December 18, 2017 By Shane Schick 2 min read

While the rise of artificial intelligence (AI) has stoked fears of job loss in many industries, cybersecurity professionals have something new to worry about. A recent research study showed more than 91 percent of security experts are worried they’ll soon face AI cyberattacks.

Security firm Webroot conducted the survey, which gathered input from 400-plus experts in IT security across the U.S. and Japan who work in companies with more than 100 people. Of those, 87 percent said their firms already use AI to safeguard data, which may be why they believe cybercriminals will eventually figure out how to use the technology for their own purposes.

In a sense, there’s a pseudo-arms race to see who can more quickly employ tools such as machine learning and natural language processing effectively: CISOs and their teams, or cybercriminals. TechRepublic noted that an overwhelming majority of firms — 97 percent — will increase their spend on AI technologies between now and 2021. Only 1 percent said they didn’t see AI as strengthening their overall IT security posture, and three-quarters said it would soon be impossible to safeguard data unless they had the technology at their disposal.

As with any major wave in IT management, of course, it’s not just a matter of buying the technology, but choosing how and where you use it. As a story on BetaNews pointed out, those surveyed by Webroot are particularly interested in seeing where AI could improve the accuracy of their security analytics or offer early warnings of a cyberattack.

The potential for cybercriminals to launch AI cyberattacks, meanwhile, may only be limited by their imaginations. Digital Journal reported that those surveyed are concerned about the way AI could be used to develop more sophisticated malware, for instance. This is technology that’s designed to “learn” like human beings in some cases, so it could prove highly useful in creating near-foolproof phishing scams and social engineering techniques that dupe employees into handing over passwords or other forms of access. As smart as AI is, IT security pros may need to outsmart it once criminals get involved.

More from

What we can learn from the best collegiate cyber defenders

3 min read - This year marked the 19th season of the National Collegiate Cyber Defense Competition (NCCDC). For those unfamiliar, CCDC is a competition that puts student teams in charge of managing IT for a fictitious company as the network is undergoing a fundamental transformation. This year the challenge involved a common scenario: a merger. Ten finalist teams were tasked with managing IT infrastructure during this migrational period and, as an added bonus, the networks were simultaneously attacked by a group of red…

A spotlight on Akira ransomware from X-Force Incident Response and Threat Intelligence

7 min read - This article was made possible thanks to contributions from Aaron Gdanski.IBM X-Force Incident Response and Threat Intelligence teams have investigated several Akira ransomware attacks since this threat actor group emerged in March 2023. This blog will share X-Force’s unique perspective on Akira gained while observing the threat actors behind this ransomware, including commands used to deploy the ransomware, active exploitation of CVE-2023-20269 and analysis of the ransomware binary.The Akira ransomware group has gained notoriety in the current cybersecurity landscape, underscored…

New proposed federal data privacy law suggests big changes

3 min read - After years of work and unsuccessful attempts at legislation, a draft of a federal data privacy law was recently released. The United States House Committee on Energy and Commerce released the American Privacy Rights Act on April 7, 2024. Several issues stood in the way of passing legislation in the past, such as whether states could issue tougher rules and if individuals could sue companies for privacy violations. With the American Privacy Rights Act of 2024, the U.S. government established…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today