AI Will Be Powerful, But No Panacea

Anyone following the deployment of self-driving cars knows the technology is proving far from foolproof.
The issues, largely, are in the thousands of little variations in traffic patterns that speckle our driving lives, to which machines often fail to appropriately react.
A freak occurrence, to be certain, but one a reasonable human driver could've handled more safely.
As it turns out, the troubles in the world of self-driving cars mirror exactly the problem with how we're currently addressing artificial intelligence in a cybersecurity environment.
There is so much hype around the technology that we've failed to root our discussions-and expectations- in a realistic view of security issues.
Just like how self-driving cars can't know how to decipher every human-caused variation in our daily driving lives, AI can never fully protect us from human errors that compromise our systems.
Those errors are often fueled by the unpredictable variable that is human emotion.
What AI will do, and quickly, is identify the gaps in our current security capabilities.
The trick is to keep the human in mind as we deploy this new technology.
It's often beyond our imagination how AI will interpret situations and go about responding to them.
When it comes to security, AI can't know when humans are going to make costly errors like, say, falling for an email or telephone phishing scam.
It can account for logic, but most human errors at their core are emotional.
The recent Okta breach, which exposed the data of 134 of its customers, offers a perfect example: Hackers were able to access credentials through a service account saved to an employee's personal Google profile, which the employee had logged into on a company laptop, presumably out of convenience.
There is no one tool that will solve all of our security problems.
We seem to have forgotten that businesses are made up of real humans who make real mistakes.
Over time, I suspect we'll be able to talk to AI in plain language about security challenges and receive responses on how we can better respond to threats or breaches.
AI eventually will be very good at pointing out errors and warning us of potential security problems or dangerous scenarios.
It will never be able to stop all emotion-based human error.
Our response plans should be taking into account not only the best in automation, detection, and tooling, but also how a change could impact various pieces of an organization.
What has always been true remains so: Cybersecurity is an ever-evolving thing, and it requires an incredible amount of human diligence to properly operate and defend an organization.


This Cyber News was published on www.cybersecurity-insiders.com. Publication date: Sat, 06 Jan 2024 23:13:35 +0000


Cyber News related to AI Will Be Powerful, But No Panacea

AI Will Be Powerful, But No Panacea - Anyone following the deployment of self-driving cars knows the technology is proving far from foolproof. The issues, largely, are in the thousands of little variations in traffic patterns that speckle our driving lives, to which machines often fail ...
10 months ago Cybersecurity-insiders.com
McCaffrey Joins 'ASTORS' Champion SIMS Software Board of Advisors - SIMS Software, the leading provider of security information management software to the government and defense industries - and the 2023 Platinum 'ASTORS' Award Champion for Best Security Workforce Management Solution, is delighted to announce that ...
9 months ago Americansecuritytoday.com
Cyber Defense Magazine - Across the cybersecurity industry, you can practically feel the vacillation between rapid adoption and unyielding hesitation. Security pros are justifiably tentative about artificial intelligence. Hollywood portrays AI risks as sentient robots who ...
11 months ago Cyberdefensemagazine.com
Navigating Microsoft's Innovations For 2023: Get Up to Date With The Latest Developments - In the world of digital technology, staying up-to-date with the latest advancements and innovations is becoming increasingly important. As one of the leading technology companies in the world, Microsoft is constantly introducing new innovations in ...
1 year ago Hackread.com
Does moving to the cloud mean compromising on security? - The transition to cloud computing is an evolution that many organisations are still undertaking to improve efficiency, scalability, and flexibility in their operations. Cloud services offer recognised advantages, such as moving IT infrastructure ...
9 months ago Securityboulevard.com
Bringing Composability to Firewalls with Runtime Protection Rules - Rule control - Customers could not easily write their own firewall rules because of the use of proprietary languages that most teams weren't familiar with unless they received specialized training, or behind walled gardens only accessible by vendor ...
9 months ago Securityboulevard.com
Microsoft Invests Billions in OpenAI – Innovator in Chatbot and GPT Technology - Microsoft has announced a $1 billion investment in OpenAI, the San Francisco-based artificial intelligence (AI) research and development firm. Founded by tech moguls Elon Musk and Sam Altman, OpenAI is a leader in AI technology, and the investment ...
1 year ago Securityweek.com
Building Your First Web Application with Yii Framework - In this article, we will show you, as an inspiration and example, how easy it is to create your first web application using Yii Framework, a simple yet powerful tool for beginners. Successful examples of Yii Framework developments include products ...
1 month ago Hackread.com
Fortifying cyber defenses: A proactive approach to ransomware resilience - Ransomware has become a pervasive threat, compromising the security and functionality of vital systems across the United States. While governmental pledges and public declarations of intent to fight cybercrime are foundational, they often lack the ...
11 months ago Helpnetsecurity.com
Understanding the Seizure of Dark Web Sites Linked to the Hive Ransomware - Recently, law enforcement seized several dark web sites linked to the Hive ransomware. The Hive ransomware is a potent form of malware that cybercriminals use to target organizations and individual computer users in order to demand a ransom for ...
1 year ago Bleepingcomputer.com
Daniel Stori's 'Docker Panacea' - The ability to recover from failures, high loads and cyberattacks. Continue servicing workload requests during the recovery of failed components or services. Implementing security measures to protect cloud workloads from cybersecurity threats like ...
11 months ago Securityboulevard.com
Understanding SBOMs - In recent years, the adoption of open-source software in development has surged, now comprising up to 90% of what's built. There is a crucial aspect to consider when integrating open-source software components. To make sure their software is safe, ...
11 months ago Securityboulevard.com
What Is a Next-Generation Firewall? - A next generation firewall performs deep packet inspection to check the contents of the data flowing through the firewall. Unlike more basic firewalls that only check the header of data packets, NGFWs examine and evaluate the payload data within the ...
9 months ago Esecurityplanet.com
How machine learning helps us hunt threats | Securelist - In this post, we will share our experience hunting for new threats by processing Kaspersky Security Network (KSN) global threat data with ML tools to identify subtle new Indicators of Compromise (IoCs). The model can process and learn from millions ...
1 month ago Securelist.com
Quantum computing will enable a safer, more secure world - Today's media narrative around quantum computing's role in cybersecurity is overwhelmingly negative, because quantum computers will render today's encryption standards redundant, leaving much of our data at risk of being decoded. First, it's ...
10 months ago Cybersecurity-insiders.com
Are you sure you want to share that with ChatGPT? How Metomic helps stop data leaks - Open AI's ChatGPT is one of the most powerful tools to come along in a lifetime, set to revolutionize the way many of us work. Workers aren't content to wait until organizations work this question out, however: Many are already using ChatGPT and ...
9 months ago Venturebeat.com
Strong Encryption Explained: 6 Encryption Best Practices - Strong encryption protects data securely from unauthorized access, but the specific algorithms that qualify as strong encryption change over time as computing power increases and researchers develop new ways to break encryption. Even the strongest ...
10 months ago Esecurityplanet.com
Expert Insight: Growing Your Mindset - I've come to recognize the importance of adopting a growth mindset and embracing challenges as avenues for growth. Having the belief that skills and abilities can be developed through dedication and perseverance defines a growth mindset. For women, ...
7 months ago Itsecurityguru.org
Surge of swatting attacks targets corporate executives and board members - At around 8:45 pm on February 1, 2023, a caller to the Groveland, Massachusetts, 911 emergency line told dispatchers that he harmed someone in a home on Marjorie Street in the upscale small town 34 miles north of Boston. The caller also said he would ...
1 year ago Csoonline.com
Framework's software and firmware have been a mess, but it's working on them - Since Framework showed off its first prototypes in February 2021, we've generally been fans of the company's modular, repairable, upgradeable laptops. Not that the company's hardware releases to date have been perfect-each Framework Laptop 13 model ...
7 months ago Arstechnica.com
CVE-2024-53079 - In the Linux kernel, the following vulnerability has been resolved: mm/thp: fix deferred split unqueue naming and locking Recent changes are putting more pressure on THP deferred split queues: under load revealing long-standing races, causing ...
1 day ago Tenable.com
ISAs and the Dawning Hardware Security Revolution - The eternal cat-and-mouse game pitting IT security improvements against evolving attacker exploits is usually framed as an arms race of rising software sophistication. Security teams implement firewall software, antivirus protection, data encryption, ...
11 months ago Darkreading.com
ISAs and the Dawning Hardware Security Revolution - The eternal cat-and-mouse game pitting IT security improvements against evolving attacker exploits is usually framed as an arms race of rising software sophistication. Security teams implement firewall software, antivirus protection, data encryption, ...
11 months ago Darkreading.com
Kaspersky Unveils New Flagship Product Line for Business, Kaspersky Next - PRESS RELEASE. Woburn, MA - April 16, 2024 - Today Kaspersky introduced its new flagship product line, Kaspersky Next, combining robust endpoint protection with the transparency and speed of EDR, alongside the visibility and powerful tools of XDR. ...
7 months ago Darkreading.com
Defining the Future of Multicloud Networking and Security: Cisco Announces Intent to Acquire Isovalent - When you think about software networking, at its core, it has two basic functions: send traffic from A to B as quickly and efficiently as possible, and move traffic from A to B but NOT to X, Y, or Z. Software-Defined Networking separates these two ...
10 months ago Feedpress.me

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)