Artificial Intelligence Is Being Badly Used In Cyber Security

The cyber attack surface in modern enterprise environments is massive, and it’s continuing to grow rapidly. This means that analysing and improving an organisation’s cyber security posture needs more than mere human intervention.

There is currently a big debate going on over whether Artificial Intelligence (AI) is a good or bad thing in terms of its impact on human life.  With more and more enterprises using AI for their needs, it’s time to analyse the possible impacts of the implementation of AI in the cyber security field.

AI in cyber security is beneficial because it improves how security experts analyse and understand cyber crime. It enhances the cyber security technologies that companies use to combat cyber criminals and help keep organisations and customers safe. On the other hand, AI can be very resource intensive. It may not be practical in all applications. More importantly, it also can serve as a new weapon in the arsenal of cyber criminals who use the technology to hone and improve their cyber-attacks.

The cyber security industry is rapidly embracing the notion of “zero trust”, where architectures, policies, and processes are guided by the principle that no one and nothing should be trusted. However, the cyber security industry is simultaneously  incorporating a growing number of AI-driven security solutions that rely on some type of trusted “ground truth” as reference point.

Organisations are beginning to use AI in their cyber security, but a lot of the methods being employed put questions upon whether regulators, compliance officers, security professionals, and employees are able to trust these new security models.

Because AI models are sophisticated, obscure, automated, and oftentimes evolving, it is difficult to establish trust in an AI-dominant environment. Yet without trust and accountability, some of these models might be considered risk-prohibitive and may be restricted or banned altogether. 

  • AI security revolves around data, and making sure data quality and integrity really works. 
  • The data used to power AI-based cyber security systems faces further problems:
  • Cyber criminals can use data training data to infiltrate datasets and they can then disrupt and take down the security controls.
  • AI  significantly increases the number of data points

Security professionals are faced with dynamic and sophisticated adversaries that learn and adapt over time. Accumulating more security-related data might well improve AI-powered security models, but at the same time, it could lead adversaries to change their modus operandi, diminishing the efficacy of existing data and AI models. 

Another challenge for AI models emanates from unknown unknowns, or blind spots, that are seamlessly incorporated into the models’ training datasets and therefore attain a stamp of approval and might not raise any alarms from AI-based security controls.

Future

All of these challenges and more are detrimental to the ongoing effort to fortify islands of trust in AI-dominated cyber security industry. This is especially true in the current environment where we lack widely-accepted AI explainability, accountability, and robustness standards and frameworks. It is up to the data science and cyber security communities to design, incorporate, and advocate for robust risk assessments and stress tests, enhanced visibility and validation, hard-coded guardrails, and offsetting mechanisms that can ensure trust and stability in our digital ecosystem in the age of AI.

As the potential of AI is being explored to boost the cyber security profile of a corporation, it is also being developed by hackers. Since it is still being developed and its potential is far from reach, we cannot yet know whether it will one day be helpful or detrimental for cyber security. 

In the meantime, it’s important that organisations do as much as they can with a mix of traditional methods and AI to stay on top of their cyber security strategy. 

AI is fast emerging as a must-have technology for enhancing the performance of IT security teams. Humans can no longer scale to sufficiently secure an enterprise-level attack surface, and AI gives the much-needed analysis and threat identification that can be used by security professionals to minimise breach risk and enhance security posture. Moreover, AI can help discover and prioritize risks, direct incident response, and identify malware attacks before they come into the picture. So, even with the potential downsides, AI will serve to drive cybersecurity forward and help organisations create a more robust security posture. 

Business leaders are best advised to familiarise themselves with the cutting edge of AI safety and security research, which is still at a comparatively early stage. Only with better knowledge can decision makers can properly consider how adding  AI to their product or service will enhance user experiences, while weighing the costs of potentially subjecting users to additional data breaches and other unwelcome effects.

HBR:      Venturebeat:       CPO Magazine:       Computer.org:     The SSL Store:   

You Might Also Read: 

Can  Ethical AI Become A Reality?:

 

« SMEs Need To Close The Cyber Security Training Gap
Russian National Security Strategy »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

RIVA Solutions

RIVA Solutions

RIVA provides innovative best practices in IT and management consulting, program support services and emerging technologies.

Infosecurity Europe

Infosecurity Europe

Infosecurity Europe is Europe’s number one information security conference and exhibition.

Teneo

Teneo

Teneo is a Solutions Provider focused on reducing complexity. We combine leading technology with deep expertise to create new ideas on how to simplify IT operations.

Code42

Code42

Code42 CrashPlan, is an enterprise SaaS solution that backs up all distributed end-user data on a single, secure platform.

Cyber Aware

Cyber Aware

Cyber Aware aims to drive behaviour change amongst small businesses and individuals, so that they adopt simple secure online behaviours.

SynerComm

SynerComm

SynerComm is an IT solution provider specializing in network and security infrastructure, enterprise mobility, remote access, wireless solutions, audit, pentesting and information assurance.

Osirium

Osirium

The Osirium PxM Privileged Access Management platform addresses both security and compliance requirements by defining who gets access to what and when.

PizzlySoft

PizzlySoft

PizzlySoft is a global company that is seeking convergence of network and security / software and hardware. We put our value on creating the best security.

Secuvant

Secuvant

Secuvant is an independent IT Security firm providing enterprise-grade IT security services to mid-market organizations.

Iron Bow Technologies

Iron Bow Technologies

Iron Bow Technologies is a leading IT solution provider dedicated to successfully transforming technology investments into business capabilities for government, commercial and healthcare clients.

Eureka Security

Eureka Security

Eureka help organizations securely use any cloud data storage technology they need without having to compromise on security.

Flotek

Flotek

Flotek is an IT & Comms service provider delivering SMEs with trusted, innovative and cost effective cloud technology, with confidence, clarity and clout.

Securin

Securin

Securin offers a comprehensive portfolio of solutions including Attack Surface Management, Vulnerability Intelligence, Penetration Testing, and Vulnerability Management.

Emircom

Emircom

Emircom is one of the Middle East's leading independent providers of IT infrastructure services, helping clients to drive growth and deliver measurable outcomes.

Cakewalk

Cakewalk

Cakewalk is the new standard in easy Access Control. Trusted by IT & Security teams. Loved by employees.

Dedagroup (Deda)

Dedagroup (Deda)

Dedagroup provide application solutions and IT services to bring innovation at the core of business processes.