Eight emerging areas of opportunity for AI in security

That's core to the thesis of how Menlo Ventures chose to evaluate eight areas where gen AI is having an outsized impact.
They have collaborated on a series of blog posts that illustrate why closing the security for AI gaps is crucial for generative AI to reach scale across organizations.
Throughout the interview, Sekhar and Haskaraman explained that for AI to reach its full potential across enterprises, it requires an entirely new tech stack, one with security designed to start with software supply chains and model development.
Sekhar and Haskaraman say that many of today's vendor security processes are laborious and error-prone, making them ideal candidates to automate and improve with gen AI. Menlo Ventures cites Dialect, an AI assistant that auto-fills security questionnaires and other questionnaires based on data for fast and accurate responses, as an example of a leading vendor in this space.
Often criticized for lack of results, with breaches still happening in companies who invest heavily in this area, Menlo Ventures believes that gen AI will enable more tailored, engaging, and dynamic employee training content that better simulates real-world scenarios and risks.
Immersive Labs uses generative AI to simulate attacks and incidents for their security team, for example.
A security co-pilot leads Riot employees through interactive security awareness training in Slack or online.
Menlo Ventures believes these types of technologies will increase security training effectiveness.
With gen AI being used for attacks, penetration testing must adapt and flex to respond.
Menlo Ventures believes gen AI can enhance many pen testing steps, including searching public and private databases for criminal characteristics, scanning customers' IT environments, exploring potential exploits, suggesting remediation steps and summarizing findings inauto-generated reports.
Gen AI also shows potential for being able to scale across vulnerable endpoints, networks, APIs and data repositories adding further security across broad networks.
Cyberattackers use gen AI to create convincing, high-fidelity digital identities that can bypass ID verification software, document verification software and manual reviews.
Too many automated security scans and SAST tools fail and burn Security Operations Centers' analysts' time.
Examples include Semgrep's customizable rules that help security engineers and developers find vulnerabilities and suggest organization-specific fixes.
An example of a vendor helping to solve these challenges is Socket, which proactively detects and blocks over 70 supply chain risk signals in open-source code, detects suspicious package updates and builds a security feedback loop to the dev process to secure supply chains.
Gen AI has the potential to streamline much of the work going on in Security Operations Centers, starting with improving the fidelity and accuracy of alerts.
Sekhar and Haskaraman believe that for gen AI to see enterprise-level growth, the security challenges every organization faces in committing to an AI strategy need to be solved first.
Their eight areas where gen AI will have an impact show how far behind many organizations are in being ready to move into an enterprise-wide AI strategy.
Gen AI can remove the drudgery and time-consuming work SOC analysts waste their time on when they could be delving into more complex projects.
The eight areas of impact are a start, and more is needed for organizations to better protect themselves against the onslaught of gen AI-based attacks.


This Cyber News was published on venturebeat.com. Publication date: Tue, 06 Feb 2024 14:43:05 +0000


Cyber News related to Eight emerging areas of opportunity for AI in security

Eight emerging areas of opportunity for AI in security - That's core to the thesis of how Menlo Ventures chose to evaluate eight areas where gen AI is having an outsized impact. They have collaborated on a series of blog posts that illustrate why closing the security for AI gaps is crucial for generative ...
1 year ago Venturebeat.com
The Art of Securing Cloud-Native Mobile Applications - We will explore the dynamic intersection of cloud-native architecture and mobile application security, delving into the strategies and best practices essential for safeguarding sensitive data, ensuring user privacy, and fortifying against emerging ...
1 year ago Feeds.dzone.com
Top 30 Best Penetration Testing Tools - 2025 - The tool supports various protocols and offers advanced filtering and analysis capabilities, making it ideal for diagnosing network issues, investigating security incidents, and understanding complex network interactions during penetration testing. ...
2 months ago Cybersecuritynews.com
The First 10 Days of a vCISO’S Journey with a New Client - Cyber Defense Magazine - During this period, the vCISO conducts a comprehensive assessment to identify vulnerabilities, engages with key stakeholders to align security efforts with business objectives, and develops a strategic roadmap to prioritize actions and resources. If ...
8 months ago Cyberdefensemagazine.com
ISAs and the Dawning Hardware Security Revolution - The eternal cat-and-mouse game pitting IT security improvements against evolving attacker exploits is usually framed as an arms race of rising software sophistication. Security teams implement firewall software, antivirus protection, data encryption, ...
1 year ago Darkreading.com
ISAs and the Dawning Hardware Security Revolution - The eternal cat-and-mouse game pitting IT security improvements against evolving attacker exploits is usually framed as an arms race of rising software sophistication. Security teams implement firewall software, antivirus protection, data encryption, ...
1 year ago Darkreading.com
Microsoft Security Copilot improves speed and efficiency for security and IT teams - First announced in March 2023, Microsoft Security Copilot-Microsoft's first generative AI security product-has sparked major interest. With the rapid innovations of Security Copilot, we have taken this solution beyond security operations use cases ...
1 year ago Microsoft.com
McCaffrey Joins 'ASTORS' Champion SIMS Software Board of Advisors - SIMS Software, the leading provider of security information management software to the government and defense industries - and the 2023 Platinum 'ASTORS' Award Champion for Best Security Workforce Management Solution, is delighted to announce that ...
1 year ago Americansecuritytoday.com PLATINUM
20 Best Endpoint Management Tools - 2025 - What is Good?What Could Be Better?Comprehensive endpoint security against many threats.The user interface may overwhelm some users.Machine learning for real-time threat detection.Integration with existing systems may be complex.A central management ...
2 months ago Cybersecuritynews.com
Embracing Security as Code - Everything is smooth until it isn't because we traditionally tend to handle the security stuff at the end of the development lifecycle, which adds cost and time to fix those discovered security issues and causes delays. Over the years, software ...
1 year ago Feeds.dzone.com
Cybersecurity jobs available right now: October 2, 2024 - Help Net Security - As an Applied Cybersecurity Engineer (Center for Securing the Homeland), you will apply interdisciplinary competencies in secure systems architecture and design, security operations, threat actor behavior, risk assessment, and network security to ...
8 months ago Helpnetsecurity.com
Strengthening Security Posture Through People-First Engagement - Regular, small doses of security education help combat the “forgetting curve,” a theory developed by Hermann Ebbinghaus that suggests people forget 75% of newly learned information within a couple of days. These statistics underscore a critical ...
8 months ago Informationsecuritybuzz.com
What Is Cloud Security Management? Types & Strategies - Cloud security management is the process of safeguarding cloud data and operations from attacks and vulnerabilities through a set of cloud strategies, tools, and practices. The cloud security manager and the IT team are generally responsible for ...
1 year ago Esecurityplanet.com
Gaining Insights on the Top Security Conferences - A Guide for CSOs - Are you a CSO looking for the best security events around the world? Well, you have come to the right place! This article is a guide to the top security conferences that offer essential security insights to help make informed decisions. Security ...
2 years ago Csoonline.com
6 Best Cloud Security Companies & Vendors in 2024 - Cloud security companies specialize in protecting cloud-based assets, data, and applications against cyberattacks. To help you choose, we've analyzed a range of cybersecurity companies offering cloud security products and threat protection services. ...
1 year ago Esecurityplanet.com
Normalizing Security Culture: Stay Ready - While it may seem like self-promotion or extraneous work, it’s extremely valuable to take the extra time to summarize threats stopped, processes improved, projects completed and team members modeling strong security behavior. Most people don't ...
8 months ago Darkreading.com
10 Best Security Service Edge Solutions - Security Service Edge is an idea in cybersecurity that shows how network security has changed over time. With a focus on customized solutions, Security Service Edge Solutions leverages its expertise in multiple programming languages, frameworks, and ...
1 year ago Cybersecuritynews.com
Five business use cases for evaluating Azure Virtual WAN security solutions - To help organizations who are evaluating security solutions to protect their Virtual WAN deployments, this article considers five business use cases and explains how Check Point enhances and complements Azure security with its best-of-breed, ...
1 year ago Blog.checkpoint.com
IaaS Security: Top 8 Issues & Prevention Best Practices - Understanding the risks, advantages, and best practices connected with IaaS security is becoming increasingly important as enterprises shift their infrastructure to the cloud. By exploring the top eight issues and preventative measures, as well as ...
1 year ago Esecurityplanet.com
Zero Trust 2025 - Emerging Trends Every Security Leader Needs to Know - Forward-thinking organizations are embedding Zero Trust principles into broader business strategies rather than treating them as isolated security initiatives. Security leaders must champion this integrated approach to Zero Trust implementation to ...
2 months ago Cybersecuritynews.com
How GPL-1 Drug Success Transforms Healthcare Revenue - The huge revenue opportunity stemming from recent success of GLP-1 drugs is not just for the pharmaceutical companies. The new category of Diabetes, weight loss and obesity drugs called GLP-1s is predicted to be a game-changing innovation in ...
1 year ago Feedpress.me
The 6 Best Email Security Software & Tools of 2024 - To guarantee full protection against email threats, important features to consider when picking an email security solution include email filtering and spam detection, sandboxing, mobile support, advanced machine learning, and data loss prevention. ...
8 months ago Esecurityplanet.com
Key Breakthroughs from RSA Conference 2025 - Day 1 - Sumo Logic unveiled intelligent security operations with capabilities like detection-as-code (bringing DevSecOps to threat detection), UEBA historical baselining (improving accuracy by learning behavior over time), multiple threat intelligence feeds, ...
1 month ago Cybersecuritynews.com Inception
IaaS vs PaaS vs SaaS Security: Which Is Most Secure? - Security concerns include data protection, network security, identity and access management, and physical security. While IaaS gives complete control and accountability, PaaS strikes a compromise between control and simplicity, and SaaS provides a ...
1 year ago Esecurityplanet.com
Surge in Cloud Threats Spikes Rapid Adoption of CNAPPs for Cloud-Native Security - CNAPPs integrate multiple previously separate technologies—including Cloud Security Posture Management (CSPM), Cloud Workload Protection Platforms (CWPP), Cloud Infrastructure Entitlement Management (CIEM), Kubernetes Security Posture Management ...
2 months ago Cybersecuritynews.com