AI Will Be Disruptive - For Both Security & Jobs

The risks that generative Artificial Intelligence (AI) technology poses to cyber security, particularly in terms of chatbots and language processing programs like GPT-3 are significantly increasing. 

The new genre of AI could be as transformative as the Industrial Revolution, the British government’s outgoing chief scientific adviser, Sir Patrick Vallance, who has urged Britain to act immediately to prevent large numbers of people becoming jobless with the changes that ChatGPT-style, generative AI could bring.

“There will be a big impact on jobs and that impact could be as big as the Industrial Revolution was,” Vallance told the Commons science, innovation and technology committee. “There will be jobs that can be done by AI, which can either mean a lot of people don’t have a job, or a lot of people have jobs that only a human could do.” 

Since its launch in November 2022, ChatGPT, an AI  chatbot, has been causing quite a stir because of the software’s surprisingly human and accurate responses. The auto-generative system reached a record-breaking 100 million monthly active users only two months after launching. However, while its popularity continues to grow, the current discussion within the cyber security industry is whether this type of technology will aid in making the Internet safer or play right into the hands of those trying to cause chaos. 

Generative AI has helped bad actors to develop new attack strategies, enabling them to stay one step ahead of cyber security protections.

And as AI technologies become more sophisticated, they are being used by cyber criminals to create more convincing phishing emails and scam messages on a much larger scale. For example, AI-powered chatbots can engage in conversation with unsuspecting victims, making them more likely to divulge sensitive information or click on links that contain malware.

These types of attacks are becoming more common, and they can be difficult to detect and prevent. In response, cybersecurity experts are developing new AI-powered security systems that can identify and block malicious traffic. 

Cyber criminals adopted the technology to create convincing phishing emails. AI-generated text helps attackers produce highly personalised emails and text messages more likely to deceive targets. However, these systems are still in the early stages of development, and there is a risk that they could be circumvented by sophisticated AI-powered attacks. 

As AI technology continues to advance, it will become increasingly important for organisations to invest in robust cyber security systems that can protect against these new and evolving threats.

AI-powered chatbots also raise the question of job security. Of course, the current system couldn’t replace a highly trained professional, but this technology can significantly reduce the number of logs and reports that need to be inspected by an employee. This could, for example, have an impact on how many analysts a security operation centre would need to employ. 

AI has the potential to help protect against these emerging threats, but it also presents its own set of risks. Machines with high processing capabilities could hack systems faster and more effectively than humans. To counter these threats, we need to ensure that AI is used defensively and with a clear understanding of who is in control.

As AI becomes more integrated into society, it's important for lawmakers, judges, and other decision-makers to understand the technology and its implications. Building strong alliances between technical experts and policymakers will be crucial in navigating the future of AI in threat hunting and beyond. 

MIT:    ZDNet:     Business News:     Oodaloop:    Venturebeat:   Flipboard:    Guardian:    CPO Magazine

You Might Also Read: 

Regulatory Plans For Artificial Intelligence & Algorithms:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« ‘Godfather Of AI’ Warns Of Imminent Dangers
Meta Will Contest EU $1.3B Data Privacy Fine »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

NCX Group

NCX Group

NCX Group is committed to helping customers identify and mitigate the risks inherent in today’s interconnected environments and business processes.

Original Software

Original Software

Original Software offers a test automation solution focused completely on the goal of effective software quality management.

AirCUVE

AirCUVE

AirCUVE provide authentication and access control solutions for networks and mobile security.

App-Ray

App-Ray

App-Ray provides fully automated security analysis of mobile applications to find security issues, privacy breaches and data leaking potentials.

TeachPrivacy

TeachPrivacy

TeachPrivacy provides computer-based privacy and data security training that is engaging, memorable, and understandable.

Hack The Box

Hack The Box

Hack The Box is an online platform allowing you to test your penetration testing skills and exchange ideas and methodologies with thousands of people in the security field.

Lightship Security

Lightship Security

Lightship Security is an accredited Common Criteria and FIPS 140-2 IT security testing laboratory that specializes in test conformance automation solutions and IT product security certifications.

Evanston Technology Partners (ETP)

Evanston Technology Partners (ETP)

ETP provides services and solutions to enable and transform businesses in the areas of cybersecurity, data protection, and efficient operations practices.

Conduent

Conduent

Conduent delivers mission-critical technology services and solutions on behalf of businesses and governments. Solution areas include digital risk and compliance.

Open Quantum Safe (OQS)

Open Quantum Safe (OQS)

The Open Quantum Safe (OQS) project is an open-source project that aims to support the development and prototyping of quantum-resistant cryptography.

Getronics

Getronics

Getronics guides customers through their own transformation journeys, leveraging an integrated and secure-by-design IT portfolio.

Sentar

Sentar

Sentar is a cyber intelligence company, applying advanced analytics and systems engineering expertise to protect our national security by securing mission-critical assets.

Tenchi Security

Tenchi Security

Tenchi Security are specialized in Third-Party Cyber Risk Management (TPCRM) and aim to reduce information asymmetry when it comes to third and Nth-Party security and compliance risk management.

Qi An Xin (QAX)

Qi An Xin (QAX)

QAX is a listed company based in China, and a leader in cybersecurity industry, providing new generation enterprise-level and national-level cybersecurity solutions.

CyTwist

CyTwist

CyTwist is an early warning attack detection platform that complement your existing security suite and provides your security teams with unique detection capabilities of stealth targeted attacks.

SUCCESS Computer Consulting

SUCCESS Computer Consulting

SUCCESS Computer Consulting is a leader in managed IT and security services for small and medium-sized businesses in Minneapolis, St. Paul, and the surrounding Twin Cities Metro area.