According to recent research, cybersecurity news headlines featuring ever-more sophisticated attacks have influenced almost one-third of chief information security officers (CISOs) to adopt artificial intelligence (AI) for data security.

Cisco’s “2018 Annual Cybersecurity Report,” which examined a wide cross-section of trends and patterns in data theft, data loss, malware and other issues, found that 32 percent of security leaders are “completely reliant” on AI to safeguard sensitive corporate information.

The Rise of Encryption Drives Increased AI Adoption

AI technology encompasses a number of different tools. For instance, 34 percent of respondents to the Cisco survey said they use machine learning to detect anomalies and alert IT departments about potential vulnerabilities threatening their systems. Meanwhile, 39 percent said they were using automation to deal with the kinds of attacks that regularly make cybersecurity news.

The increase in AI usage can be explained in part by the growth of encryption, ITProPortal reported. According to the study, half of global web traffic was encrypted as of October 2017. While it is difficult for humans to distinguish legitimate threats from an overwhelming volume of false positives, an AI algorithm can be trained to look for suspicious activity, even within encrypted network communication.

Meanwhile, a recent report titled “The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and Mitigation” noted that cybercriminals are eager to use AI for their own nefarious gain. For CISOs and their teams, it may be a race to see how quickly they can make better use of the technology to protect everything from supply chains to network endpoints.

Generating Positive Cybersecurity News in 2018

One of the brighter stats in the Cisco report is a big improvement in the time to detection for security issues, which went from 14 hours in 2016 to 4.6 last year. As more enterprises adopt AI to stay ahead of threat actors, here’s hoping the cybersecurity news cycle features more victories in 2018.

More from

Containers, Security, and Risks within Containerized Environments

Applications have historically been deployed and created in a manner reminiscent of classic shopping malls. First, a developer builds the mall, then creates the various stores inside. The stores conform to the dimensions of the mall and operate within its floor plan.In older approaches to application development, a developer would have a targeted system or set of systems for which they intend to create an application. This targeted system would be the mall. Then, when building the application, they would tailor…

Inside the Second White House Ransomware Summit

Ransomware is a growing, international threat. It's also an insidious one. The state of the art in ransomware is simple but effective. Well-organized criminal gangs hiding in safe-haven countries breach an organization, find, steal and encrypt important files. Then they present victims with the double incentive that, should they refuse to pay, their encrypted files will be both deleted and made public. In addition to hundreds of major attacks around the world, two critical ransomware incidents — the Colonial Pipeline attack and…

Did Brazil DSL Modem Attacks Change Device Security?

From 2011 to 2012, millions of Internet users in Brazil fell victim to a massive attack against vulnerable DSL modems. By configuring the modems remotely, attackers could redirect users to malicious domain name system (DNS) servers. Victims trying to visit popular websites (Google, Facebook) were instead directed to imposter sites. These rogue sites then installed malware on victims' computers. According to a report from Kaspersky Lab Expert Fabio Assolini citing statistics from Brazil's Computer Emergency Response Team, the attack ultimately…

Who Carries the Weight of a Cyberattack?

Almost immediately after a company discovers a data breach, the finger-pointing begins. Who is to blame? Most often, it is the chief information security officer (CISO) or chief security officer (CSO) because protecting the network infrastructure is their job. Heck, it is even in their job title: they are the security officer. Security is their responsibility. But is that fair – or even right? After all, the most common sources of data breaches and other cyber incidents are situations caused…