AI Will Soon Replace Cyber Security Staff

Artificial Intelligence (AI) is becoming normal in today's electronically connected world. Combining the latest powerful software with top-of-the-range hardware, AI tools are being used to transform many areas of everyday life, from healthcare to traffic problems.  Running on huge amounts of data and  detailed algorithms, AI systems can perform mammoth computing tasks faster and more efficiently than humans, helping making big strides in research and development.  Now, a survey has revealed the widespread conviction that  cyber security jobs will eventually be entirely automated, operating without human intervention. 

Based on  interviews with 500 UK IT decision-makers, the leading security firm Trend Micro has found that more than third  (41%) believe that AI will replace their role by 2030.

AI's effect on many types of work will prove to be disruptive, projecting a future vision in which robots take jobs from human workers. Alternatively, there is a vision that automation can  create more jobs than it eliminates by providing new tools to exploit as yet unimagined business opportunities.

  • 32% of respondents said that they believed that technology would eventually automate all cyber security jobs.
  •  Only 9% of the survey respondents said they were confident that AI would “definitely” not replace their jobs within the next ten years.
  •  45% of IT bosses were planning to invest in cyber security  training and education - a crucial development  if individuals that are negatively impacted by AI can be re-deployed in other roles.

There are a range of concerns about the impact of  AI, from making many forms of employment for certain professions  obsolete, to the existential  threat that a super intelligent, self-learning machine could pose to humanity.  However, AI can be designed to empower people to share their skills and knowledge and the scope of human intelligence will always exceed even the most powerful AI.

For this reason, it’s important to remain focused on using this powerful technology to support humans, not replace them. While certain industries will need to adapt to AI being used for many tasks, this will remain under the direction of humans.

The risk in coming years is that businesses will attempt to use AI negatively, instead of reinforcing human knowledge and skills. If businesses use AI to undermine their staff and make them feel vulnerable, like using it solely to monitor employee performance, then trust will evaporate. When planning how to best deploy and develop AI decision makers should remember that it’s much harder to regain after it’s been lost than it is to build and maintain it. 

Trend Micro:    TechRadar:        Synet Solutions:      Techradar:      Wired

You Might Also Read: 

E-Businesses That Don’t Require Employees:

 

« Take Your Network Security One Step Further
The Cyber Security Top Ten Power List »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Landry & Associates

Landry & Associates

Landry & Associates is a multidisciplinary firm specializing in risk management, performance and technology management.

App-Ray

App-Ray

App-Ray provides fully automated security analysis of mobile applications to find security issues, privacy breaches and data leaking potentials.

Crossmatch

Crossmatch

Crossmatch is a world leader in risk-based composite authentication and biometric identity management.

VMRay

VMRay

VMRay delivers advanced threat analysis and detection that combines a unique agentless hypervisor-based network sandbox with a real-time reputation engine.

CyberGhost

CyberGhost

CyberGhost is a Virtual Private Network services provider offering secure encrypted access to the internet.

CryptoMill Cybersecurity Solutions

CryptoMill Cybersecurity Solutions

CryptoMill Cybersecurity Solutions provides advanced, innovative data security solutions for enterprises, professionals and individuals.

Eclypsium

Eclypsium

Eclypsium protects organizations from the foundation of their computing infrastructure upward, controlling the risk and stopping threats inside firmware of laptops, servers, and networks.

Open Raven

Open Raven

Open Raven is the cloud native data security platform that prevents breaches driven by modern speed and sprawl. Restore full visibility and regain control within minutes, without agents.

Nexor

Nexor

Nexor are a UK-based cyber security company with 30 years' experience in secure information exchange.

Fasken

Fasken

Fasken is one of the largest business law firms in Canada and a recognized leader in privacy and cybersecurity law.

Datenschutz Schmidt

Datenschutz Schmidt

Datenschutz Schmidt is a service provider with many years of experience, we support you in complying with numerous data protection guidelines, requirements and laws.

Redpoint Security

Redpoint Security

Redpoint Security is an application security consulting firm that is focused on all aspects of code security.

HackNotice

HackNotice

HackNotice Teams is an all-in-one encompassing tool that monitors threats within your organization, different vendors, and third parties whose services you use.

Inholo

Inholo

Inholo offers tools to manage the risks of synthetic realities, starting with an AI-photo detection service.

Treacle Technologies

Treacle Technologies

Treacle Technologies are a Cyber Security startup with a focus on Defensive Security.

Jersey Cyber Security Centre (JCSC)

Jersey Cyber Security Centre (JCSC)

Jersey Cyber Security Centre is the jurisdiction's Cyber Emergency Response Team (CERT) and national technical authority for cyber security.