Reimagining Public Sector Analytics
Home News Cyber Security With AI and machine learning, strictly follow cybersecurity processes, says Gulshan Rai

With AI and machine learning, strictly follow cybersecurity processes, says Gulshan Rai

India's National Cyber Security coordinator Gulshan Rai termed machine learning and AI as a double-edged technology, which although helps in identifying background processes, also provides hackers with information to breach systems.

While AI and machine learning are far reaching innovations, there is a need to strictly follow cybersecurity processes. (Photo/Agency)

While artificial intelligence (AI) and are far reaching innovations, there is a need to strictly follow processes as hackers can use information through these technologies to breach systems, said India's National Cyber Security coordinator .

Rai who has over 25 years of experience in different areas of Information Technology which include cyber security, e-governance, legal framework and the Information Technology Act for e-commerce, and several related fields termed machine learning and AI as a double-edged technology, which although helps in identifying background processes, also provides hackers with information to breach systems.

“If we follow processes and properly interpret the results of AI or machine learning, we would be able to enhance the resilience of our digital systems and minimise impact of many cyber attacks,” he told reporters.

Rai was of the view that companies in the domain of cybersecurity must work more closely with government organisations like Indian Computer Emergency Response Team (CERT-In) and National Critical Information Infrastructure Protection Centre to secure the digital eco-system.

With Prime Minister Narendra Modi push for ‘Digital India', there has been growing adoption of technology by government department. This has led to creation of larger surface for hacker and attacker. Hence, Indian government is partnering with security companies to mitigate any untoward cyber attack on its critical infrastructure.

Exit mobile version