gulf Coast states coming for the rest of the country?

The Gulf Coast faces an expected active 'above-normal' hurricane season, with many insurance carriers withdrawing from the market. Homeowners are left with skyrocketing rates and dwindling coverage options. Louisiana bore the brunt with four major hurricanes in 2020 and 2021, causing $75 billion in combined damage. The state passed a series of insurance reforms to attract more insurance companies, following in the footsteps of Florida. Insurance woes for homeowners aren’t just a coastal issue. Homeowners in the Midwest are struggling with insurance carriers because of damage from the record amount of tornadoes. Wildfires in the US are also a growing threat to insurance carriers, accounting for an annual total cost between $394 billion and $893 billion. Christopher Otten, an insurance and legal expert at Tulane University’s A. B. Freeman School of Business, is available to speak about the impact of new hurricane insurance regulations in several states, the challenges of holding insurance carriers accountable from state to state and the difficulties property owners face in finding hurricane insurance. Christopher can also discuss: • Why insurance markets differ among the states in the Gulf Coast region. • The Fortified Roof incentive programs • Affordability and the need for more carriers to improve competition and pricing risk. Christopher Otten Quote: “The Gulf States are the canaries in the coal mine right now for insurance markets,” Otten said. “It’s probably going to get worse before it gets better. A quiet hurricane season, as unlikely as that is, will help things some – but that doesn’t mean rates will not go up or down. They may increase less than they otherwise would have. With these new laws, particularly in Louisiana, it will take a hurricane for us to know how the new regulations are shaping out.” Contact Roger Dunaway, assistant director of media relations, for interviews at roger@tulane.edu.

2 min

Vulnerability exposed: Car dealerships grapple with fallout from cybersecurity attacks

Nearly 15,000 car dealerships across North America are still struggling to operate after a massive cyberattack has crippled their software systems. As more vehicles become connected to the Internet and reliant on digital systems, cyberattacks pose a serious risk to businesses and consumers. Tulane University cybersecurity expert Demetrice Rogers is available to discuss the next steps in auto industry recovery efforts and what other industries can learn from the incident to avoid repeat attacks. Professor Rogers can speak about: 1. The implications for data security and privacy and the possible compromise of sensitive customer data, including personal information and financial details. 2. Specific cybersecurity weaknesses within the automotive industry that made these car dealerships targets for the cyberattack. 3. Offer insights into effective cybersecurity measures and best practices that car dealerships can implement to strengthen their defenses against future cyber threats. Quote from Demetrice Rogers: “The preliminary reports indicate that the attack on CDK Global was a ransomware incident. Their systems will essentially be held hostage until specific demands, likely monetary, are fulfilled. Initial reports indicate CDK plans to pay the ransom, which could be tens of millions of dollars, to the attackers. I would expect systems to slowly come back online, with some data and processes unavailable until they have fully recovered.” “This situation highlights the critical need for an effective backup and disaster recovery program. Organizations should routinely test their recovery capabilities to ensure preparedness for such incidents. Additionally, it is generally recommended not to comply with hackers' demands or pay the ransom. While it is true that some companies opt to pay (though this is rarely publicized), it is usually more prudent to activate a well-prepared disaster recovery plan.” Contact Roger Dunaway, assistant director of media relations, for interviews at roger@tulane.edu.

View all posts