Cybersecurity and AI

April 2024 AI & Data Analytics, Information Security


Jean Van Vuuren.

Cybersecurity has been making use of AI functions for the past several years. It is one of the primary reasons that detecting the commonalities and threats of what is otherwise completely unknown is possible with tools such as SIEM and endpoint protection platforms. It is also heavily deployed in sandbox tools, which analysts use to safely inspect malicious code and executables to understand exactly what these samples are trying to do, and how they could be used to impact their own unique corporate environment.

AI helps make these complex, manually intensive human tasks happen immediately – which ultimately helps keep companies more secure by speedily providing the answers needed to enable security teams to act sooner.

Gartner predicts that by 2027, generative AI will contribute to a 30% reduction in false positive rates for application security testing and threat detection by refining results from other techniques to separate benign from malicious events. Many businesses and IT project teams have already launched GenAI initiatives, or intend to do so soon. Gartner advises CISOs and security teams to prepare for impacts from generative AI in four different areas:

• ‘Defend with’ generative cybersecurity AI.

• ‘Attacked by’ GenAI.

• Secure enterprise initiatives to ‘build’ GenAI applications.

• Manage and monitor how the organisation ‘consumes’ GenAI.

AI is not just something baked into the back end anymore; increasingly, it is serving interactive functions – such as allowing an analyst to use common language to quickly build complex queries while threat hunting, or sampling vast amounts of data and recommending a course of action based on an analyst’s criteria. There are also promising outlooks suggesting that AI can be used to supplement some of the more advanced tasks and research needs, allowing those tasks to be performed by team members with less experience in these skills. This is a developing area that may hold the answer to the ongoing skills shortage that the industry faces.

Gartner recommends that cybersecurity leaders build the following strategic planning assumptions into their security strategies for the next two years. The global research guru predicts that by 2028, the adoption of GenAI will collapse the skills gap, removing the need for specialised education from 50% of entry-level cybersecurity positions.

In summary

This is a fast-paced field, and complacency is such a huge risk for security leaders. CISOs cannot assume that what they are doing now is enough, or that there is only one way to accomplish their cybersecurity goals; no other way to look at something. For some, that can be a difficult approach to adopt, but to ignore these constantly changing factors and not push your security team functions to develop and improve is what will put your organisation even more at risk.

I recommend CISOs scrutinise where they are in the company’s security journey and be excited that there are always changes and improvements that can be made. If you are a security leader and assume this is something that stops being important, or there comes a time when you have done everything you need to do, you may be in the wrong industry.

Businesses enabling their security teams to do the work they need to do will be key to success. This can only be achieved by adopting a more security-focused company culture. As with any other aspect of business, it is often a balancing act to weigh the desires of different teams and find an agreeable middle ground. Not to imply that the individual desires of members of a security team are more important than the holistic company goals, but it is a fact that the risk these teams face is unlike any other risk we have faced in the modern business world.

A cyber breach or ransomware attack can ruin reputations overnight. The risks being raised by security teams are of dire importance to business sustainability and must be prioritised, but the change that still needs to happen is more action and enablement to solve these problems. What no business leadership wants is their company name in the news because of a breach, and today, looking at the statistics for 2023 alone, it is more of a certainty than a possibility. Fear or ignorance of AI enablement tools will do nothing to stop this, but embracing the technology may do much to secure your business.

For more information, go to https://www.hyland.com/




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Who has access to your face?
Access Control & Identity Management Residential Estate (Industry) AI & Data Analytics
While you may be adjusting your privacy settings on social media or thinking twice about who is recording you at public events, the reality is that your facial features may be used in other contexts,

Read more...
Adding AI analytics to security monitoring
SEON South Africa News & Events Perimeter Security, Alarms & Intruder Detection Residential Estate (Industry) AI & Data Analytics
SEON has announced its latest integration with Refraime, an AI-powered video analytics platform designed to elevate CCTV surveillance through real-time object detection and intelligent alerting.

Read more...
Local-first data security is South Africa's new digital fortress
Infrastructure Information Security
With many global conversations taking place about data security and privacy, a distinct and powerful message is emerging from South Africa: the critical importance of a 'local first' approach to data security.

Read more...
Making drone security more accessible
Editor's Choice Integrated Solutions Residential Estate (Industry) AI & Data Analytics IoT & Automation
Michael Lever discusses advances in drone technology, focusing on cost reductions and the implementation of automated services, including beyond line of sight capabilities, for residential estates with SMART Security Solutions.

Read more...
Securing your estate beyond the gate
ATG Digital Access Control & Identity Management Residential Estate (Industry) AI & Data Analytics
Protecting gated communities and lifestyle estates requires a modern, intelligent approach. A truly intelligent system protects both physical and digital perimeters, it must be a fully integrated ecosystem.

Read more...
Data resilience at VeeamON
Technews Publishing SMART Security Solutions Infrastructure Information Security
SMART Security Solutions attended the VeeamON Tour in Johannesburg in August to learn more about data resilience and Veeam’s initiatives to enhance data protection, both on-site and in the cloud.

Read more...
Make BIG and COMPLEX small and manageable
neaMetrics Suprema AI & Data Analytics Surveillance Integrated Solutions
Traditional CCTV and access systems often operate separately, creating gaps in visibility and efficiency. TRASSIR and Suprema have partnered to develop an integrated platform that improves security, operations, and situational awareness.

Read more...
Get the AI fundamentals right
Leaderware Editor's Choice Surveillance AI & Data Analytics
Much of the marketing for CCTV AI detection implies the client can just drop the AI into their existing systems and operations, and they will be detecting all criminals and be far more efficient when doing it.

Read more...
SMART Surveillance Conference in Johannesburg
Arteco Global Africa Technews Publishing SMART Security Solutions Axis Communications SA neaMetrics Editor's Choice Surveillance Security Services & Risk Management Logistics (Industry) AI & Data Analytics
SMART Security Solutions hosted its annual SMART Surveillance Conference in Johannesburg in July, welcoming several guests, sponsors, and speakers for an informative and enjoyable day examining the evolution of the surveillance market.

Read more...
Secure data protection without hardware lock-in
Infrastructure Information Security News & Events
New Veeam Software Appliance empowers IT teams to achieve instant protection with Veeam’s fully preconfigured, software-only appliance, delivering enterprise-ready simplified deployment and operational efficiency, robust cyber resilience.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.