Meet the MIT developed AI based SCRAM

Many of the companies that become victim to cyber attacks show reluctance in sharing breach information as it can be sniffed by hackers who are often behind information such as intellectual property of companies and other confidential information. And this non-cooperation by companies failing to show transparency in information sharing is making it difficult for Cybersecurity firms and the law enforcement in curbing more such attacks.

MIT has come up with a sophisticated solution for such situation and has dubbed it as Secure Cyber Risk Aggregation and Measurement (SCRAM) platform that adheres to the concerns related to privacy and liability, thus encouraging victimized companies share more information.

Technically, SCRAM is a solution that allows security firms to analyze any form of encrypted data without the need to read or decrypt. So, companies can easily share vital data in encrypted form without the concern that the data will be shared or snooped by third parties.

Propelled by the Artificial Intelligence, and supported by the techniques developed by MIT’s Computer Science engineers, SCRAM allows companies to share data without the need of apprehension. However, the solution is in beta phase and is being tested by various Cybersecurity experts across the world.

Taylor Reynolds, an active participant in the development of SCRAM, disclosed that the solution has attained success by identifying over 50 cyber attacks against 7 of the largest multinational companies and has also provided them with mitigation steps over handling the situation.

Mr. Taylor Reynolds, a Technology Policy Directory at the MIT’s Internet Policy Research Initiative at MIT said that SCRAM can detect security failures proactively, thus giving time to organization heads to overhaul the cyber risks in advance.

Some major security vulnerabilities identified by SCRAM are communication over unauthorized ports, prevention of malware attacks and mine logging to prevent, detect and mitigate the risks- all in advance.

The other highlight of SCRAM is that it highlighted the fact that there is an instant need of inventory hardware that can detect & block activity from unauthorized devices and to have a control on the web traffic by erecting defensive firewalls and proxies.

Ad
Naveen Goud
Naveen Goud is a writer at Cybersecurity Insiders covering topics such as Mergers & Acquisitions, Startups, Cyber Attacks, Cloud Security and Mobile Security

No posts to display