Advertisement

  • News
  • Columns
  • Interviews
  • BW Communities
  • Events
  • BW TV
  • Subscribe to Print
BW Businessworld

In Cybersecurity, AI Is Poised To Be Mighty

AI and analytics can enable a Security Orchestration to automatically block threats, correct problems, respond to attacks and automate low level alerts based upon prior examples or similar historical threats. In the zero-trust world of cybersecurity, AI is indeed evolving into becoming a trusted security advisor of organizations.

Photo Credit :

1595317818_kTYuvN_Cybersecurity_FINAL.jpg

One of the biggest positives of technology is having made the world smaller, rendering it borderless to a significant extent. Interconnectedness is permeating our daily lives largely by technologies like the cloud. However, as the pathway between us and the rest of the world shrinks, so does the distance from cybercriminals.

Cybercrime has risen significantly in recent years, capitalizing on the fact that the digital revolution has brought the entire world within cybercriminals’ reach. But as cybercrime profits rise, so do the costs to businesses after suffering a breach, with the 2021 IBM Cost of a Data Breach Report highlighting that the cost of a data breach to Indian businesses averages ₹165 million.

As the user experience becomes more seamless thanks to the modernization of digital infrastructure and our reliance on IoT devices, it’s also becoming easier for cybercriminals to exploit digital pathways to gain a foothold into business environments. Now more than ever, business leaders need to ask themselves: what are the ways to prevent the biggest risks to the organization?

AI to the cyber-rescue

Currently, the prevalence of hybrid and multi clouds have made businesses more amorphous and collaborative that are high on resiliency and reliability. Securing such environments require technologies like AI that can be just as flexible and scalable.

Machines and AI can augment the skills of human security analysts when it comes to tasks that humans are not well suited for, allowing them to do their jobs faster, more accurately and more efficiently. AI can be deployed to automate certain parts of the cybersecurity response process and handle more remedial yet time-intensive tasks. This can free up analysts to focus their attention on more complex and priority threats.

AI can also help alleviate some of the current skills gap facing security teams. However, it must be pointed out that developing both AI and cybersecurity skillsets will be important for the next generation security workforce. These include Development, security, and operations (DevSecOps), Identity and access management, Security Orchestration Automation and Response (SOAR) and others.

AI: A trusted security advisor

Furthermore, AI-enabled analytics can provide a better context of various types of threats, thereby quickly arming security teams with the information they need to make decisions as well as minimize the impact on a user experience. Predictive analytics can be used to identify network anomalies, detect malware, and analyze user behavior patterns to detect risky users within an enterprise, and potentially thwart fraud or insider threats.

With proper optimisation, machine learning can dramatically reduce the proportion of false positives that are generated from application security testing. By applying AI to behavioral biometrics, organizations can better identify the user based on keyboard strokes, mouse movements or the use of their mobile device. A successful application of this scenario can reduce the reliance on the concept of passwords itself.

To sum it up, AI and analytics can enable a Security Orchestration to automatically block threats, correct problems, respond to attacks and automate low level alerts based upon prior examples or similar historical threats. In the zero-trust world of cybersecurity, AI is indeed evolving into becoming a trusted security advisor of organizations.

Disclaimer: The views expressed in the article above are those of the authors' and do not necessarily represent or reflect the views of this publishing house. Unless otherwise noted, the author is writing in his/her personal capacity. They are not intended and should not be thought to represent official ideas, attitudes, or policies of any agency or institution.


Tags assigned to this article:
cybersecurity

Prashant Bhatkal

The author is Security Software Sales Leader, IBM Technology Sales, India/South Asia

More From The Author >>