AI Will Be Disruptive - For Both Security & Jobs

The risks that generative Artificial Intelligence (AI) technology poses to cyber security, particularly in terms of chatbots and language processing programs like GPT-3 are significantly increasing. 

The new genre of AI could be as transformative as the Industrial Revolution, the British government’s outgoing chief scientific adviser, Sir Patrick Vallance, who has urged Britain to act immediately to prevent large numbers of people becoming jobless with the changes that ChatGPT-style, generative AI could bring.

“There will be a big impact on jobs and that impact could be as big as the Industrial Revolution was,” Vallance told the Commons science, innovation and technology committee. “There will be jobs that can be done by AI, which can either mean a lot of people don’t have a job, or a lot of people have jobs that only a human could do.” 

Since its launch in November 2022, ChatGPT, an AI  chatbot, has been causing quite a stir because of the software’s surprisingly human and accurate responses. The auto-generative system reached a record-breaking 100 million monthly active users only two months after launching. However, while its popularity continues to grow, the current discussion within the cyber security industry is whether this type of technology will aid in making the Internet safer or play right into the hands of those trying to cause chaos. 

Generative AI has helped bad actors to develop new attack strategies, enabling them to stay one step ahead of cyber security protections.

And as AI technologies become more sophisticated, they are being used by cyber criminals to create more convincing phishing emails and scam messages on a much larger scale. For example, AI-powered chatbots can engage in conversation with unsuspecting victims, making them more likely to divulge sensitive information or click on links that contain malware.

These types of attacks are becoming more common, and they can be difficult to detect and prevent. In response, cybersecurity experts are developing new AI-powered security systems that can identify and block malicious traffic. 

Cyber criminals adopted the technology to create convincing phishing emails. AI-generated text helps attackers produce highly personalised emails and text messages more likely to deceive targets. However, these systems are still in the early stages of development, and there is a risk that they could be circumvented by sophisticated AI-powered attacks. 

As AI technology continues to advance, it will become increasingly important for organisations to invest in robust cyber security systems that can protect against these new and evolving threats.

AI-powered chatbots also raise the question of job security. Of course, the current system couldn’t replace a highly trained professional, but this technology can significantly reduce the number of logs and reports that need to be inspected by an employee. This could, for example, have an impact on how many analysts a security operation centre would need to employ. 

AI has the potential to help protect against these emerging threats, but it also presents its own set of risks. Machines with high processing capabilities could hack systems faster and more effectively than humans. To counter these threats, we need to ensure that AI is used defensively and with a clear understanding of who is in control.

As AI becomes more integrated into society, it's important for lawmakers, judges, and other decision-makers to understand the technology and its implications. Building strong alliances between technical experts and policymakers will be crucial in navigating the future of AI in threat hunting and beyond. 

MIT:    ZDNet:     Business News:     Oodaloop:    Venturebeat:   Flipboard:    Guardian:    CPO Magazine

You Might Also Read: 

Regulatory Plans For Artificial Intelligence & Algorithms:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« ‘Godfather Of AI’ Warns Of Imminent Dangers
Meta Will Contest EU $1.3B Data Privacy Fine »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

JumpCloud

JumpCloud

JumpCloud's Directory-as-a-Service (DaaS) is the single point of authority to authenticate, authorize, and manage the identities of a business’s employees and the systems and IT resources they need.

Grid32

Grid32

Grid32 provides independent computer system and physical security audit services to government and corporate clients of all sizes.

Optimum Insurance

Optimum Insurance

Optimum's Cyber Risk & Data Protection Insurance policies are designed to protect against cyber exposures that arise when a company’s data and customer information is breached or stolen.

GSMA - IoT Security Guidelines

GSMA - IoT Security Guidelines

GSMA has created a set of security guidelines for the benefit of service providers who are looking to develop new IoT products and services.

ATSEC Information Security

ATSEC Information Security

ATSEC is an independent, privately-owned company that focuses on providing laboratory and consulting services for information security.

Genua

Genua

Genua is a specialist in IT security services and solutions ranging from network and infrastructure security to encrypted comms and industrial automation.

Cyber Security & Information Systems Information Analysis Center (CSIAC)

Cyber Security & Information Systems Information Analysis Center (CSIAC)

CSIAC is chartered to leverage best practices and expertise from government, industry, and academia on cyber security and information technology.

Ponemon Institute

Ponemon Institute

Ponemon Institute conducts independent research on data protection and emerging information technologies.

mPrest

mPrest

mPrest is a global provider of mission-critical monitoring and control solutions for the defense, security, utility and Industrial Internet of Things (IoT) sectors.

Netlawgic Legal Services

Netlawgic Legal Services

Netlawgic is exclusively focused on delivering cyber law solutions to the industry. We provide our clients with specialized attention and problem solving in all aspects of cyber law.

ZEBOX

ZEBOX

ZEBOX is an international incubator & accelerator of innovative startups. Focus is on Transport/Logistics and Industry X.0 including technologies such as AI, Blockchain and Cybersecurity.

Russell Reynolds Associates

Russell Reynolds Associates

Russell Reynolds Associates is a global leadership advisory and search firm with functional expertise in Digital Leadership, Data & Analytics, and Compliance.

R-Tech

R-Tech

R-Tech GmbH manages the digital start-up initiative, whose goal is to build a sustainable start-up culture in the field of digitization throughout the Upper Palatinate district of Bavaria.

ISSQUARED

ISSQUARED

ISSQUARED is a leading provider of Cyber Security, Cloud, Infrastructure, Consulting and Digital Transformation services.

Custom Computer Specialist (CCS)

Custom Computer Specialist (CCS)

CCS offers an extensive range of services including cybersecurity solutions, consulting, implementation, and support to help our clients maximize the value derived from IT investments.

Athena7

Athena7

Athena7 is a dedicated assessment practice committed to helping organizations understand how their infrastructure, backups, and security controls will withstand the latest threat actor tactics.