Le Lézard
Classified in: Science and technology
Subject: Product/Service

AI in Cybersecurity: How to Cut Through the Overhype and Maximize the Potential


Artificial intelligence (AI), machine learning (ML), and deep learning (DL) are often applied in cybersecurity, but their applications may not always work as intended. ISACA's new publication, AI Uses in Blue Team Security, looks at AI, ML and DL applications in cybersecurity to determine what is working, what is not, what looks encouraging for the future and what may be more hype than substance.

Leveraging interviews with some of the engineers behind these technologies, firsthand examination and use of some of the related products, and observations of chief information security officers (CISOs) and chief information officers (CIOs), AI Uses in Blue Team Security seeks to determine whether marketing tactics obscure reality when it comes to new security technology.

Of the 13 engineers who commented for this publication, none felt that the marketing associated with the products they were working on was completely accurate with respect to advertised capabilities. However, the engineers were optimistic about the direction they were heading and the technologies they would be creating as they relate to ML and DL.

The publication outlines the three areas in cybersecurity where the engineers believe that ML helps most significantly:

  1. Network intrusion detection/security information and event management (SIEM) solutions: Keeping an intrusion detection system (IDS) up to date can be a manual and time-consuming process. In the market today, ML capabilities are helping to enhance and reimagine the IDS methods of signature-based intrusion detection and anomaly-based intrusion detection.
  2. Phishing attack prevention: There are bots and automated call centers that pretend to be human; ML solutions such as natural language processing (NLP) and Completely Automated Public Turing tests to tell Computers and Humans Apart (CAPTCHAs) help prove whether users are human or a machine, in turn detecting potential phishing attacks.
  3. Offensive cybersecurity application: ML is being applied to help with phases of penetration testing, specifically in reconnaissance, scanning and fuzzing/exploit development.

On the other hand, there are a few areas where ML is overused. Developers may be using ML for problems that do not require it, or in some instances, ML solutions may be ineffective. The paper explores those areas as well as malicious uses of ML and DL, specifically in social engineering and phishing.

"Machine learning's gradual adoption in cybersecurity has led to good results, and there are innovative products in the market that should take ML and DL to new levels," says Keatron Evans, principal security researcher, Infosec, and lead developer of the publication.

"However, it's possible cybercriminals may be outpacing the cyber defenders when it comes to developing and employing new technologies, and not all ML/AI-based products are as innovative as they claim to be. Cybersecurity professionals need to continuously educate themselves to be able to not only stay on top of the latest developments, but also discern which technology tools will best meet their needs."

AI Uses in Blue Team Security is available as a free download at www.isaca.org/ai-blue-team-security. For more emerging technology resources, visit www.isaca.org/resources/emerging-technology-resources.

About ISACA

For more than 50 years, ISACA® (www.isaca.org) has advanced the best talent, expertise and learning in technology. ISACA equips individuals with knowledge, credentials, education and community to progress their careers and transform their organizations, and enables enterprises to train and build quality teams. ISACA is a global professional association and learning organization that leverages the expertise of its more than 150,000 members who work in information security, governance, assurance, risk and privacy to drive innovation through technology. It has a presence in 188 countries, including more than 220 chapters worldwide. In 2020, ISACA launched One In Tech, a philanthropic foundation that supports IT education and career pathways for under-resourced, under-represented populations.

Twitter: www.twitter.com/ISACANews
LinkedIn: www.linkedin.com/company/isaca
Facebook: www.facebook.com/ISACAGlobal
Instagram: www.instagram.com/isacanews


These press releases may also interest you

at 04:10
KLab Inc. announced that its hit 3D action game Bleach: Brave Souls has reached a total of 90 million downloads worldwide. See the original press release (https://www.klab.com/en/press/) for more information. 90 Million Downloads Celebration...

at 04:00
Demand is rising among German enterprises for consulting services that can optimize Salesforce license usage and reduce associated costs, a new research report published today by Information Services Group (ISG) , a leading global technology research...

at 04:00
Full Truck Alliance Co. Ltd. ("FTA" or the "Company") , a leading digital freight platform, today announced that it will release its first quarter 2024 unaudited financial results on Tuesday, May 21, 2024, before the open of the U.S. markets. The...

at 04:00
A new study launched by Forrit, the next-generation, global content management system (CMS) provider, reveals that 89% of senior marketers and tech leaders are optimistic that Web 3.0 and the metaverse have the potential to revolutionise the way we...

at 03:26
Allied Market Research published a report, titled, "E-waste Disposal Market by Material (Metal, Plastic, Glass,...

at 03:25
UnionPay International (UPI) has teamed up with JD PAY, JD.com's digital payment service to elevate the cross-border shopping experience, enabling customers around the world to use their local UnionPay cards on JD.com. This partnership is a major...



News published on and distributed by: