How AI Will Solve The Skills Shortage

A mathematical hypothesis called the singularity was suggested by Vinod Khosla’s recent interview in the Wall Street Journal and his prediction of massive job displacement and the growth of new industries due to the widespread adoption of artificial intelligence (AI).

The singularity is a point and phase in the future when bio, nano, energy, robotic, and computer technology will develop at such a rate, become so advanced, and have such a profound impact on humanity, that today’s society has no means to understand or describe what life will be like at that time in the future.

It made me wonder how far and fast we are heading in the same explosion of unfathomable change occurring today in information security. Just as IT revolutionized all forms of business in the last half-century, and the Internet in turn revolutionised IT in the last quarter-century, the trajectory we are on now places AI squarely at the next technology inflection point.

The study of history often provides a strong predictor of human societal change. When history unexpectedly veers off course, it is usually due to a substantial technology advancement and the subsequent seismic changes it brings to business and economic systems.

Our perception and use of AI today, also known as machine intelligence, is still in its infancy. New industries are learning by doing, just as we did when the Internet was in its infancy. 

Looking back, it’s easy to wince and laugh at interviews of experts in the mid-1990s describing the revolutionary nature of email and the world wide web and their dire predictions about the dreaded Y2K. Their projections were both right and wrong, limited in part by what they understood at the time. The impact of what the Internet would ultimately deliver to business and, in turn, society, could not have been foreseen.

The Promise of AI

As a new swath of information security technologies deploy their first generation of AI, seeking to solve many of the security and confidentiality issues that have plagued businesses over the last 40 years, we’re already starting to feel their positive impact.

The information security world is now starved for human capital. There is a global shortage of experienced security workers across the spectrum of skills and specialties. This is holding back advancement and exposing IT systems and Internet businesses to criminality and ransom.

Unlike industries that fear the intrusion of AI, the information security industry, driven largely by a global shortage of qualified employees, is embracing it. As networks become more sophisticated, generate more data, and are exposed to increasingly advanced threats, AI and the automation it empowers are the cure.

This first generation of AI-driven security solutions are focused primarily on automatically sifting through data, hunting for threats, and facilitating a human-led remediation plan. When the first generation of security AI masters threat detection, it will be entrusted with preemptive threat mitigation and auto-remediation of known threats.

Our perception of today’s 24x7 security operations center will eventually be replaced with the second generation of AI-led security technology, leaving human operators to focus on business continuity and critical support issues.

However, just as AI is a boon to the defender, so too is it to the attacker. 

Defense contractors and governments around the world are already using AI to sift through great lakes of network data and intelligence, and hunt for exploitable weaknesses. Just as fast as armies introduced tanks to warfare, tank-on-tank warfare became a necessity. AI-on-AI warfare has just begun.

Dark Reading:              IBM’s Watson Takes Aim At CyberSecurity:    

Artificial Intelligence & Machine Learning Market To Grow Fivefold By 2020:


 

 

« Russia Waging Cyberwar On Ukraine
Vladimir Putin & Donald Trump: Relationship Counselling »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Titus

Titus

Titus is a global leader in enterprise-grade data protection solutions.

National Agency for the Security of Information Systems (ANSSI) - France

National Agency for the Security of Information Systems (ANSSI) - France

The role of Agence Nationale de la Sécurité des Systèmes d'Information (ANSSI) is to foster a coordinated, ambitious, pro-active response to cybersecurity issues in France.

Armadillo Sec

Armadillo Sec

Armadillo provide penetration testing and vulnerability assessment services.

Acutec

Acutec

Acutec is an award winning IT support, services and solutions provider including managed IT Security and backup/disaster recovery.

DTS Solution

DTS Solution

DTS Solution delivers advanced cyber security solutions through is technology partnerships with industry leading security vendors and advanced consulting services.

Telesoft Technologies

Telesoft Technologies

Telesoft Technologies is a global provider of cyber security, telecom and government infrastructure products and services.

Logic Supply

Logic Supply

Logic Supply is a global industrial PC company focused on hardware for the IoT edge. We design highly-configurable computers engineered for reliability.

Basque Digital Innovation Hub (BDIH)

Basque Digital Innovation Hub (BDIH)

The aim of the BDIH initiative is to provide industrial enterprises, especially SMEs, with the technological capabilities needed to meet the challenges of industry 4.0.

DataEndure

DataEndure

DataEndure helps companies build digital resilience so that their critical information assets are protected and available to the right people, at the right time.

Lionfish Cyber Security

Lionfish Cyber Security

Lionfish Cyber Evolution & Empowerment Model™ empowers SMBs to prepare and protect themselves against cyber threats using a unique combination of on-demand training, support and managed services.

GateKeeper Enterprise

GateKeeper Enterprise

The GateKeeper Enterprise software is an identity access management solution. Automated proximity-based authentication into computers and websites. Passwordless login and auto-lock PCs.

Absa Cybersecurity Academy

Absa Cybersecurity Academy

Absa Cybersecurity Academy is an initiative aimed at empowering marginalised South African youths to become certified cybersecurity specialists.

Innefu Labs

Innefu Labs

Innefu is an Information Security R&D startup, providing cutting edge Information Security & Data Analytics solutions.

Cerby

Cerby

Your team uses unmanageable applications that put you, your company, and your data at risk. Protect, secure, and accelerate your business automatically with Cerby.

Cambridge International Systems

Cambridge International Systems

For more than 25 years, Cambridge has been fighting bad actors in both the cyber and physical worlds.

National Cybersecurity Competence Center (NC3) - Luxembourg

National Cybersecurity Competence Center (NC3) - Luxembourg

The purpose of the is to strengthen the Country's ecosystem facing cyber Luxembourg National Cybersecurity Competence Centerthreats and risks.