Balancing promise and reality

Issue 6 2023 Information Security


Helen Kruger.

The proliferation of artificial intelligence (AI) has undoubtedly left its mark on the cybersecurity landscape, introducing both opportunities and challenges. AI is a critical component in establishing efficient cybersecurity practices.

With the exponential growth of threats in modern environments, the ability to swiftly detect and respond to these threats would be nearly impossible without AI. However, the overhyped belief that AI alone can guarantee cybersecurity creates a significant gap in security strategies.

AI is pivotal in modern cybersecurity, enabling rapid threat detection and response. It empowers organisations to sift through a deluge of alerts and identify real threats efficiently, hence assisting in the mitigation of alert fatigue and significantly reducing false positives.

In this sense, AI is a powerful ally in maintaining a robust security posture, correlating many telemetry sources to build context around the attack surface and further strengthening detection capabilities.

The AI misconception

Some organisations, however, are mistakenly relying solely on AI-based solutions as a panacea for cybersecurity. Despite investing in state-of-the-art tools, breaches still occur. The reality is that AI alone is insufficient to combat the evolving threat landscape. Overestimating the effectiveness of AI solutions leaves organisations vulnerable.

The concept of Cybersecurity Operations, a synergy between artificial and human intelligence, is vital. This approach enables rapid reactions through machine learning and alert triaging and also enables proactive threat hunting and risk mitigation by humans.

Human experts must leverage AI-generated data to contextualise the attack surface and undergo significant processes to strengthen areas of weakness that AI systems have detected. Human expertise is indispensable for interpreting the information generated by AI structures and for proactive security posture management.

AI-empowered cybercriminals

Cybercriminals are harnessing AI to create more evasive and adaptive attacks. Even low-level threat actors can leverage AI to craft sophisticated phishing emails and target organisations effectively. This poses a significant risk to small and medium-sized enterprises (SMEs).

Imagine what a mastermind criminal could accomplish with AI at their disposal. Dynamically evolving attacks, deepfake audio and video for social engineering, AI-driven data manipulation, and forgery are all terrifying possibilities.

Despite these challenges, AI significantly improves threat detection capabilities. Machine learning and advanced algorithms enable AI to analyse vast datasets and identify risks faster than human analysts. AI enables a team to provide 24/7 real-time threat detection and response by allowing the security team to focus only on the alerts that matter.

The human element

While AI enhances threat detection and response, human intervention remains crucial. Humans are needed to critically interpret AI-generated information. AI does enable a faster reactive approach to cybersecurity. However, without the necessary human intervention, would one ever really be strengthening one’s security posture?

The synergy of human experts and AI enables an organisation to take a holistic view of its cybersecurity journey, enabling both a reactive and proactive approach to curbing cyber risk.

While certain AI technologies coupled with the necessary human resources may seem expensive for smaller organisations, Managed Detection and Response solutions (MDR) make this crucial cybersecurity approach more accessible to SMEs. MDR providers offer AI structures and the necessary manpower for cost-effective cybersecurity strategies.

Considering the potential cost and impact of a significant breach, the investment in an MDR solution becomes a compelling and cost-effective investment for SMEs concerned about their cybersecurity posture.

Addressing the skills shortage

The cybersecurity industry faces a skills shortage exacerbated by ever-increasing cyber risk. AI can help by reducing alert fatigue and allowing human resources to focus on critical tasks. However, there is still a pressing need for cybersecurity professionals with AI-related skills and roles.

These skills are not widely available and hence come at a premium price, which SMEs can often not justify. MDR solutions provide hassle-free capability to the customer at a fraction of the cost.

AI undeniably holds great promise in reinforcing cybersecurity efforts, but it is not a standalone solution. A balanced approach, where AI complements human expertise, is essential to combat the evolving cyber threat landscape effectively.

As cyber risks continue to rise, organisations must gain access to AI technologies and skilled professionals to build robust and proactive cybersecurity strategies. MDR is the perfect means to access these resources, especially for the SME market.

For more information, contact Troye, +27 11 705 2757, [email protected], www.troye.co.za




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

What are MFA fatigue attacks, and how can they be prevented?
Information Security
Multifactor authentication is a security measure that requires users to provide a second form of verification before they can log into a corporate network. It has long been considered essential for keeping fraudsters out. However, cybercriminals have been discovering clever ways to bypass it.

Read more...
SA's cybersecurity risks to watch
Information Security
The persistent myth is that cybercrime only targets the biggest companies and economies, but cybercriminals are not bound by geography, and rapidly digitising economies lure them in large numbers.

Read more...
Cyber insurance a key component in cyber defence strategies
Information Security
[Sponsored] Cyber insurance has become a key part of South African organisations’ risk reduction strategies, driven by the need for additional financial protection and contingency plans in the event of a cyber incident.

Read more...
Deception technology crucial to unmasking data theft
Information Security Security Services & Risk Management
The ‘silent theft’ of data is an increasingly prevalent cyber threat to businesses, driving the ongoing leakage of personal information in the public domain through undetected attacks that cannot even be policed by data privacy legislation.

Read more...
Data security and privacy in global mobility
Security Services & Risk Management Information Security
Data security and privacy in today’s interconnected world is of paramount importance. In the realm of global mobility, where individuals and organisations traverse borders for various reasons, safeguarding sensitive information becomes an even more critical imperative.

Read more...
Sophos celebrates partners and cybersecurity innovation at annual conference
News & Events Information Security
[Sponsored] Sun City hosted Sophos' annual partner event this year, which took place from 12 to 14 March. Sophos’ South African cybersecurity distributors and resellers gathered for an engaging two-day conference.

Read more...
The CIPC hack has potentially serious consequences
Editor's Choice Information Security
A cyber breach at the South African Companies and Intellectual Property Commission (CIPC) has put millions of companies at risk. The organisation holds a vast database of registration details, including sensitive data like ID numbers, addresses, and contact information.

Read more...
Navigating South Africa's cybersecurity regulations
Sophos Information Security Infrastructure
[Sponsored] Data privacy and compliance are not just buzzwords; they are essential components of a robust cybersecurity strategy that cannot be ignored. Understanding and adhering to local data protection laws and regulations becomes paramount.

Read more...
AI augmentation in security software and the resistance to IT
Security Services & Risk Management Information Security
The integration of AI technology into security software has been met with resistance. In this, the first in a series of two articles, Paul Meyer explores the challenges and obstacles that must be overcome to empower AI-enabled, human-centric decision-making.

Read more...
Milestone Systems joins CVE programme
Milestone Systems News & Events Information Security
Milestone Systems has partnered with the Common Vulnerability and Exposures (CVE) Programme as a CVE Numbering Authority (CNA), to assist the programme to find, describe, and catalogue known cybersecurity issues.

Read more...