The Human Effect On AI Security

As a result of recent improvements in machine learning, the dreary work that was once done by people, filtering through apparently unlimited amounts of information searching for threat indicators and anomalies is now be capable of being automated. 

Artificial intelligence has transformed almost every industry in which it’s been used, including healthcare, the stock markets, and, increasingly, cybersecurity, where it’s being used to enhance human work and strengthen defenses, but ​humans remain front and centre in all aspects of cybersecurity.

With an expected 3.5 million cybersecurity positions expected to go unfilled by 2021 and with security ruptures increasing some 80% every year, infusing human knowledge with AI and machine learning tools is critical to shutting the talent availability gap. ​That is one of the recommendations of a report called Trust at Scale, recenlty released by cybersecurity experts Synack.

Synack reports that security teams that combine humans and artificial intelligence to do penetration testing can find vulnerabilities faster, cover a wider attack surface, and decrease the time needed to fix vulnerabilities. “There’s a lot of fear about artificial intelligence,” says Aisling MacRunnels, Synack’s chief marketing officer. “A lot of people think artificial intelligence is going to take over completely. What we have found is that there are definitely things that humans are wonderful at and there are things that machines are wonderful at and oftentimes they’re very different things.”

The combination of human and AI machines is important because "security risks and threats are always evolving and AI does not excel at higher-order tasks."  

When ethical human hackers were upheld by AI and machine learning, they became 73% increasingly proficient at identifying and evaluating IT risks and threats.The advantages of this are twofold:

  • Threats never again slip through the cracks because of fatigue or boredom, and cybersecurity experts are liberated to accomplish more strategic tasks, for example, remediation. 
  • Artificial intelligence can likewise be utilised to increase perceivability over the network. It can examine phishing by simulating clicks on email links and analysing word choice and grammar. It can monitor network communications for endeavored installation of malware, command and control communications, and the presence of suspicious packets. 

Furthermore, AI has changed virus detection from an exclusively signature-based framework which was entangled by issues with reaction time, proficiency, and storage requirements to the period of behavioral analysis, which can distinguish signatureless malware, zero-day exploits, and previously unidentified threats.

While the conceivable outcomes with AI appear to be unfathomable, the possibility that they could wipe out the role of people in cybersecurity divisions is unrealistic. 

While the ultimate objective of AI is to simulate human functions, for example, problem-solving, learning, planning, and intuition, there will consistently be things that AI can’t deal with (yet), as well as things AI should not handle.The principal classification incorporates things like creativity, which can’t be viably instructed or customised, and therefore will require the guiding hand of a human. 

While AI can unquestionably add speed and exactness to tasks generally handled by people, it is poor at extending the scope of such tasks. AI’s impact on the field of cybersecurity is the same as its effect on different disciplines, in that individuals frequently terribly overestimate what AI can do. 

Analytic Insights:        Tech Republic:      HR Executive:       Synack.com:

You Might Also Read: 

Industry 4.0 - Changing How We Live:

 

 

« Labour Party Risks £15m Fine For Not protecting Members' Data
GDPR's Impact In The US And Globally »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

InfoSec People

InfoSec People

InfoSec People is a boutique cyber and technology recruitment consultancy, built by genuine experts.

Redcentric

Redcentric

Redcentric is a leading UK IT managed services provider. We deliver managed IT, cloud computing, data backup, information security services and managed networks.

mnemonic

mnemonic

mnemonic helps businesses manage their security risks, protect their data and defend against cyber threats.

Gatewatcher

Gatewatcher

Gatewatcher is a digital breach detection platform targeting crafted attacks and protecting organizations against advanced cyber threats.

Vaulto Technologies

Vaulto Technologies

Vaulto protects critical business processes that are conducted via the cellular network.

Center for Long-Term Cybersecurity (CLTC)

Center for Long-Term Cybersecurity (CLTC)

The Center for Long-Term Cybersecurity is developing and shaping cybersecurity research and practice based on a long-term vision of the internet and its future.

Cancom

Cancom

CANCOM group is one of the leading providers of IT infrastructure and IT services in Germany and Austria. Solution areas include network security.

Wizlynx PTE LTD

Wizlynx PTE LTD

Wizlynx PTE LTD is the Singapore branch of Wizlynx Group located in Singapore, offering Information and Cyber Security Services throughout the entire Asia Pacific (APAC) region.

CryptoMill Cybersecurity Solutions

CryptoMill Cybersecurity Solutions

CryptoMill Cybersecurity Solutions provides advanced, innovative data security solutions for enterprises, professionals and individuals.

Amadeus Capital Partners

Amadeus Capital Partners

Amadeus Capital Partners offers over 20 years’ experience in technology investment. Our areas of focus include AI & machine learning and cyber security.

CyberCX

CyberCX

CyberCX provides services from strategic consulting, security testing and training to world-class managed services and engineering solutions.

DeepView

DeepView

DeepView delivers a unified platform for managing risk on digital platforms. One interactive secure portal allowing employees to engage their networks securely and compliantly.

VLATACOM Institute

VLATACOM Institute

Vlatacom Institute is privately owned accredited research and development institute, system integrator and turn-key solution provider. Areas of expertise include encryption and authentication.

UST

UST

UST is a global provider of digital technology and transformation, IT services and solutions including managed security services.

Innovex Global

Innovex Global

Innovex is a full-service executive search and advisory business that engages with early-stage startups, scale-ups, and established businesses in the Fintech, Cybersecurity and Technology industries.

Securix

Securix

SECURIX AG delivers holistic IT security solutions that are tailored to the specific challenges and requirements of your company.