The impact of AI on security

Issue 6 2025 Information Security, AI & Data Analytics

Today’s threat actors have moved away from signature-based attacks that legacy antivirus software can detect. They leverage ‘living-off-the-land’ techniques, using legitimate system tools such as PowerShell, WMI, and built-in Windows utilities to move laterally through networks. Attackers are now capable of spending days or longer in a network before detection. This is where AI has a critical role to play.


Peter Chan.

Artificial Intelligence (AI) in security systems is defined as the use of technologies such as machine learning, deep learning, and natural language processing to enhance the detection, analysis, and mitigation of security threats. It is further endorsed as beneficial for predictive threat detection and adaptive responses. Such solutions offer early detection of cyber threats in endpoint devices, including laptops, desktops, smartphones, and all things that fit into the ‘Internet of Everything’ world.

AI is capable of identifying patterns and anomalies that indicate potential threats faster and more accurately than traditional methods. Moreover, it enables behavioural analysis of devices and users to detect anomalies that may indicate a cyber-breach that can be blocked immediately by isolating affected devices. Further benefits of AI technologies include the ability to predict and pre-empt potential future threats, as well as the capacity for continuous learning from new data, which in turn improves accuracy and effectiveness.

Efficient identification and resolution

The future is being shaped by the evolution of Endpoint Detection Response (EDR) into Extended Detection and Response (XDR) platforms, which automate processes and enable security teams to more efficiently identify and resolve cyberattacks through AI and machine learning. These capabilities do not just rely on known signatures; they analyse behaviour across endpoints, networks, and identities to detect anomalies and stop attackers before they can fully establish themselves. AI-driven models are increasingly crucial to spotting subtle deviations that humans or traditional tools would miss.

The concept of a bad actor spending days or longer in your network may make your flesh crawl, but it is the reality behind the sophistication of cybercrime today. This is called dwell time, and it allows them to establish persistence, escalate privileges, and exfiltrate data using techniques that traditional endpoint protection simply was not designed to address.

Endpoints have become the launchpad for identity-based attacks, but many organisations still rely on perimeter-focused security models that assume the endpoint itself is trusted. Throwing tools at the situation is an obvious choice for many businesses, but in fact, it can actually make matters worse, as what is called ‘tool proliferation’ has become a significant challenge.

The answer lies with better integration. Companies using integrated security platforms detect threats faster and reduce false positives compared to those relying on disparate point solutions.

Security is a business issue, not a technical one

Effective measurement requires focusing on business-relevant outcomes rather than tool outputs. You need to measure Mean Time to Detection (MTTD) and Mean Time to Response (MTTR) – calculating the number of days it takes to identify and contain a breach. You must also examine what percentage of your endpoints provide real-time behavioural analytics. This is crucial. What you are seeking is reduced downtime from incidents and faster recovery times.

The most mature organisations also measure security friction through employee productivity metrics. If your endpoint security is generating help desk tickets or pushing users towards shadow IT, then your strategy is counterproductive, regardless of how many threats are blocked. Your security teams must be capable of testing your endpoint strategy against real-world attack scenarios, providing practical assurance that defences actually work under pressure.

Zero Trust principles offer a framework, but implementation must be pragmatic. Cost is always a major consideration with many organisations applying uniform policies that either over-protect low-risk endpoints (driving up costs) or under-protect critical assets. Cost optimisation comes from recognising that not all endpoints require the same level of protection.

A smarter approach is to implement adaptive authentication and conditional access policies that consider user behaviour, device posture, location, and data sensitivity. This can reduce friction, while improving protection for high-risk scenarios. The real challenge is instrumenting your environment so you understand the impact of controls on business workflows, then optimising them around actual risk.

In a nutshell, if companies want to win with endpoint security, they need to stop treating it as a technical barrier and instead view it as a business capability that engenders trust, resilience, and growth.

Find out more at www.bitm.co.za


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Who are you?
Access Control & Identity Management Information Security
Who are you? This question may seem strange, but it can only be answered accurately by implementing an Identity and Access Management (IAM) system, a crucial component of any company’s security strategy.

Read more...
Check Point launches African Perspectives on Cybersecurity report
News & Events Information Security
Check Point Software Technologies released its African Perspectives on Cybersecurity Report 2025, revealing a sharp rise in attacks across the continent and a major shift in attacker tactics driven by artificial intelligence

Read more...
What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
What is your ‘real’ security posture? (Part 2)
BlueVision Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.

Read more...
From the editor's desk: The beginning of the end
Technews Publishing News & Events
            As we come to the final issue of SMART Security Solutions, we can look back on a tough year: long decision-making cycles, squeezed budgets and the expectation of miracles on a shoestring. SMART Security ...

Read more...
IQ and AI
Leaderware Editor's Choice Surveillance AI & Data Analytics
Following his presentation at the Estate Security Conference in October, Craig Donald delves into the challenge of balancing human operator ‘IQ’ and AI system detection within CCTV control rooms.

Read more...
AI and automation are rewriting the cloud security playbook
Technews Publishing AI & Data Analytics
Old-school security relied on rules-based systems that flagged only what was already known. AI flips the script: it analyses massive volumes of data in real-time, spotting anomalies that humans or static rules would miss.

Read more...
Onsite AI avoids cloud challenges
SMART Security Solutions Technews Publishing Editor's Choice Infrastructure AI & Data Analytics
Most AI programs today depend on constant cloud connections, which can be a liability for companies operating in secure or high-risk environments. That reliance exposes sensitive data to external networks, but also creates a single point of failure if connectivity drops.

Read more...
Sophos announces evolution of its security operations portfolio
Information Security
Sophos has announced significant enhancements to its security operations portfolio via Sophos XDR and Sophos MDR offerings, marking an important milestone in its integration journey following the acquisition of Secureworks in February 2025.

Read more...
Cybersecurity operations done right
LanDynamix SMART Security Solutions Technews Publishing Information Security
For smaller companies, the costs associated with acquiring the necessary skills and tools can be very high. So, how can these organisations establish and maintain their security profile amid constant attacks and evolving technology?

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.