February 26, 2018 By Shane Schick 2 min read

According to recent research, cybersecurity news headlines featuring ever-more sophisticated attacks have influenced almost one-third of chief information security officers (CISOs) to adopt artificial intelligence (AI) for data security.

Cisco’s “2018 Annual Cybersecurity Report,” which examined a wide cross-section of trends and patterns in data theft, data loss, malware and other issues, found that 32 percent of security leaders are “completely reliant” on AI to safeguard sensitive corporate information.

The Rise of Encryption Drives Increased AI Adoption

AI technology encompasses a number of different tools. For instance, 34 percent of respondents to the Cisco survey said they use machine learning to detect anomalies and alert IT departments about potential vulnerabilities threatening their systems. Meanwhile, 39 percent said they were using automation to deal with the kinds of attacks that regularly make cybersecurity news.

The increase in AI usage can be explained in part by the growth of encryption, ITProPortal reported. According to the study, half of global web traffic was encrypted as of October 2017. While it is difficult for humans to distinguish legitimate threats from an overwhelming volume of false positives, an AI algorithm can be trained to look for suspicious activity, even within encrypted network communication.

Meanwhile, a recent report titled “The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and Mitigation” noted that cybercriminals are eager to use AI for their own nefarious gain. For CISOs and their teams, it may be a race to see how quickly they can make better use of the technology to protect everything from supply chains to network endpoints.

Generating Positive Cybersecurity News in 2018

One of the brighter stats in the Cisco report is a big improvement in the time to detection for security issues, which went from 14 hours in 2016 to 4.6 last year. As more enterprises adopt AI to stay ahead of threat actors, here’s hoping the cybersecurity news cycle features more victories in 2018.

More from

Airplane cybersecurity: Past, present, future

4 min read - With most aviation processes now digitized, airlines and the aviation industry as a whole must prioritize cybersecurity. If a cyber criminal launches an attack that affects a system involved in aviation — either an airline’s system or a third-party vendor — the entire process, from safety to passenger comfort, may be impacted.To improve security in the aviation industry, the FAA recently proposed new rules to tighten cybersecurity on airplanes. These rules would “protect the equipment, systems and networks of transport…

Protecting your digital assets from non-human identity attacks

4 min read - Untethered data accessibility and workflow automation are now foundational elements of most digital infrastructures. With the right applications and protocols in place, businesses no longer need to feel restricted by their lack of manpower or technical capabilities — machines are now filling those gaps.The use of non-human identities (NHIs) to power business-critical applications — especially those used in cloud computing environments or when facilitating service-to-service connections — has opened the doors for seamless operational efficiency. Unfortunately, these doors aren’t the…

Communication platforms play a major role in data breach risks

4 min read - Every online activity or task brings at least some level of cybersecurity risk, but some have more risk than others. Kiteworks Sensitive Content Communications Report found that this is especially true when it comes to using communication tools.When it comes to cybersecurity, communicating means more than just talking to another person; it includes any activity where you are transferring data from one point online to another. Companies use a wide range of different types of tools to communicate, including email,…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today