Cybersecurity and AI

April 2024 AI & Data Analytics, Information Security


Jean Van Vuuren.

Cybersecurity has been making use of AI functions for the past several years. It is one of the primary reasons that detecting the commonalities and threats of what is otherwise completely unknown is possible with tools such as SIEM and endpoint protection platforms. It is also heavily deployed in sandbox tools, which analysts use to safely inspect malicious code and executables to understand exactly what these samples are trying to do, and how they could be used to impact their own unique corporate environment.

AI helps make these complex, manually intensive human tasks happen immediately – which ultimately helps keep companies more secure by speedily providing the answers needed to enable security teams to act sooner.

Gartner predicts that by 2027, generative AI will contribute to a 30% reduction in false positive rates for application security testing and threat detection by refining results from other techniques to separate benign from malicious events. Many businesses and IT project teams have already launched GenAI initiatives, or intend to do so soon. Gartner advises CISOs and security teams to prepare for impacts from generative AI in four different areas:

• ‘Defend with’ generative cybersecurity AI.

• ‘Attacked by’ GenAI.

• Secure enterprise initiatives to ‘build’ GenAI applications.

• Manage and monitor how the organisation ‘consumes’ GenAI.

AI is not just something baked into the back end anymore; increasingly, it is serving interactive functions – such as allowing an analyst to use common language to quickly build complex queries while threat hunting, or sampling vast amounts of data and recommending a course of action based on an analyst’s criteria. There are also promising outlooks suggesting that AI can be used to supplement some of the more advanced tasks and research needs, allowing those tasks to be performed by team members with less experience in these skills. This is a developing area that may hold the answer to the ongoing skills shortage that the industry faces.

Gartner recommends that cybersecurity leaders build the following strategic planning assumptions into their security strategies for the next two years. The global research guru predicts that by 2028, the adoption of GenAI will collapse the skills gap, removing the need for specialised education from 50% of entry-level cybersecurity positions.

In summary

This is a fast-paced field, and complacency is such a huge risk for security leaders. CISOs cannot assume that what they are doing now is enough, or that there is only one way to accomplish their cybersecurity goals; no other way to look at something. For some, that can be a difficult approach to adopt, but to ignore these constantly changing factors and not push your security team functions to develop and improve is what will put your organisation even more at risk.

I recommend CISOs scrutinise where they are in the company’s security journey and be excited that there are always changes and improvements that can be made. If you are a security leader and assume this is something that stops being important, or there comes a time when you have done everything you need to do, you may be in the wrong industry.

Businesses enabling their security teams to do the work they need to do will be key to success. This can only be achieved by adopting a more security-focused company culture. As with any other aspect of business, it is often a balancing act to weigh the desires of different teams and find an agreeable middle ground. Not to imply that the individual desires of members of a security team are more important than the holistic company goals, but it is a fact that the risk these teams face is unlike any other risk we have faced in the modern business world.

A cyber breach or ransomware attack can ruin reputations overnight. The risks being raised by security teams are of dire importance to business sustainability and must be prioritised, but the change that still needs to happen is more action and enablement to solve these problems. What no business leadership wants is their company name in the news because of a breach, and today, looking at the statistics for 2023 alone, it is more of a certainty than a possibility. Fear or ignorance of AI enablement tools will do nothing to stop this, but embracing the technology may do much to secure your business.

For more information, go to https://www.hyland.com/




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Data resilience at VeeamON
Technews Publishing SMART Security Solutions Infrastructure Information Security
SMART Security Solutions attended the VeeamON Tour in Johannesburg in August to learn more about data resilience and Veeam’s initiatives to enhance data protection, both on-site and in the cloud.

Read more...
Make BIG and COMPLEX small and manageable
neaMetrics Suprema AI & Data Analytics Surveillance Integrated Solutions
Traditional CCTV and access systems often operate separately, creating gaps in visibility and efficiency. TRASSIR and Suprema have partnered to develop an integrated platform that improves security, operations, and situational awareness.

Read more...
Get the AI fundamentals right
Technews Publishing SMART Security Solutions Leaderware Editor's Choice Surveillance AI & Data Analytics
Much of the marketing for CCTV AI detection implies the client can just drop the AI into their existing systems and operations, and they will be detecting all criminals and be far more efficient when doing it.

Read more...
SMART Surveillance Conference in Johannesburg
Arteco Global Africa Technews Publishing SMART Security Solutions Axis Communications SA neaMetrics Editor's Choice Surveillance Security Services & Risk Management Logistics (Industry) AI & Data Analytics
SMART Security Solutions hosted its annual SMART Surveillance Conference in Johannesburg in July, welcoming several guests, sponsors, and speakers for an informative and enjoyable day examining the evolution of the surveillance market.

Read more...
Secure data protection without hardware lock-in
Infrastructure Information Security News & Events
New Veeam Software Appliance empowers IT teams to achieve instant protection with Veeam’s fully preconfigured, software-only appliance, delivering enterprise-ready simplified deployment and operational efficiency, robust cyber resilience.

Read more...
The global generative AI market surpassed $130 billion in 2024
News & Events AI & Data Analytics
According to a new research report from the IoT analyst firm, Berg Insight, the Generative AI (GenAI) market grew substantially in 2024, experiencing triple-digit growth rates in all three major segments: GenAI hardware, foundation models, and development platforms.

Read more...
Questing for the quantum AI advantage
Infrastructure AI & Data Analytics
The clock is ticking down to the realisation of quantum AI and the sought-after ‘quantum advantage’. In many boardrooms, however, quantum remains mysterious; full of promise, but not fully understood.

Read more...
The growing role of hybrid backup
Infrastructure Information Security
As Africa’s digital economy rapidly grows, businesses across the continent are facing the challenge of securing data in an environment characterised by evolving cyberthreats, unreliable connectivity and diverse regulatory frameworks.

Read more...
Choicejacking bypasses smartphone charging security
News & Events Information Security
Choicejacking is a new cyberthreat that bypasses smartphone charging security defences to confirm, without the victim’s input or consent, that the victim wishes to connect in data-transfer mode.

Read more...
Most wanted malware
News & Events Information Security
Check Point Software Technologies unveiled its Global Threat Index for June 2025, highlighting a surge in new and evolving threats. Eight African countries are among the most targeted as malware leaders AsyncRAT and FakeUpdates expand.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.