AI, Security Culture & Rising Threats

When it comes to cybersecurity threats, 2023 has been a year of rapid change and continued growth. From Ransomware becoming ever more prevalent to Generative AI and ChatGPT bursting on the scene breaking down barriers to adoption making artificial intelligence a commonplace in both offensive and defensive cyber operations.

Now, with anyone able to access and use this technology, our imagination is our only limitation - but we may not always have the best of intentions.

As the cost-of-living crisis continues to bite, opportunists are increasingly looking to a make a few dollars to cover rent, mortgage, or put food on the table. The financial squeeze and more accessible tools to commit fraud create a lethal combination - and with the average cost of a data breach in the UK being £3.3 million, businesses need to ensure cybersecurity remains a high priority during these trying times.

As we look to the year ahead, cybersecurity threats and opportunities will continue to grow — but where should organisations focus their efforts? We look at the considerations that should be on every security leader's checklist in 2024.

AI Bridges The Cyber Skills Gap  

One of the greatest challenges organisations face is the skills gap. This has been growing for some time and is especially prevalent in cybersecurity. 50% of all UK businesses have a basic cybersecurity skills gap, meaning they’re unable to perform some of the most basic cybersecurity tasks, and there is an estimated shortfall of 11,200 people to meet the demand of the cyber workforce. Under-skilled and understaffed cyber security teams make it nearly impossible for companies to effectively defend themselves.

Moving into 2024, AI could offer a solution by lowering the barrier of entry for cybersecurity roles. Once we build more trust in GenAI in the cyber community, this tech can help to overcome the breadth and complexity of cybersecurity tools and open roles up to a wider talent pool.

CISOs and security leaders can focus on seek out individuals who are curious and good communicators rather than seeking out individuals with specific technical expertise. For example, being able to ask AI if something is normal for the environment and what actions they should take in each scenario nearly eliminates the technical nuances of security tools while also allowing businesses to train AI on internal procedures. AI can even help write tools and scripts, such as GitHub’s Copilot tool, allowing for individuals to tap into their creative power without needing the technical expertise to deliver it. Again, your imagination is your only limitation with the general availability of GenAI.

However, businesses must remain vigilant. While this tech will lower the barrier of entry for industry professionals, it will do the same for cybercriminals. We already have services such as ransomware-as-a-service which lower the barrier of entry for scammers who no longer need to figure out how to make their own tools to bypass various EDR and AV technologies. Instead, their job is simply to get someone to click on a link. In 2024, businesses must be even more prepared for criminals to keep pace with their own AI advancements. Attackers have already begun releasing various purpose built GPT’s like WormGPT, FraudGPT, and WolfGPT. These tools are enabling attackers to quickly and easily write malware, ransomware, phishing emails, phishing sites, discover vulnerabilities and much more.    

AI Drives Zero-Day Attacks  

Another type of cyberattack that is gaining momentum is zero-day attacks. Recently, attacker-side source code has been leveraging AI to pick out vulnerabilities, especially with open-source products. For instance, if an attacker can get a hold of source code of a widely used application or operating system and run it through AI that's focused on identifying buffer overflows and other vulnerabilities, it is going to identify 0-days a thousand times faster than a human could.

Going into 2024, businesses should continue to prioritise and patch but should expect zero days to grow by building out a Crtical Patch Management process.

While businesses have gotten better at patch and vulnerability management, attackers have been leveraging more zero-day vulnerabilities to combat these good processes. But even with these effective programs, exploitation of public-facing applications remains the top entry point (21.2%) for attackers according the Mandiants M-Trends report. Even though the attackers may have less low-hanging fruit, they continue to get creative — and with the ability to scan source code with AI, these threats will only increase further. On the other side of this coin, in 2024, we will start to see defensive solutions that leverage AI to nearly automate the entire process, from identification to bug-fix enabling businesses to keep in step with these actors.

As we stand at the crossroads of an ever-evolving digital landscape, the role of cybersecurity in safeguarding our interconnected world cannot be overstated.

Our adversaries are not only sophisticated but relentless, constantly looking for methods to improve. In this high-stakes game, AI emerges as a double-edged sword, offering unparalleled potential for both defense and offense. As we harness AI to predict, pre-empt, and respond to cyber threats, we must also be vigilant against its misuse by adversaries. The future of cybersecurity is not just about building stronger walls; it's about fostering a culture of security that contemplates the security implications in every aspect of the business, from finance to HR to engineering. 

Ultimately, security is a team sport. The only way to effectively fight this war is as a team while leveraging the same capabilities as our enemies. Technology is evolving at lightning speeds leaving defenders behind to catch up. By working together as a cohesive team, sharing knowledge, and staying ahead of technological advancements, we can create a digital ecosystem that is not just resilient but also trustworthy.

The war against cyber threats is ongoing, and victory lies in our collective effort to outpace, outsmart, and outmaneuver those who seek to undermine our digital security.   

Tom Gorup is Vice President Security Services at Edgio

Image: Amgun

You Might Also Read: 

Creating Order Out Of WAF Management Chaos:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

 

« Bridging The Cybersecurity Skills Gap With Efficiency
The Pivotal Role Of Access Control In Cyber Security »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Jones Day

Jones Day

Jones Day is an international law firm based in the United States. Practice areas include Cybersecurity, Privacy & Data Protection.

Identity Automation

Identity Automation

Identity Automation is a leading provider of Identity and Access Management software.

Robert Bosch Centre for Cyber-Physical Systems (RBCCPS)

Robert Bosch Centre for Cyber-Physical Systems (RBCCPS)

RBCCPS is an interdisciplinary research and academic centre within the Indian Institute of Science focused on research in cyber-physical systems.

Forter

Forter

Forter provides new generation fraud prevention to meet the challenges faced by modern enterprise e-commerce.

Garrison Technology

Garrison Technology

Garrison SAVI® is a unique technology for secure remote browsing that can dramatically change the risk profile for enterprise cyber security.

CipherMail

CipherMail

CipherMail provides email security products which allow organizations world wide to automatically protect their email against unauthorized access both in transit and at rest.

SBD Automotive

SBD Automotive

SBD Automotive are specialists in automotive technology providing independent research and consultancy to help create smarter, more secure, better connected, and increasingly autonomous cars.

Adlumin

Adlumin

Adlumin Inc. provides the enterprise-grade security operations platform and managed detection and response services that keep mid-market organizations secure.

Acceptto

Acceptto

Acceptto offers the first unified and continuous authentication identity access platform with No-Password.

Spin Technology

Spin Technology

SpinOne is a SaaS data protection platform designed to monitor, secure, and back up your G Suite and O365 data, improve compliance, and reduce IT costs.

Synamic Technologies

Synamic Technologies

Synamic Technologies was founded in 2018 as a start-up to automate cyber security processes. Our CISOSCOPE product automates vulnerability management, risk management and compliance.

Keysight Technologies

Keysight Technologies

Keysight is dedicated to providing tomorrow’s test technologies today, enabling our customers to connect and secure the world with their innovations.

Elisity

Elisity

Elisity Cognitive Trust is a new security paradigm that combines Zero Trust Network Access and an AI-enabled Software Defined Perimeter.

NexGen Cyber

NexGen Cyber

NexGen Cyber helps customers in commercial SMB markets with IT security, security integration, service management, outsourced service transition, and transformative security solutions.

Cybit

Cybit

Cybit is the one-stop-shop for digital transformation that scales in line with your growth.

Secur-Serv

Secur-Serv

Secur-Serv is a security-first managed services provider. We provides Managed IT, Managed Print, Managed Device, and Cybersecurity services to companies of every size.