IBM’s Cost of a Data Breach Report 2024 highlights a ground-breaking finding: The application of AI-powered automation in prevention has saved organizations an average of $2.2 million.

Enterprises have been using AI for years in detection, investigation and response. However, as attack surfaces expand, security leaders must adopt a more proactive stance.

Here are three ways how AI is helping to make that possible:

1. Attack surface management: Proactive defense with AI

Increased complexity and interconnectedness are a growing headache for security teams, and attack surfaces are expanding far beyond what they can monitor using manual means alone. As organizations level up their multi-cloud strategies and onboard new SaaS tools and third-party code in software development and deployment, the challenge only intensifies.

With these larger attack surfaces come increased complexity of network interactions and many new potential entry points for adversaries to exploit. Attack surface management (ASM) brings AI-powered, real-time protection to digital infrastructures, regardless of underlying complexity.

Automated ASM greatly augments manual auditing by providing comprehensive visibility into attack surfaces. Furthermore, AI learns from the data it monitors to Improve future detection outcomes, albeit at a speed and scale that humans alone can’t match.

However, while ASM tools are often presented as turnkey solutions and are usually relatively easy to deploy, the ability of security teams to interpret the huge influx of data they generate is essential for maximizing their impact.

Read the 2024 Cost of a Data Breach report

2. Red teaming: AI goes on the offensive

AI red teaming is the process of having people stress-test AI models for potential vulnerabilities and other issues, such as bias and misinformation. While most models are designed with guardrails in place to mitigate these risks, attackers routinely try to “jailbreak” them through the use of clever prompting. For red teams, the goal is to get there before their adversaries, thereby giving them a chance to take corrective action.

Red teams can themselves use AI to help identify potential issues in the data used to train AI models. For instance, according to IBM’s report, over a third of data breaches involve shadow data. If that data, unvetted and unmonitored for quality and integrity, ends up being used in model training, the ripple effects can be significant. AI can help red teams detect shadow data by identifying anomalies and overlooked data sources that could pose security risks. Red teams can also test AI models against one another using adversarial machine learning methods to identify vulnerabilities.

Unlike ASM, red teaming involves tailored simulations specific to the organization’s data and threat landscape. To fully realize its benefits, organizations must work with skilled teams that can correctly interpret and analyze the results and implement the required changes.

3. Posture management: Continuous security at scale

Posture management is where the scalable, real-time monitoring capabilities of AI really shine. Where ASM reveals potential vulnerabilities in attack surfaces, posture management takes a much broader approach by monitoring configurations, compliance with security policies and connections between both internal and external systems in a manner that’s continuous, agile and adaptable.

By automating posture management with AI, security teams can mitigate risks in far less time and scale their efforts across complex multi-cloud infrastructures to ensure consistency across the board. Also, given the reduced reliance on manual processes, the chances of human error are greatly reduced.

Even when breaches do occur, organizations that extensively incorporate AI and automation into their posture management strategies can identify and mitigate them nearly 100 days faster than those that don’t use AI at all. Naturally, the time saved in both prevention and remediation results in substantial direct and indirect cost savings, too.

AI is a game changer, but the human element is as important as ever

The AI opportunity in cybersecurity is undeniable. Not only can it help scale strategies across increasingly complex environments, but it can also help democratize security by allowing less experienced analysts to interact with security systems using natural language queries.

However, that’s not to suggest that AI is a replacement for human expertise. Rather, it must complement it.

AI and automation in security have helped organizations save millions in potential damages and remediation efforts, but they still need people to understand the data and insights that AI provides to maximize its potential.

That’s why managed security services have an increasingly important role to play in ensuring that AI adoption is strategically aligned with business needs and goals — instead of being deployed solely for reducing costs and labor.

More from Data Protection

How to craft a comprehensive data cleanliness policy

3 min read - Practicing good data hygiene is critical for today’s businesses. With everything from operational efficiency to cybersecurity readiness relying on the integrity of stored data, having confidence in your organization’s data cleanliness policy is essential.But what does this involve, and how can you ensure your data cleanliness policy checks the right boxes? Luckily, there are practical steps you can follow to ensure data accuracy while mitigating the security and compliance risks that come with poor data hygiene.Understanding the 6 dimensions of…

Third-party access: The overlooked risk to your data protection plan

3 min read - A recent IBM Cost of a Data Breach report reveals a startling statistic: Only 42% of companies discover breaches through their own security teams. This highlights a significant blind spot, especially when it comes to external partners and vendors. The financial stakes are steep. On average, a data breach affecting multiple environments costs a whopping $4.88 million. A major breach at a telecommunications provider in January 2023 served as a stark reminder of the risks associated with third-party relationships. In…

Communication platforms play a major role in data breach risks

4 min read - Every online activity or task brings at least some level of cybersecurity risk, but some have more risk than others. Kiteworks Sensitive Content Communications Report found that this is especially true when it comes to using communication tools.When it comes to cybersecurity, communicating means more than just talking to another person; it includes any activity where you are transferring data from one point online to another. Companies use a wide range of different types of tools to communicate, including email,…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today