The impact of AI on security

Issue 6 2025 Information Security, AI & Data Analytics

Today’s threat actors have moved away from signature-based attacks that legacy antivirus software can detect. They leverage ‘living-off-the-land’ techniques, using legitimate system tools such as PowerShell, WMI, and built-in Windows utilities to move laterally through networks. Attackers are now capable of spending days or longer in a network before detection. This is where AI has a critical role to play.


Peter Chan.

Artificial Intelligence (AI) in security systems is defined as the use of technologies such as machine learning, deep learning, and natural language processing to enhance the detection, analysis, and mitigation of security threats. It is further endorsed as beneficial for predictive threat detection and adaptive responses. Such solutions offer early detection of cyber threats in endpoint devices, including laptops, desktops, smartphones, and all things that fit into the ‘Internet of Everything’ world.

AI is capable of identifying patterns and anomalies that indicate potential threats faster and more accurately than traditional methods. Moreover, it enables behavioural analysis of devices and users to detect anomalies that may indicate a cyber-breach that can be blocked immediately by isolating affected devices. Further benefits of AI technologies include the ability to predict and pre-empt potential future threats, as well as the capacity for continuous learning from new data, which in turn improves accuracy and effectiveness.

Efficient identification and resolution

The future is being shaped by the evolution of Endpoint Detection Response (EDR) into Extended Detection and Response (XDR) platforms, which automate processes and enable security teams to more efficiently identify and resolve cyberattacks through AI and machine learning. These capabilities do not just rely on known signatures; they analyse behaviour across endpoints, networks, and identities to detect anomalies and stop attackers before they can fully establish themselves. AI-driven models are increasingly crucial to spotting subtle deviations that humans or traditional tools would miss.

The concept of a bad actor spending days or longer in your network may make your flesh crawl, but it is the reality behind the sophistication of cybercrime today. This is called dwell time, and it allows them to establish persistence, escalate privileges, and exfiltrate data using techniques that traditional endpoint protection simply was not designed to address.

Endpoints have become the launchpad for identity-based attacks, but many organisations still rely on perimeter-focused security models that assume the endpoint itself is trusted. Throwing tools at the situation is an obvious choice for many businesses, but in fact, it can actually make matters worse, as what is called ‘tool proliferation’ has become a significant challenge.

The answer lies with better integration. Companies using integrated security platforms detect threats faster and reduce false positives compared to those relying on disparate point solutions.

Security is a business issue, not a technical one

Effective measurement requires focusing on business-relevant outcomes rather than tool outputs. You need to measure Mean Time to Detection (MTTD) and Mean Time to Response (MTTR) – calculating the number of days it takes to identify and contain a breach. You must also examine what percentage of your endpoints provide real-time behavioural analytics. This is crucial. What you are seeking is reduced downtime from incidents and faster recovery times.

The most mature organisations also measure security friction through employee productivity metrics. If your endpoint security is generating help desk tickets or pushing users towards shadow IT, then your strategy is counterproductive, regardless of how many threats are blocked. Your security teams must be capable of testing your endpoint strategy against real-world attack scenarios, providing practical assurance that defences actually work under pressure.

Zero Trust principles offer a framework, but implementation must be pragmatic. Cost is always a major consideration with many organisations applying uniform policies that either over-protect low-risk endpoints (driving up costs) or under-protect critical assets. Cost optimisation comes from recognising that not all endpoints require the same level of protection.

A smarter approach is to implement adaptive authentication and conditional access policies that consider user behaviour, device posture, location, and data sensitivity. This can reduce friction, while improving protection for high-risk scenarios. The real challenge is instrumenting your environment so you understand the impact of controls on business workflows, then optimising them around actual risk.

In a nutshell, if companies want to win with endpoint security, they need to stop treating it as a technical barrier and instead view it as a business capability that engenders trust, resilience, and growth.

Find out more at www.bitm.co.za


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Rise in malicious insider threat reports
News & Events Information Security
Mimecast Study finds 46% of SA organisations report a rise in malicious insider threat reports over the past year: reveals disconnect between security awareness and technical controls as AI-powered attacks accelerate.

Read more...
Surveillance & AI roundtable
DeepAlert Lytehouse Refraime SMART Security Solutions Technews Publishing Editor's Choice Surveillance Integrated Solutions AI & Data Analytics
SMART Security Solutions held an online roundtable with a few surveillance experts to explore the intersection of surveillance and AI, gaining insights into the market and how control rooms are evolving.

Read more...
New campaign exploiting Google Tasks notifications
News & Events Information Security
New phishing scheme abuses legitimate Google Tasks notifications to trick corporate users into revealing corporate login credentials, which can then be used to gain unauthorised access to company systems, steal data, or launch further attacks.

Read more...
SMARTpod talks about HomeSec Expo 2026
SMART Security Solutions Technews Publishing News & Events Residential Estate (Industry) Videos
SMARTpod, the podcast from SMART Security Solutions, finds out more about the upcoming HomeSec Expo happening at Gallagher Estate on 4 & 5 March 2026.

Read more...
Making a mesh for security
Information Security Security Services & Risk Management
Credential-based attacks have reached epidemic levels. For African CISOs in particular, the message is clear: identity is now the perimeter, and defences must reflect that reality with coherence and context.

Read more...
What’s in store for PAM and IAM?
Access Control & Identity Management Information Security
Leostream predicts changes in Identity and Access Management (IAM) and Privileged Access Management (PAM) in the coming year, driven by evolving cybersecurity realities, hybridisation, AI, and more.

Read more...
The challenges of cybersecurity in access control
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security
SMART Security Solutions summarises the key points dealing with modern cyber risks facing access control systems, from Mercury Security’s white paper “Meeting the Challenges of Cybersecurity in Access Control: A Future-Ready Approach.”

Read more...
Access as a Service is inevitable
Technews Publishing SMART Security Solutions ATG Digital Access Control & Identity Management Infrastructure
When it comes to Access Control as a Service (ACaaS), most organisations (roughly 90% internationally) plan to move, or are in the process of moving to the cloud, but the majority of existing infrastructure (about 70%) remains on-premises for now.

Read more...
Securing your access hardware and software
SMART Security Solutions Technews Publishing RBH Access Technologies Access Control & Identity Management Information Security
Securing access control technology is critical for physical and digital security. Every interaction between readers, controllers, and host systems creates a potential attack point for those with nefarious intent.

Read more...
From friction to trust
Information Security Security Services & Risk Management Financial (Industry)
Historically, fraud prevention has been viewed as a trade-off between robust security and a seamless customer journey, with security often prevailing. However, this can impair business functionality or complicate the customer journey with multiple logins and authentication steps.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.