Cybersecurity and AI

April 2024 AI & Data Analytics, Information Security


Jean Van Vuuren.

Cybersecurity has been making use of AI functions for the past several years. It is one of the primary reasons that detecting the commonalities and threats of what is otherwise completely unknown is possible with tools such as SIEM and endpoint protection platforms. It is also heavily deployed in sandbox tools, which analysts use to safely inspect malicious code and executables to understand exactly what these samples are trying to do, and how they could be used to impact their own unique corporate environment.

AI helps make these complex, manually intensive human tasks happen immediately – which ultimately helps keep companies more secure by speedily providing the answers needed to enable security teams to act sooner.

Gartner predicts that by 2027, generative AI will contribute to a 30% reduction in false positive rates for application security testing and threat detection by refining results from other techniques to separate benign from malicious events. Many businesses and IT project teams have already launched GenAI initiatives, or intend to do so soon. Gartner advises CISOs and security teams to prepare for impacts from generative AI in four different areas:

• ‘Defend with’ generative cybersecurity AI.

• ‘Attacked by’ GenAI.

• Secure enterprise initiatives to ‘build’ GenAI applications.

• Manage and monitor how the organisation ‘consumes’ GenAI.

AI is not just something baked into the back end anymore; increasingly, it is serving interactive functions – such as allowing an analyst to use common language to quickly build complex queries while threat hunting, or sampling vast amounts of data and recommending a course of action based on an analyst’s criteria. There are also promising outlooks suggesting that AI can be used to supplement some of the more advanced tasks and research needs, allowing those tasks to be performed by team members with less experience in these skills. This is a developing area that may hold the answer to the ongoing skills shortage that the industry faces.

Gartner recommends that cybersecurity leaders build the following strategic planning assumptions into their security strategies for the next two years. The global research guru predicts that by 2028, the adoption of GenAI will collapse the skills gap, removing the need for specialised education from 50% of entry-level cybersecurity positions.

In summary

This is a fast-paced field, and complacency is such a huge risk for security leaders. CISOs cannot assume that what they are doing now is enough, or that there is only one way to accomplish their cybersecurity goals; no other way to look at something. For some, that can be a difficult approach to adopt, but to ignore these constantly changing factors and not push your security team functions to develop and improve is what will put your organisation even more at risk.

I recommend CISOs scrutinise where they are in the company’s security journey and be excited that there are always changes and improvements that can be made. If you are a security leader and assume this is something that stops being important, or there comes a time when you have done everything you need to do, you may be in the wrong industry.

Businesses enabling their security teams to do the work they need to do will be key to success. This can only be achieved by adopting a more security-focused company culture. As with any other aspect of business, it is often a balancing act to weigh the desires of different teams and find an agreeable middle ground. Not to imply that the individual desires of members of a security team are more important than the holistic company goals, but it is a fact that the risk these teams face is unlike any other risk we have faced in the modern business world.

A cyber breach or ransomware attack can ruin reputations overnight. The risks being raised by security teams are of dire importance to business sustainability and must be prioritised, but the change that still needs to happen is more action and enablement to solve these problems. What no business leadership wants is their company name in the news because of a breach, and today, looking at the statistics for 2023 alone, it is more of a certainty than a possibility. Fear or ignorance of AI enablement tools will do nothing to stop this, but embracing the technology may do much to secure your business.

For more information, go to https://www.hyland.com/




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Can AI improve intruder detection?
DeepAlert AI & Data Analytics
Traditional surveillance methods are increasingly inadequate in today’s security landscape. For security companies, integrating AI-powered CCTV with cloud computing offers a transformative solution that enhances security and delivers significant cost savings.

Read more...
There is a SaaS for everything, but at what cost, especially to SMEs?
Editor's Choice Information Security Security Services & Risk Management
Relying on SaaS platforms presents significant cybersecurity risks as the number of providers in your landscape increases, expanding your attack surface. It is important to assess the strength of the SaaS providers in your chain.

Read more...
Addressing today’s mining challenges: cyber risks beyond IT
Editor's Choice Information Security Mining (Industry)
Despite the mining industry’s operational technology systems being vulnerable to cyberattacks, many decision-makers still see these threats as purely an IT issue, even though a breach could potentially disrupt mining operations.

Read more...
Workforce Consortium to reskill 95 million people
Editor's Choice News & Events AI & Data Analytics
ICT Workforce Consortium of global leaders has come together, committing to train and upskill 95 million people over the next 10 years, as 92% of jobs analysed are expected to undergo either high or moderate transformation due to advancements in AI.

Read more...
How to effectively share household devices
Smart Home Automation Information Security
Sharing electronic devices within a household is unavoidable. South African teens spend over eight hours per day online, making device sharing among family members commonplace. Fortunately, there are methods to guarantee safe usage for everyone.

Read more...
Fortinet establishes new point-of-presence in South Africa
News & Events Information Security
Fortinet has announced the launch of a new dedicated point-of-presence (POP) in Isando, Johannesburg, to expand the reach and availability of Fortinet Unified SASE for customers across South Africa and southern African countries.

Read more...
New tools for investigation and robust infrastructure security
News & Events Information Security
Cybereason continues to enhance its security platform, with recent updates introducing improvements in file search operations, investigation query results, and cloud workload protection, providing more granular data and faster key artefact identification.

Read more...
Cellular IoT connectivity revenues reached € 12,4 billion in 2023
IoT & Automation AI & Data Analytics
A new report from Berg Insight says that global IoT connectivity revenues increased 16% to reach €12,4 billion in 2023 as the industry's advancement drives a shift towards a greater focus on reliability, security, and support for international deployments.

Read more...
AI in check
AI & Data Analytics IoT & Automation
While AI has many applications and benefits, and businesses are exploring its use in various ways, there is also a level of risk involved, particularly when it comes to the data that AI uses.

Read more...
Latest AI solution to manage guards
DeepAlert Products & Solutions Surveillance AI & Data Analytics
No guard at the guardhouse? Guard under duress? Guard asleep? DeepAlert’s AI technology delivers real-time alerts to mobile phones and video management systems, helping you manage your guards more effectively.

Read more...