Eight emerging areas of opportunity for AI in security

That's core to the thesis of how Menlo Ventures chose to evaluate eight areas where gen AI is having an outsized impact.
They have collaborated on a series of blog posts that illustrate why closing the security for AI gaps is crucial for generative AI to reach scale across organizations.
Throughout the interview, Sekhar and Haskaraman explained that for AI to reach its full potential across enterprises, it requires an entirely new tech stack, one with security designed to start with software supply chains and model development.
Sekhar and Haskaraman say that many of today's vendor security processes are laborious and error-prone, making them ideal candidates to automate and improve with gen AI. Menlo Ventures cites Dialect, an AI assistant that auto-fills security questionnaires and other questionnaires based on data for fast and accurate responses, as an example of a leading vendor in this space.
Often criticized for lack of results, with breaches still happening in companies who invest heavily in this area, Menlo Ventures believes that gen AI will enable more tailored, engaging, and dynamic employee training content that better simulates real-world scenarios and risks.
Immersive Labs uses generative AI to simulate attacks and incidents for their security team, for example.
A security co-pilot leads Riot employees through interactive security awareness training in Slack or online.
Menlo Ventures believes these types of technologies will increase security training effectiveness.
With gen AI being used for attacks, penetration testing must adapt and flex to respond.
Menlo Ventures believes gen AI can enhance many pen testing steps, including searching public and private databases for criminal characteristics, scanning customers' IT environments, exploring potential exploits, suggesting remediation steps and summarizing findings inauto-generated reports.
Gen AI also shows potential for being able to scale across vulnerable endpoints, networks, APIs and data repositories adding further security across broad networks.
Cyberattackers use gen AI to create convincing, high-fidelity digital identities that can bypass ID verification software, document verification software and manual reviews.
Too many automated security scans and SAST tools fail and burn Security Operations Centers' analysts' time.
Examples include Semgrep's customizable rules that help security engineers and developers find vulnerabilities and suggest organization-specific fixes.
An example of a vendor helping to solve these challenges is Socket, which proactively detects and blocks over 70 supply chain risk signals in open-source code, detects suspicious package updates and builds a security feedback loop to the dev process to secure supply chains.
Gen AI has the potential to streamline much of the work going on in Security Operations Centers, starting with improving the fidelity and accuracy of alerts.
Sekhar and Haskaraman believe that for gen AI to see enterprise-level growth, the security challenges every organization faces in committing to an AI strategy need to be solved first.
Their eight areas where gen AI will have an impact show how far behind many organizations are in being ready to move into an enterprise-wide AI strategy.
Gen AI can remove the drudgery and time-consuming work SOC analysts waste their time on when they could be delving into more complex projects.
The eight areas of impact are a start, and more is needed for organizations to better protect themselves against the onslaught of gen AI-based attacks.


This Cyber News was published on venturebeat.com. Publication date: Tue, 06 Feb 2024 14:43:05 +0000


Cyber News related to Eight emerging areas of opportunity for AI in security

Eight emerging areas of opportunity for AI in security - That's core to the thesis of how Menlo Ventures chose to evaluate eight areas where gen AI is having an outsized impact. They have collaborated on a series of blog posts that illustrate why closing the security for AI gaps is crucial for generative ...
4 months ago Venturebeat.com
The Art of Securing Cloud-Native Mobile Applications - We will explore the dynamic intersection of cloud-native architecture and mobile application security, delving into the strategies and best practices essential for safeguarding sensitive data, ensuring user privacy, and fortifying against emerging ...
6 months ago Feeds.dzone.com
ISAs and the Dawning Hardware Security Revolution - The eternal cat-and-mouse game pitting IT security improvements against evolving attacker exploits is usually framed as an arms race of rising software sophistication. Security teams implement firewall software, antivirus protection, data encryption, ...
6 months ago Darkreading.com
ISAs and the Dawning Hardware Security Revolution - The eternal cat-and-mouse game pitting IT security improvements against evolving attacker exploits is usually framed as an arms race of rising software sophistication. Security teams implement firewall software, antivirus protection, data encryption, ...
6 months ago Darkreading.com
Microsoft Security Copilot improves speed and efficiency for security and IT teams - First announced in March 2023, Microsoft Security Copilot-Microsoft's first generative AI security product-has sparked major interest. With the rapid innovations of Security Copilot, we have taken this solution beyond security operations use cases ...
6 months ago Microsoft.com
McCaffrey Joins 'ASTORS' Champion SIMS Software Board of Advisors - SIMS Software, the leading provider of security information management software to the government and defense industries - and the 2023 Platinum 'ASTORS' Award Champion for Best Security Workforce Management Solution, is delighted to announce that ...
5 months ago Americansecuritytoday.com
Embracing Security as Code - Everything is smooth until it isn't because we traditionally tend to handle the security stuff at the end of the development lifecycle, which adds cost and time to fix those discovered security issues and causes delays. Over the years, software ...
6 months ago Feeds.dzone.com
What Is Cloud Security Management? Types & Strategies - Cloud security management is the process of safeguarding cloud data and operations from attacks and vulnerabilities through a set of cloud strategies, tools, and practices. The cloud security manager and the IT team are generally responsible for ...
1 month ago Esecurityplanet.com
6 Best Cloud Security Companies & Vendors in 2024 - Cloud security companies specialize in protecting cloud-based assets, data, and applications against cyberattacks. To help you choose, we've analyzed a range of cybersecurity companies offering cloud security products and threat protection services. ...
4 months ago Esecurityplanet.com
Gaining Insights on the Top Security Conferences - A Guide for CSOs - Are you a CSO looking for the best security events around the world? Well, you have come to the right place! This article is a guide to the top security conferences that offer essential security insights to help make informed decisions. Security ...
1 year ago Csoonline.com
10 Best Security Service Edge Solutions - Security Service Edge is an idea in cybersecurity that shows how network security has changed over time. With a focus on customized solutions, Security Service Edge Solutions leverages its expertise in multiple programming languages, frameworks, and ...
4 months ago Cybersecuritynews.com
Five business use cases for evaluating Azure Virtual WAN security solutions - To help organizations who are evaluating security solutions to protect their Virtual WAN deployments, this article considers five business use cases and explains how Check Point enhances and complements Azure security with its best-of-breed, ...
1 month ago Blog.checkpoint.com
IaaS Security: Top 8 Issues & Prevention Best Practices - Understanding the risks, advantages, and best practices connected with IaaS security is becoming increasingly important as enterprises shift their infrastructure to the cloud. By exploring the top eight issues and preventative measures, as well as ...
6 months ago Esecurityplanet.com
IaaS vs PaaS vs SaaS Security: Which Is Most Secure? - Security concerns include data protection, network security, identity and access management, and physical security. While IaaS gives complete control and accountability, PaaS strikes a compromise between control and simplicity, and SaaS provides a ...
6 months ago Esecurityplanet.com
Modern DevSecOps - DevSecOps - a fusion of development, security, and operations - emerged as a response to the challenges of traditional software development methodologies, particularly the siloed nature of development and security teams. DevSecOps aims to break down ...
6 months ago Feeds.dzone.com
How GPL-1 Drug Success Transforms Healthcare Revenue - The huge revenue opportunity stemming from recent success of GLP-1 drugs is not just for the pharmaceutical companies. The new category of Diabetes, weight loss and obesity drugs called GLP-1s is predicted to be a game-changing innovation in ...
4 months ago Feedpress.me
Mastering SDLC Security: Best Practices, DevSecOps, and Threat Modeling - In the ever-evolving landscape of software development, it's become absolutely paramount to ensure robust security measures throughout the Software Development Lifecycle. Each of these have illuminated different vulnerabilities that can be exploited ...
6 months ago Securityboulevard.com
What is Security Posture? - Security posture is a term often mentioned in cybersecurity, with businesses often told to improve or maintain a robust security posture. With the onset of 2024, now is a better time than ever to take stock of your company's security posture and plan ...
6 months ago Securityboulevard.com
Salt Security Delivers API Posture Governance Engine - PRESS RELEASE. PALO ALTO, Calif., Jan. 17, 2024 /PRNewswire/ - Salt Security, the leading API security company, today announced multiple advancements in discovery, posture management and AI-based threat protection to the industry leading Salt ...
5 months ago Darkreading.com
Creating a New Market for Post-Quantum Cryptography - A day in the busy life of any systems integrator includes many actions that revolve around the lifeblood of its business - its customers. Systems integrators help solve evolving customer business challenges, which in turn adds partner value. It's a ...
6 months ago Securityboulevard.com
A Practitioner's Guide to Security-First Design - Instead, organizations must proactively fortify their defenses and enter the era of security-first design - an avant-garde approach that transcends traditional security measures. Security-first design is an approach that emphasizes integrating robust ...
6 months ago Feeds.dzone.com
New Stellar Cyber Alliance to Deliver Email Security for SecOps Teams - Stellar Cyber, a Double Platinum 'ASTORS' Award Champion in the 2023 Homeland Security Awards Program, and the innovator of Open XDR has entered inao a new partnership with Proofpoint, a leading cybersecurity and compliance company. Through this ...
4 months ago Americansecuritytoday.com
Benefits and challenges of managed cloud security services - Too many organizations lack the in-house cloud security expertise and resources needed to protect cloud assets effectively. One option to address these challenges is managed cloud security. Outsourcing cloud security to a third party not only helps ...
4 months ago Techtarget.com
Understanding the 2024 Cloud Security Landscape - As we swiftly move towards the second quarter of 2024, predictions by cloud security reports highlight the challenges of cloud adoption in the cloud security landscape. This growing reliance on cloud infrastructure raises the critical issue of ...
3 months ago Feeds.dzone.com
What is App Security? SAST, DAST, IAST, and RASP. - Effective application security relies on well-defined processes and a diverse array of specialized tools to provide protection against unauthorized access and attacks. Security testing is a critical part of an application security strategy and should ...
6 months ago Feeds.dzone.com

Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)