January 22, 2018 By Douglas Bonderud 2 min read

National security advocates enjoyed a signal boost to their agenda after the Senate reauthorized Section 702 of the Foreign Intelligence Surveillance Act (FISA) for another six years. According to Politico, these cybersecurity hawks are concerned about evolving attack methods. Senate Intelligence Chairman Richard Burr noted, “If you look at the threat matrix today, it’s worse than it was six years ago. It’s more global, it’s more specific.”

But legislation alone won’t push back malicious actors. According to PwC, maturing artificial intelligence (AI) will help drive effective security intelligence analytics and improve cyberdefense. The caveat? It will also empower cyberattacks.

Security Intelligence Analytics Improves Defenses

As noted by Enterprise Innovation, AI is on track to get “smarter and more practical” through 2018. For businesses, this means taking AI beyond consumer-focused products like smart home management systems and social media networks to empower machine learning and drive the creation of AI-enabled infrastructures capable of performing tasks previously reserved for human workers.

According to PwC, AI will “come down to earth and get to work” in industries such as health care and finance. It will also be critical in the fight against malicious actors. With IT teams no longer able to keep pace with the sheer volume and variety of attacks, AI will fill an emerging gap in network cyberdefense. It can significantly improve the speed and accuracy of security intelligence analytics to help categorize threats and design effective response.

Artificial Intelligence Bolsters Security

The challenge? As artificial intelligence code goes mainstream, it will also become open source. This gives both defenders and attackers equal access to powerful tools that can learn from mistakes and develop new strategies.

If attackers are using AI, companies must respond in kind. Machine learning has already proven to be more efficient at cybercrime than human beings, and the consequences of a large-scale, machine-driven attack could be devastating.

But it’s not all bad news: The AI arms race could help bolster the cybersecurity evolution. Despite its growing proficiency, there are some tasks that AI remains ill-suited for. This gives human security professionals an edge over attackers using fire-and-forget attack methods that rely exclusively on AI.

AI is a two-way street. The maturing market means both attackers and defenders will benefit from machine learning tools in 2018. As a result, AI-driven security intelligence analytics will quickly become a must-have for companies to mitigate current threats and improve cybersecurity response.

More from

Taking the complexity out of identity solutions for hybrid environments

4 min read - For the past two decades, businesses have been making significant investments to consolidate their identity and access management (IAM) platforms and directories to manage user identities in one place. However, the hybrid nature of the cloud has led many to realize that this ultimate goal is a fantasy. Instead, businesses must learn how to consistently and effectively manage user identities across multiple IAM platforms and directories. As cloud migration and digital transformation accelerate at a dizzying pace, enterprises are left…

IBM identifies zero-day vulnerability in Zyxel NAS devices

12 min read - While investigating CVE-2023-27992, a vulnerability affecting Zyxel network-attached storage (NAS) devices, the IBM X-Force uncovered two new flaws, which when used together, allow for pre-authenticated remote code execution. Zyxel NAS devices are typically used by consumers as cloud storage devices for homes or small to medium-sized businesses. When used together, the flaws X-Force discovered allow a remote attacker to execute arbitrary code on the device with superuser permissions and without requiring any credentials. This results in complete control over the…

What cybersecurity pros can learn from first responders

4 min read - Though they may initially seem very different, there are some compelling similarities between cybersecurity professionals and traditional first responders like police and EMTs. After all, in a world where a cyberattack on critical infrastructure could cause untold damage and harm, cyber responders must be ready for anything. But are they actually prepared? Compared to the readiness of traditional first responders, how do cybersecurity professionals in incident response stand up? Let’s dig deeper into whether the same sense of urgency exists…

Unified endpoint management for purpose-based devices

4 min read - As purpose-built devices become increasingly common, the challenges associated with their unique management and security needs are becoming clear. What are purpose-built devices? Most fall under the category of rugged IoT devices typically used outside of an office environment and which often run on a different operating system than typical office devices. Examples include ruggedized tablets and smartphones, handheld scanners and kiosks. Many different industries are utilizing purpose-built devices, including travel and transportation, retail, warehouse and distribution, manufacturing (including automotive)…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today