iTnews
  • Home
  • Videos
  • State of Security 2024
Partner Content

AI is a force multiplier in the fight against cybercriminals

By Staff Writer
May 24 2024 9:00AM

Generative AI revolutionises cybersecurity, empowering analysts to efficiently combat evolving threats.

Generative AI, with its ability to leverage data, has impacted almost every industry. Its impact on cybersecurity has been significant. Collecting, collating and analysing the vast quantities of data coming from end points, network devices and other sources is becoming harder and harder.


Steve Hunter, Director at Arctic Wolf, says AI can be a powerful tool for security analysts and that it won't replace them.  

“AI and large language models have the potential to transform the way the security analyst works. We can apply modern AI tools to help analysts gain rapid context from multiple sources, summarise incidents quickly and reliably, and communicate this effectively to those who need to know.”

Hunter says there is a misconception that human analysts can be replaced by modern AI. Rather, routine tasks that analysts perform will be automated get automated away, so they are free to focus on more complex tasks augmented by modern AI to improve speed, accuracy and efficiency, and deliver a better security operations outcome.

And with cybersecurity skills in short supply, AustCyber forecasts a shortage of 17,000 professionals in Australia by 2026, it can help reduce burnout and staff turnover in security operations centres.

The capabilities of extended detection response systems have been rapidly evolving,

driven by advanced AI capabilities. AI technologies enhance the Security Operations Centre, or SOC, by improving how analysts process and respond to threats.

“For many organisations, the decision to adopt cloud-based XDR platforms is influenced by the need for continual innovation, which is crucial for effective cyber defense,” says Hunter. “These platforms offer the latest AI driven tools and are generally the first to receive updates and new capabilities.”

Generative AI has indeed become a potent tool for cyber attackers, but there is a silver lining. Widespread discussion around technologies like ChatGPT and their coverage in mainstream media means user communities are becoming aware of generative AI's capabilities, enabling them to understand and engage with the security measures which are crucial for building a cyber resilient organisation.

Cloud based XDR platforms enable security analysts to significantly improve their ability to detect and respond to threats and stop attackers before they can cause harm. This is where AI’s strength for defenders comes to the fore, allowing them to turn the tide against the attackers.

Extended detection and response depends on data to find and respond to threats and attacks. And while threat actors are using generative AI to craft more convincing attacks, organisations can leverage tools to support threat analysts so they can find the threat signal amongst the noise.

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © iTnews.com.au . All rights reserved.
Tags:
aipartner contentsecuritystate of security 2024stateofsecurityxdr

Related Articles

  • Boosting zero trust maturity requires a strategic approach Boosting zero trust maturity requires a strategic approach
  • GPS spoofers 'hack time' on commercial airlines, researchers say GPS spoofers 'hack time' on commercial airlines, researchers say
  • In Pictures: Skybox and BT security roundtable In Pictures: Skybox and BT security roundtable
  • Browser vulnerability can be used to breach local networks Browser vulnerability can be used to breach local networks

Partner Content

AFL and Okta Team Up for a Game-Changing Play in Digital Security and Identity Management
Partner Content AFL and Okta Team Up for a Game-Changing Play in Digital Security and Identity Management
‘Work Anywhere, Thrive Everywhere’: Embracing Boundless Workplaces in a Changing World
Partner Content ‘Work Anywhere, Thrive Everywhere’: Embracing Boundless Workplaces in a Changing World
Unlocking Cloud Potential: The Fusion5 Approach to Seamless Migration
Partner Content Unlocking Cloud Potential: The Fusion5 Approach to Seamless Migration
SOCO Reveals Microsoft AI with Power Platform Use Cases at Upcoming Government Event
Partner Content SOCO Reveals Microsoft AI with Power Platform Use Cases at Upcoming Government Event

Sponsored Whitepapers

Nine Ways To Prepare Your Database for a High-Traffic Event
Nine Ways To Prepare Your Database for a High-Traffic Event
How to Put AI at the Heart of Business Growth
How to Put AI at the Heart of Business Growth
Streamline Your Processes and Reduce Managed File Transfer Expenses
Streamline Your Processes and Reduce Managed File Transfer Expenses
Maximise Your Azure Investment with Fusion5
Maximise Your Azure Investment with Fusion5
CyberArk's 2024 Playbook: Identity Security and Cloud Compliance
CyberArk's 2024 Playbook: Identity Security and Cloud Compliance

Events

  • Integrate Integrate
Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

State of Security 2024

State of Security 2024

SASE can reduce vendor sprawl, minimise costs and enhance network security

SASE can reduce vendor sprawl, minimise costs and enhance network security

AI is a force multiplier in the fight against cybercriminals

AI is a force multiplier in the fight against cybercriminals

State of Security 2024: Cloud Security

State of Security 2024: Cloud Security

Digital Nation

How eBay uses interaction analytics to improve CX
How eBay uses interaction analytics to improve CX
State of Security 2023
State of Security 2023
More than half of loyalty members concerned about their data
More than half of loyalty members concerned about their data
Health tech startup Kismet raises $4m in pre-seed funding
Health tech startup Kismet raises $4m in pre-seed funding
COVER STORY: What AI regulation might look like in Australia
COVER STORY: What AI regulation might look like in Australia
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.