The Human Effect On AI Security

As a result of recent improvements in machine learning, the dreary work that was once done by people, filtering through apparently unlimited amounts of information searching for threat indicators and anomalies is now be capable of being automated. 

Artificial intelligence has transformed almost every industry in which it’s been used, including healthcare, the stock markets, and, increasingly, cybersecurity, where it’s being used to enhance human work and strengthen defenses, but ​humans remain front and centre in all aspects of cybersecurity.

With an expected 3.5 million cybersecurity positions expected to go unfilled by 2021 and with security ruptures increasing some 80% every year, infusing human knowledge with AI and machine learning tools is critical to shutting the talent availability gap. ​That is one of the recommendations of a report called Trust at Scale, recenlty released by cybersecurity experts Synack.

Synack reports that security teams that combine humans and artificial intelligence to do penetration testing can find vulnerabilities faster, cover a wider attack surface, and decrease the time needed to fix vulnerabilities. “There’s a lot of fear about artificial intelligence,” says Aisling MacRunnels, Synack’s chief marketing officer. “A lot of people think artificial intelligence is going to take over completely. What we have found is that there are definitely things that humans are wonderful at and there are things that machines are wonderful at and oftentimes they’re very different things.”

The combination of human and AI machines is important because "security risks and threats are always evolving and AI does not excel at higher-order tasks."  

When ethical human hackers were upheld by AI and machine learning, they became 73% increasingly proficient at identifying and evaluating IT risks and threats.The advantages of this are twofold:

  • Threats never again slip through the cracks because of fatigue or boredom, and cybersecurity experts are liberated to accomplish more strategic tasks, for example, remediation. 
  • Artificial intelligence can likewise be utilised to increase perceivability over the network. It can examine phishing by simulating clicks on email links and analysing word choice and grammar. It can monitor network communications for endeavored installation of malware, command and control communications, and the presence of suspicious packets. 

Furthermore, AI has changed virus detection from an exclusively signature-based framework which was entangled by issues with reaction time, proficiency, and storage requirements to the period of behavioral analysis, which can distinguish signatureless malware, zero-day exploits, and previously unidentified threats.

While the conceivable outcomes with AI appear to be unfathomable, the possibility that they could wipe out the role of people in cybersecurity divisions is unrealistic. 

While the ultimate objective of AI is to simulate human functions, for example, problem-solving, learning, planning, and intuition, there will consistently be things that AI can’t deal with (yet), as well as things AI should not handle.The principal classification incorporates things like creativity, which can’t be viably instructed or customised, and therefore will require the guiding hand of a human. 

While AI can unquestionably add speed and exactness to tasks generally handled by people, it is poor at extending the scope of such tasks. AI’s impact on the field of cybersecurity is the same as its effect on different disciplines, in that individuals frequently terribly overestimate what AI can do. 

Analytic Insights:        Tech Republic:      HR Executive:       Synack.com:

You Might Also Read: 

Industry 4.0 - Changing How We Live:

 

 

« Labour Party Risks £15m Fine For Not protecting Members' Data
GDPR's Impact In The US And Globally »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Blueliv

Blueliv

Blueliv is a leading provider of targeted cyber threat information and intelligence. We deliver automated and actionable threat intelligence to protect the enterprise and manage your digital risk.

Security Stronghold

Security Stronghold

Security Stronghold is focused on protecting computers from malicious programs like viruses, Trojans, spyware, adware, trackware, keyloggers and other kinds of online threats.

SecLytics

SecLytics

SecLytics is the leader in Predictive Threat Intelligence. Our SaaS-based Augur platform leverages behavioral profiling and machine learning to hunt down cyber criminals.

CICRA

CICRA

CICRA is Sri Lanka's pioneering cyber security training and consultancy provider.

Greenetics Solutions

Greenetics Solutions

Greenetics Solutions is a company focused on providing solutions for information security.

Quest Software

Quest Software

Simple IT management for a complex world. Whether it’s digital transformation, cloud expansion, security threats or something new, Quest helps you solve complex problems with simple solutions.

ACM-CCAS

ACM-CCAS

ACM is a UKAS-accredited certification body helping businesses around the world perform to a higher standard. Our certifications include ISO 27001 and ISO 22301.

Standards Council of Canada (SCC)

Standards Council of Canada (SCC)

SCC leads and facilitates the development and use of national and international standards and accreditation services in Canada.

Forever Group

Forever Group

Forever Group is a Managed Services Provider specialising in Telecommunications, IT Support, and Cyber Security.

Byos

Byos

Byos provides visibility of devices across all networks, regardless of location, integrating with your existing security stack.

Quad9 Foundation

Quad9 Foundation

Quad9 is a free security solution that uses DNS to protect your system against the most common cyber threats. It improves your system's performance, plus, it preserves and protects your privacy.

Gathid

Gathid

Gathid is a unique and versatile identity governance platform providing organizations with the ability to model, explore, audit, and track complex access-related scenarios.

CASwell

CASwell

Caswell is an industry-leading OEM/ODM specializing in networking, security, SD-WAN, NFV, telecommunication and IoT applications.

Securitybricks

Securitybricks

Securitybricks specialize in cloud security and compliance. Our mission is to automate regulatory compliance backed by human validation.

Texas Cyber Solutions

Texas Cyber Solutions

Texas Cyber Solutions are elite cybersecurity advisors based in Houston, Texas providing network security solutions, penetration testing, and more.

Sattrix Information Security

Sattrix Information Security

Sattrix Information Security helps small, mid, and large enterprises in the area of digital transformation with a focus on information security.