{"id":6173,"date":"2025-05-19T14:52:47","date_gmt":"2025-05-19T06:52:47","guid":{"rendered":"https:\/\/cicserver.com\/the-dual-face-of-ai-security-are-you-ready\/"},"modified":"2025-05-19T14:52:47","modified_gmt":"2025-05-19T06:52:47","slug":"the-dual-face-of-ai-security-are-you-ready","status":"publish","type":"post","link":"https:\/\/cicserver.com\/de\/the-dual-face-of-ai-security-are-you-ready\/","title":{"rendered":"The dual face of AI security &#8211; are you ready?"},"content":{"rendered":"<p><br \/>\n<br \/><img decoding=\"async\" src=\"https:\/\/cdn.mos.cms.futurecdn.net\/pNvZnS4EQCoYBG2inqCq5L.jpg\" \/><\/p>\n<div id=\"article-body\">\n<p>The way security professionals and their businesses approach artificial intelligence is one of contrasts and contentions. We\u2019re still in a state of flux as to whether AI will lead to true cyber safety, or leave us more vulnerable to increasingly sophisticated attacks.<\/p>\n<p>Optimists view AI as a gleaming opportunity to improve <a data-analytics-id=\"inline-link\" href=\"https:\/\/www.techradar.com\/best\/best-online-cyber-security-courses\" data-before-rewrite-localise=\"https:\/\/www.techradar.com\/best\/best-online-cyber-security-courses\">cybersecurity<\/a> tools at a rate that helps us stay ahead of attackers. AI can strengthen defenses at unprecedented speeds and deliver automated threat intelligence that guides both immediate and long-term decision-making.<\/p>\n<aside data-block-type=\"embed\" data-render-type=\"fte\" data-skip=\"dealsy\" data-widget-type=\"seasonal\" class=\"hawk-base\"\/>\n<p>A more pessimistic view however presents AI as a weapon for adversaries to launch increasingly sophisticated new and dangerous threats on unprepared individuals and organizations.<\/p>\n<aside data-component-name=\"Recirculation:ArticleRiver\" data-nosnippet=\"\">\n<span class=\"bg-secondary-500 text-white text-lg font-bold uppercase py-1 px-2 leading-[1.625rem] sm:leading-[6px] sm:text-sm\"><br \/>\nYou may like<br \/>\n<\/span><\/p>\n<\/aside>\n<p>In my view, our reality sits somewhere in between.<\/p>\n<div id=\"slice-container-person-vZQbHsF7j2qpE4p2bgJFti-7ek0c4IuxEURhqjlLXR4UG6Joi3AXlKd\" class=\"slice-container person-wrapper person-vZQbHsF7j2qpE4p2bgJFti-7ek0c4IuxEURhqjlLXR4UG6Joi3AXlKd slice-container-person\">\n<div class=\"person person--separator\">\n<div class=\"person__heading\">\n<div class=\"person__name-socials\"><span class=\"person__name\">Billy O\u2019Riordan<\/span><\/p>\n<nav class=\"button-social-group person__social-buttons\" aria-labelledby=\"button-social-group- person__social-buttons\">\n<p>Social Links Navigation<\/p>\n<p><a class=\"button-social\" href=\"https:\/\/www.performanta.com\/\" target=\"_blank\" aria-label=\"WEBSITE\"><span class=\"button-social__icon button-social__icon-website\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"icon-website\" viewbox=\"0 0 1000 1000\"><path d=\"M1000 500A501 501 0 0 0 503 0h-6A501 501 0 0 0 0 500c0 275 223 499 498 500h4a501 501 0 0 0 498-500zM529 936V765h133c-31 90-79 154-133 171zM337 765h134v171c-54-17-101-81-134-171zM61 539h176a899 899 0 0 0 22 167H110a439 439 0 0 1-49-166zM471 64v191H331c31-101 82-173 140-191zm199 191H529V64c58 18 109 90 140 191zm270 226H763c-1-59-7-115-18-167h155a438 438 0 0 1 40 167zm-235 0H529V314h156a857 857 0 0 1 19 167zM471 314v167H296a859 859 0 0 1 19-167h156zM237 481H60a438 438 0 0 1 41-167h154a921 921 0 0 0-18 167zm59 58h175v167H320a837 837 0 0 1-24-166zm233 167V539h175a831 831 0 0 1-24 167H529zm234-166h176a436 436 0 0 1-49 166H741a893 893 0 0 0 22-166zm104-285H731c-20-68-47-126-81-169a443 443 0 0 1 217 169zM350 86c-33 43-61 101-81 169H133A443 443 0 0 1 350 86zM148 765h127c20 59 45 110 75 150a442 442 0 0 1-202-150zm502 150c30-39 56-91 75-150h127a442 442 0 0 1-202 150z\"\/><\/svg><\/span><\/a><\/nav>\n<\/div>\n<aside class=\"person__role\"\/><\/div>\n<div class=\"person__bio\">\n<p>Chief Executive Officer, Performanta.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<h2 id=\"what-it-means-to-be-ai-secure-3\">What it means to be AI-secure<\/h2>\n<p>There are always two sides to a coin. Where AI is considered, risks can arise both internally and externally. For instance, hackers use AI\u2019s speed and scalability to launch widespread cyber attacks from outside the business, while any mishandling of AI technology within can hand valuable assets directly over to them.<\/p>\n<p>A sound AI security strategy considers both sides.<\/p>\n<p>AI\u2019s efficacy in helping businesses automate the data collection process is a well known advantage. However, organizations must not forget that speed and efficiency do not surpass security as a priority. For example, automating data collection with AI still requires anonymization when sensitive information is included, and it must be controlled so only approved individuals can access it.<\/p>\n<p>Here, <a data-analytics-id=\"inline-link\" href=\"https:\/\/www.techradar.com\/best\/ztna-solutions\" data-before-rewrite-localise=\"https:\/\/www.techradar.com\/best\/ztna-solutions\">zero-trust<\/a> and multi-factor authentication can help ensure only the correct individuals within an organization can access it. This practice stems from the tide of mishandling, improper storage and data leaks &#8211; purposeful or otherwise.<\/p>\n<p>Like with any new software, businesses must also consider the security of third-party AI services. Are you certain that the AI model you are using is truly secure? Here, diligence must come before investment &#8211; organizations can have the strongest internal defenses only to be let down by poor third-party security.<\/p>\n<p>We saw a recent example of third-party security failure by UnitedHealth, when an attacker gained server access through Change Healthcare, a third-party affiliate. Breaching this side door meant UnitedHealth\u2019s highly protected customer data could be accessed in a matter of days.<\/p>\n<p>There\u2019s also the need to continually train AI models with the latest information. Making decisions on out-of-date data opens the door for misguided defense strategies. Before businesses make any AI-based decisions, they must remember to account for the recency and relevancy of the data they are processing.<\/p>\n<h2 id=\"what-features-to-look-for-in-ai-secure-security-platforms-3\">What features to look for in AI-secure security platforms<\/h2>\n<p>While the global battle for AI superiority rages, businesses must carefully consider which <a data-analytics-id=\"inline-link\" href=\"https:\/\/www.techradar.com\/best\/best-ai-tools\" data-before-rewrite-localise=\"https:\/\/www.techradar.com\/best\/best-ai-tools\">AI tools<\/a> will bring them the most security. The best providers of AI-ready security tools and services have preempted the concerns laid out above, and innovated their services to limit errors in managing an AI-ready world. <a data-analytics-id=\"inline-link\" href=\"https:\/\/www.techradar.com\/tag\/microsoft\" data-auto-tag-linker=\"true\" data-before-rewrite-localise=\"https:\/\/www.techradar.com\/tag\/microsoft\">Microsoft<\/a> Security Copilot is a great example approach to AI-security and a cyber safe outlook.<\/p>\n<p>Here are four features to look out for:<\/p>\n<h2 id=\"1-real-time-monitoring-3\">1. Real-time monitoring<\/h2>\n<p>When it comes to identifying vulnerabilities, <a data-analytics-id=\"inline-link\" href=\"https:\/\/www.techradar.com\/best\/best-network-monitoring-tools\" data-before-rewrite-localise=\"https:\/\/www.techradar.com\/best\/best-network-monitoring-tools\">monitoring<\/a> threats and repelling attacks, cyber teams rely on powerful platforms to do the heavy lifting; there simply isn\u2019t enough time or resources to do this on a case-by-case basis. Through proprietary AI, businesses gain transparent, comprehensive views of internal and external activity, network traffic, user journeys and data access.<\/p>\n<p>From here, intuitive machine learning can recognize anomalies from within and outside the organization, harnessing historical data to analyze minute-by-minute threat environments and predict when attacks might occur and in what form.<\/p>\n<p>Even the hardest working security professional can\u2019t be in two places at once. Microsoft Security Copilot, among other systems, accounts for this, leveraging AI to monitor the constant stream of <a data-analytics-id=\"inline-link\" href=\"https:\/\/www.techradar.com\/best\/best-apps-for-small-business\" data-before-rewrite-localise=\"https:\/\/www.techradar.com\/best\/best-apps-for-small-business\">business<\/a> activity while also intelligently flagging real-time threats.<\/p>\n<p>Naturally, as incident response becomes more automated &#8211; although human oversight remains crucial &#8211; security teams can receive threat data almost instantly, with less manually intensive requirements, freeing up resources to immediately respond.<\/p>\n<p>For the past two decades, we have been one step behind cyber attackers; with real-time response, we level the playing field.<\/p>\n<h2 id=\"3-automation-to-reduce-time-and-error-3\">3. Automation to reduce time and error<\/h2>\n<p>While there is something to be said for automated processes reducing human error, especially from time and resource-poor cyber specialists, it\u2019s my opinion that this risk will always exist. At least with this mindset, we\u2019re not falling into the old adage of \u2018fail to plan, plan to fail\u2019. Microsoft Security Copilot and other systems, for all of their advantages, are only as robust and foolproof as the security specialist using them.<\/p>\n<p>Does automation decrease the chance of human error? Definitely. Does it cure it altogether? Definitely not. We must enable powerful new systems to remove manual task intensity, but they must remain directed by boots-on-the-ground specialists.<\/p>\n<h2 id=\"4-system-cohesion-3\">4. System cohesion<\/h2>\n<p>Businesses use many different systems for vital day-to-day operations. <a data-analytics-id=\"inline-link\" href=\"https:\/\/www.techradar.com\/best\/best-data-migration-tools\" data-before-rewrite-localise=\"https:\/\/www.techradar.com\/best\/best-data-migration-tools\">Data migration<\/a> between separate systems, failing to train and educate employees, and poor security integrity across the tech stack, all increase the attack surface and therefore the organization&#8217;s vulnerability.<\/p>\n<p>The tech giants hold a significant advantage here. Take Microsoft Security Copilot, which has been built to integrate into Microsoft\u2019s existing suite of tools, such as Azure Cloud, Defender, and Office products. This level of \u2018baked-in\u2019 security reduces the attack surface. It\u2019s a strategic advantage that cannot be underestimated, offering a greater degree of monitoring, control and transparency.<\/p>\n<h2 id=\"becoming-ai-secure-is-the-first-step-3\">Becoming AI-secure is the first step<\/h2>\n<p>The best piece of advice I and many of my colleagues can provide is to adopt a constant, deliberate and thorough analysis of AI opportunities and challenges.<\/p>\n<p>Is there a new capability from your chosen provider that can help plug a long-known vulnerability to a greater extent? Invest and move quickly.<\/p>\n<p>Have attackers launched a new AI-based threat that challenges existing defenses? It\u2019s time to quickly analyze current strategies and find ways to innovate in turn, relying on your network to formulate the best industry-wide approach.<\/p>\n<p>An AI-secure organization is one that commits itself to proactive cyber safety. AI can be our greatest tool in the fight to come, but we must not forget that attackers are thinking the same.<\/p>\n<p><a data-analytics-id=\"inline-link\" href=\"https:\/\/www.techradar.com\/news\/best-endpoint-security-software\" target=\"_blank\" data-before-rewrite-localise=\"https:\/\/www.techradar.com\/news\/best-endpoint-security-software\"><u>We&#8217;ve compiled a list of the best endpoint protection software<\/u><\/a>.<\/p>\n<p><em>This article was produced as part of TechRadarPro&#8217;s Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: <\/em><a data-analytics-id=\"inline-link\" href=\"https:\/\/www.techradar.com\/news\/submit-your-story-to-techradar-pro\" target=\"_blank\" data-before-rewrite-localise=\"https:\/\/www.techradar.com\/news\/submit-your-story-to-techradar-pro\"><em>https:\/\/www.techradar.com\/news\/submit-your-story-to-techradar-pro<\/em><\/a><\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>The way security professionals and their businesses approach artificial intelligence is one of contrasts and contentions. We\u2019re still in a state of flux as to whether AI will lead to true cyber safety, or leave us more vulnerable to increasingly sophisticated attacks. Optimists view AI as a gleaming opportunity to improve cybersecurity tools at a [&hellip;]<\/p>","protected":false},"author":3,"featured_media":6174,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","footnotes":""},"categories":[1],"tags":[],"class_list":{"0":"post-6173","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-blog"},"_links":{"self":[{"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/posts\/6173","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/comments?post=6173"}],"version-history":[{"count":0,"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/posts\/6173\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/media\/6174"}],"wp:attachment":[{"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/media?parent=6173"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/categories?post=6173"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/tags?post=6173"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}