AI-Driven Cyber Security Is Booming

AI has already permanently changed the Cyber Security Industry. At the speed that it's being adopted, the market is expected to reach more than $133 billion by 2030, but its impact has been both positive and negative

Hackers have been quick to use AI  which has fuelled a huge rise in cyber crime, expected to reach $9.22 trillion cost to Internet users in 2024, with the vast majority (85%) of cyber security professionals blaming AI. 

This rise is for these key reasons: AI increases the speed and volume of attacks, it adapts to specific defences, and it creates more sophisticated, personalised attacks.

But on the opposite side, businesses are stating that AI strengthens cybersecurity by enhancing threat and phishing detection, rapidly analysing incidents and finding solutions, and creating threat simulations to predict possible cyber-attacks.

Breaches that affected organisations with fully integrated security AI solutions cost them $1.8 million less on average than businesses without them. 69% of businesses stated that AI in cyber security is a necessity due to the threat amount that human analysts are unable to deal with.  

According to Nick Francis, the editor of the authoritative industry guide Techopedia “AI has exploded in popularity in the last year, with users employing them for every day tasks from automating data gathering to detailed research. Although incredibly useful, it’s clear that it can also be directed to automate expansive and expensive cyber-attacks"

"Organisations and users have to be more aware than ever before to not only the same threats, but updated versions that may be using AI to creatively customise to targets more... User education, updated systems, and protective programs have to be used and maintained to stand a chance against these new threats.” Francis concludes.

Techopedia

Image:  Ideogram

You Might Also Read: 

British Police, AI & The Fight Against Cyber Crime:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

 

« Proliferation Of Fake News On Social Media
Manufacturing Firms Suffer From Under-Performing Cyber Security Providers »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ISTQB

ISTQB

ISTQB has defined the "ISTQB Certified Tester" scheme that has become the world-wide leader in the certification of competences in software testing.

Pole SCS (Secure Communicating Solutions)

Pole SCS (Secure Communicating Solutions)

SCS is a world-class competitiveness cluster dedicated to digital technologies in the fields of Microelectronics, Internet Of Things, Digital Security, Artificial Intelligence And Big Data.

Trustless Computing Association (TCA)

Trustless Computing Association (TCA)

TCA is is a non-profit organization promoting the creation and wide availability of IT and AI technologies that are radically more secure and accountable than today’s state of the art.

MrLooquer

MrLooquer

MrLooquer provide a solution to automatically discover the assets of organizations on the internet, determine the level of exposure to attacks and help to manage risk accurately.

EOL IT Services

EOL IT Services

EOL IT Services is the UK’s most accredited provider of IT Asset Disposal (ITAD), Lifecycle Services and Data Destruction.

GoSecure

GoSecure

GoSecure Managed Detection and Response helps all organizations reduce dwell time by preventing breaches before they happen.

ThreatX

ThreatX

ThreatX provides complete web application & API protection to address expanding app footprints and complex attacks.

Voodoo Security

Voodoo Security

Voodoo Security is a specialized information security consulting firm focused on security assessments, risk and compliance analysis, and cloud security.

Octo

Octo

Octo, an IBM company, is a technology firm dedicated to solving the Federal Government’s most complex challenges, enabling agencies to jump the technology curve.

Nine23

Nine23

Nine23 are a highly focused cyber security solutions company that defines, builds and manages innovative services, enabling end-users to use technology securely in today’s workplace.

IBM Security

IBM Security

IBM manufactures and markets computer hardware, middleware and software, and offers hosting and consulting services in areas ranging from mainframe computers to nanotechnology.

CYTUR

CYTUR

CYTUR provide trusted and secured maritime cybersecurity solutions to keep ships safe, protecting them, their crews, cargo and all stakeholders from maritime cyber threats.

Worksent Technologies

Worksent Technologies

Worksent is a Trusted white-label offshore support partner for MSPs and MSSPs.

modePUSH

modePUSH

modePUSH is a cybersecurity company focused on end-to-end breach response from Digital Forensics to Restoration across the enterprise and cloud environments.

Lenze

Lenze

Lenze are an experienced partner for automation systems, digitalization and cyber security.

Axiotrop

Axiotrop

AXIOTROP is a Cybersecurity firm offering leading services in assessment, remediation, and validation to protect the confidentiality, integrity, and availability of regulated information.