Connect with us

Hi, what are you looking for?

Business

How the AI revolution continues to disrupt cybersecurity

AI should just be one facet of how an organization implements security, risk and compliance.

AI: More than Human exhibition invites you to explore our relationship with artificial intelligence. — © Tim Sandle
AI: More than Human exhibition invites you to explore our relationship with artificial intelligence. — © Tim Sandle

What should organizations look out for when implementing enterprise security artificial intelligence and machine learning? These technologies have become increasingly popular as enterprises continue on their digital transformation journeys.

Specifically, for cybersecurity professionals, these technologies have become especially important when evaluating how security teams implement enhancements and improvements.

To understand more about the technological changes, Digital Journal spoke with Sam Babic, chief innovation officer at Hyland.

Digital Journal: What benefits does artificial intelligence bring to enterprise security tools?

Sam Babic: It lets you look at data at scale across multiple systems. The security insights might not necessarily come from a single system; instead, the “signal” you are looking for when detecting an intrusion might be an aggregate across systems.

The amount of data is massive and requires AI to be able to interpret this data. Some systems, especially cloud-based security systems, can leverage training across multiple customers and multiple industries, effectively learning from the cumulative knowledge of a given vendor’s customer base, potentially even tailored to a particular industry. For example, machine learning models detecting malicious activity at a bank may look different than models for a healthcare provider.

DJ: How does artificial intelligence help to augment human defenders?

Babic: It helps do this at scale. The human defenders could train and improve the system, however. Even in scenarios that may initially be missed by AI, the human defender can help augment that. If you push this training ability down to end users — by allowing them to report a phishing email that made it through the detection system, for example — you now have the power of all your employees training the AI on phishing emails. So, the combination of humans and machines becomes a force multiplier. Especially in today’s environment, it is required due to the massive scale of attacks and the ability for those attacks to be automated.

DJ: What are common mistakes enterprises make when implementing artificial intelligence?

Babic: With respect to implementing AI for security, AI should just be one facet of how an organization implements security, risk and compliance. An organization should never position solutions like these as the one-stop shop. It is one of many strategies that when taken together, create the security blanket. Or rather security quilt, where each piece of the quilt is another strategy or technology implemented that works in tandem with the other strategies to provide coverage to your organization.

DJ: How do CISOs vet the claims of artificial intelligence vendor capabilities?

Babic: CISOs and people in their direct organization may not be data scientists, but their organization may have some data scientists or data science knowledge that can be pulled in during the procurement process. They can also take advantage of information security consultants that offer full-service consulting, but that have no stake in any one vendor product to help in the selection process. They can also take advantage of analyst reports and analyst inquiries to learn more about a particular vendor and its strengths and weaknesses.

DJ: Are there ways to test capabilities and results?

Babic: Many vendors are now cloud-based, so the barrier to testing these capabilities is reduced. Some may even offer pilot or trial periods. Cloud-based vendors also have the benefit of seeing data across multiple customers and multiple industries to help inform and monitor their machine learning models, thereby providing benefits to all their customers. You can utilize in-house or third-party penetration testers (or ideally both) to simulate malicious activity and verify if the tool is detecting these malicious signals within the data of user activity.

DJ: What are some of the common ways enterprise security teams should approach artificial intelligence implementation?

Babic: They should assess these implementations alongside the existing corporate strategy for security and understand where the current gaps are and how AI/ML implementations fill those gaps. As per above, they should be wary of a one-size-fits-all approach and even where vendors promise the world, it may be worth proceeding with caution and validating these capabilities. There may even be circumstances depending on an organization’s risk tolerance where they utilize more than one tool to accomplish the task. Highly secure organizations may choose to implement multiple overlapping AI/ML implementations. This certainly comes at a greater cost, but may be a requirement for their organization and the industry they operate in.

Avatar photo
Written By

Dr. Tim Sandle is Digital Journal's Editor-at-Large for science news. Tim specializes in science, technology, environmental, business, and health journalism. He is additionally a practising microbiologist; and an author. He is also interested in history, politics and current affairs.

You may also like:

Business

The EU, Japan, Canada, Australia, and the Middle East definitely aren’t going to stop doing business with China, end of discussion.

Business

Among large metros, San Jose, CA, Washington, D.C. and Columbus, OH, take the podium in 2025 for women in tech.

Tech & Science

Image generated with Gemini.In a world where threats travel faster than updates and cyberattacks evolve as fast as the tools designed to stop them,...

Business

US government attorneys urged a federal judge to make Google spin off its Chrome browser.