Understanding The Threats & Opportunities Posed By AI

It wasn’t long ago when we all thought the idea of artificial intelligence being capable of surpassing our own intelligence as science-fiction fantasy. But the release and widespread adoption of Language Learning Models (LLMs) also known as Generative AI such as ChatGPT, Google PaLM and Gemini, Meta’s LLaMA and more has started to open the eyes of many to the true potential of AI. 

As with anything new, comprehending AI’s capabilities will take time to fully understand. For security professionals, however, keeping a finger on the pulse of new developments and getting up to speed quickly must be made a priority.

AI can provide the means for security teams to operate more efficiently and effectively - an opportunity that’s become hard to ignore under current pressures.

According to one report, cyberattacks increased two or threefold across nearly every tracked metric in 2023, as cybercriminals continued to ramp up and diversify their attacks. This included attack volumes, with encrypted threats up 117% and cryptojacking up 659% year over year.

Unfortunately, this upward trend looks unlikely to abate anytime soon. For instance, a 2024 assessment from the UK’s National Cyber Security Centre has warned that artificial intelligence will almost certainly increase the volume and impact of cyberattacks in the next two years. Further, according to data from Statista, the FBI and IMF, the total cost of cybercrime globally is expected to skyrocket to $23.84 trillion by 2027, up from $11.50 trillion in 2022.

With attack volumes on the rise, analysts are already finding themselves inundated with alerts, fighting an uphill battle. And we’ve already seen the potential for AI technologies such as deepfakes to add additional complexity, heightening these stresses further.

While a video impersonating Ukrainian President Volodymyr Zelensky which falsely requested that the country’s forces lay down their arms and surrender stands as a prime example, similar technologies have also been deployed against corporations. Indeed, back in 2020, one cybercriminal stole $35 million after using AI to successful clone a company director’s voice and trick a bank manager.

As AI-led threats continue to rise, with one report suggesting that deepfake fraud attempts increased by a whopping 31 times in 2023 (a 3,000% increase year-on-year), cybersecurity professionals must ensure they are one step ahead. But are they?

Awareness Is Growing, But Understanding Is Limited

In surveying 205 IT security decision makers, we sought to explore industry attitudes towards and understanding of AI within a cybersecurity context.

During our analyses of responses, it became clear that awareness surrounding AI as a growing cyber threat exists, with the majority (59%) of respondents agreeing that AI is increasing the number of cybersecurity attacks. Further, 61% expressed apprehension over the growth of AI, indicating that this is an area of concern within the industry.  

Such sentiment aligns with the uptick in threats seen during 2023 as ‘offensive AI’ becomes increasingly deployed in areas such as deepfake phishing and malware creation.

However, despite the concerns, the survey revealed that less than half (46%) of IT security decision makers believe they grasp the impact of AI on cyber security. Digging deeper, it is perhaps even more worrying to see that CIOs have the least understanding (42%) – a statistic which may have implications in terms of how proactive organisations are able to be in addressing threats, educating end users and equipping the business with AI-enabled tools.

Fortunately, this is not to say that cybersecurity teams aren’t working to overcome the gaps in understanding that exist at present. Indeed, data from the survey shows that cybersecurity professionals are seeing AI as an important addition to enhance security operations.

Perceptions of the role that AI can play in enhancing security practices were largely positive, with more than two thirds (67%) of respondents agreeing it will improve security operations by automating routine tasks. Further, 71% stated that incident response would benefit from data analysis at scale and identifying threats in real-time.
Seizing the AI-led opportunities

Without question, it is vital that cybersecurity teams quickly find and embrace the benefits that AI offers them in order to keep pace with cybercriminals.

Increasingly, we expect that conventional cyberattacks will fall by the wayside as AI technologies become more widely available, appealing and accessible, and thus providing attackers with a means of expanding and enhancing their capabilities.

To combat these threats, security professionals should deploy AI in several ways. Not only can such technologies be used defensively, improving the speed and accuracy of incident response. Equally, they can be used offensively to enhance penetration tests, helping to identify potential vulnerabilities, misconfigurations and other weaknesses in networks and endpoints.

While the true extent of the impact that AI will have on cybercrime remains to be seen, cybersecurity professionals -  particularly at the senior level -  must work to improve their understanding and response. 

Being AI-ready

Another important consideration for organisations is how to deploy AI capabilities within their business securely. There is much excitement around the creative and productivity benefits that AI will bring. However, if deployed without adequate preparation, can significantly increase an organisation’s exposure to threats. Most significant in this respect is information and data security. If the organisation does not ensure proper classification and labelling of its data and related access permissions, there is a danger that unauthorised access to sensitive information just gets a whole lot easier. It is critical therefore that before LLMs start to interrogate large unprotected datasets and provide ready access via natural language queries, that the necessary protections and controls are established. 

In Summary

Failing to be proactive may not only leave organisations on the backfoot in respect of evolving threats, but may also limit the overall efficiency and effectiveness of their operations and threat responses and equally the overall organisation’s ability to leverage the benefits brought by generative AI solutions.

To prevent such outcomes, it is imperative that cybersecurity teams recognise and grasp the AI-driven opportunities available to them today. 

Brian Martin Is Director of Product Management at Integrity360

Image: Philip Oroni

You Might Also Read: 

AI As A Standalone Cybersecurity Solution:

DIRECTORY OF SUPPLIERS - AI Security & Governance:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« The US & Britain Reach Agreement On AI Regulation 
Increase security for your enterprise cloud with a next-generation firewall »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Patchstack

Patchstack

Patchstack (formerly WebARX) is a web application security platform, which allows digital agencies and developers to monitor, protect and maintain their websites.

Learning Tree International

Learning Tree International

Learning Tree's comprehensive cyber security training curriculum includes specialised IT security training and general cyber security courses for all levels of your organisation including the C-suite.

Viscount Systems

Viscount Systems

Viscount Systems is a global security software solutions company that is changing the way access control is deployed and managed in the enterprise.

Maticmind

Maticmind

Maticmind is an ICT System Integrator providing solutions and specialized skills in Networking, Security, Unified Communications & Collaboration, Datacenter & Cloud and Application.

BA-CSIRT

BA-CSIRT

BA-CSIRT is a center which is dedicated to assist and raise awareness among citizens and the Government of the City of Buenos Aires in everything related to information security.

Cytomic

Cytomic

Cytomic is the business unit of Panda Security specialized in providing advanced cybersecurity solutions and services to large enterprises.

Concordium

Concordium

Concordium aims to build the world’s leading open-source, permissionless, and decentralized blockchain with built-in user identity at the protocol level.

Netacea

Netacea

Netacea provides a revolutionary bot management solution that protects websites, mobile apps and APIs from malicious attacks such as scraping, credential stuffing and account takeover.

Forever Group

Forever Group

Forever Group is a Managed Services Provider specialising in Telecommunications, IT Support, and Cyber Security.

Graylog

Graylog

Graylog provides answers to your team’s security, application, and IT infrastructure questions by enabling you to combine, enrich, correlate, query, and visualize all your log data in one place.

Hybrid Identity Protection Conference (HIP)

Hybrid Identity Protection Conference (HIP)

Hybrid Identity Protection (HIP) is the premier educational forum for identity-centric cybersecurity practitioners charged with defending hybrid cloud environments.

Goldilock

Goldilock

Goldilock is redefining how sensitive data, devices, networks and critical infrastructure can be secured.

Kralos

Kralos

Kralos are an experienced team of Software and IT experts, specialized in the development of innovative cybersecurity solutions.

DataProof Communications

DataProof Communications

DataProof Communications is Cybersecurity Company specialising in cybersecurity operations, incident management and response best practices and technologies.

Proton

Proton

Proton provides free encrypted email, calendar, drive, password manager, and VPN services. Building a better Internet.

CIS Secure

CIS Secure

CIS Secure is an innovator, integrator and expert advisor supporting the broadest portfolio of powerful, mission-specific C5ISR communications and cybersecurity solutions.