Cybersecurity practitioners are convinced they need AI — now comes the hard part

Like other domains, cybersecurity has been eyeing the promise of artificial intelligence (AI) and machine learning (ML) algorithms for some time.

Even back in 2019, nearly two-thirds of respondents to a Capgemini survey thought AI would ‘help identify critical threats’. Additionally, 73% of Australian organisations believed they would eventually be unable to respond to attacks without the assistance of AI.

Analysis by PwC since then confirms that AI is ‘making organisations more resilient to cybercrime’.

There’s been a steady movement for certain cybersecurity functions to harness AI/ML since then. It is now particularly prevalent in malware detection and increasingly for automating analysis and decision-making in data-intensive fields like incident detection and response.

But cybersecurity is also a particularly challenging space for AI/ML use. It’s fast-moving, and the stakes are high. Algorithms put to work in security need themselves to be trustworthy and secure, and this in itself is not easy to solve.

Through our work in this space over the past seven-plus years, some ground rules have emerged. In particular, some keys to success in this space include clean data, a good business case, and the ongoing involvement of domain and technical experts.

Getting these right will solve many of the current challenges and bring cybersecurity functions closer to the AI-augmented operating model they need. Read on: https://securitybrief.asia/story/cybersecurity-practitioners-are-convinced-they-need-ai-now-comes-the-hard-part

The post Cybersecurity practitioners are convinced they need AI — now comes the hard part appeared first on LogRhythm.

*** This is a Security Bloggers Network syndicated blog from LogRhythm authored by YiJia Koo. Read the original post at: https://logrhythm.com/in-the-news/cybersecurity-practitioners-are-convinced-they-need-ai-now-comes-the-hard-part/

Recent Posts

USENIX Security ’23 – LibScan: Towards More Precise Third-Party Library Identification for Android Applications

Authors/Presenters: *Yafei Wu, Cong Sun, Dongrui Zeng, Gang Tan, Siqi Ma, Peicheng Wang* Many thanks to USENIX for publishing their…

4 hours ago

North American Developers Optimistic About Generative AI and Code Security

North American software developers have reasonable confidence that generative AI can be a tool to improve the security of the…

4 hours ago

AI Adoption Prompts Security Advisory from NSA

The warning underscores the importance of a collaborative approach to AI security involving stakeholders across different domains, including data science…

4 hours ago

Nemesis 1.0.0

In August of last year, @tifkin_, @0xdab0, and I released Nemesis, our offensive data enrichment platform. After lots of feedback,…

4 hours ago

How Momentum is Building for the US Government to Play a Larger Role in Protecting K12 Schools from Cyberattacks

Ransomware (a type of malicious software designed to block access to a computer system or...

4 hours ago

The Role of Threat Intelligence in Financial Data Protection

As the financial industry increasingly adopts digital processes, it faces a growing array of cybersecurity threats. Cybercriminals target sensitive customer…

6 hours ago