AI Will Be Disruptive - For Both Security & Jobs

The risks that generative Artificial Intelligence (AI) technology poses to cyber security, particularly in terms of chatbots and language processing programs like GPT-3 are significantly increasing. 

The new genre of AI could be as transformative as the Industrial Revolution, the British government’s outgoing chief scientific adviser, Sir Patrick Vallance, who has urged Britain to act immediately to prevent large numbers of people becoming jobless with the changes that ChatGPT-style, generative AI could bring.

“There will be a big impact on jobs and that impact could be as big as the Industrial Revolution was,” Vallance told the Commons science, innovation and technology committee. “There will be jobs that can be done by AI, which can either mean a lot of people don’t have a job, or a lot of people have jobs that only a human could do.” 

Since its launch in November 2022, ChatGPT, an AI  chatbot, has been causing quite a stir because of the software’s surprisingly human and accurate responses. The auto-generative system reached a record-breaking 100 million monthly active users only two months after launching. However, while its popularity continues to grow, the current discussion within the cyber security industry is whether this type of technology will aid in making the Internet safer or play right into the hands of those trying to cause chaos. 

Generative AI has helped bad actors to develop new attack strategies, enabling them to stay one step ahead of cyber security protections.

And as AI technologies become more sophisticated, they are being used by cyber criminals to create more convincing phishing emails and scam messages on a much larger scale. For example, AI-powered chatbots can engage in conversation with unsuspecting victims, making them more likely to divulge sensitive information or click on links that contain malware.

These types of attacks are becoming more common, and they can be difficult to detect and prevent. In response, cybersecurity experts are developing new AI-powered security systems that can identify and block malicious traffic. 

Cyber criminals adopted the technology to create convincing phishing emails. AI-generated text helps attackers produce highly personalised emails and text messages more likely to deceive targets. However, these systems are still in the early stages of development, and there is a risk that they could be circumvented by sophisticated AI-powered attacks. 

As AI technology continues to advance, it will become increasingly important for organisations to invest in robust cyber security systems that can protect against these new and evolving threats.

AI-powered chatbots also raise the question of job security. Of course, the current system couldn’t replace a highly trained professional, but this technology can significantly reduce the number of logs and reports that need to be inspected by an employee. This could, for example, have an impact on how many analysts a security operation centre would need to employ. 

AI has the potential to help protect against these emerging threats, but it also presents its own set of risks. Machines with high processing capabilities could hack systems faster and more effectively than humans. To counter these threats, we need to ensure that AI is used defensively and with a clear understanding of who is in control.

As AI becomes more integrated into society, it's important for lawmakers, judges, and other decision-makers to understand the technology and its implications. Building strong alliances between technical experts and policymakers will be crucial in navigating the future of AI in threat hunting and beyond. 

MIT:    ZDNet:     Business News:     Oodaloop:    Venturebeat:   Flipboard:    Guardian:    CPO Magazine

You Might Also Read: 

Regulatory Plans For Artificial Intelligence & Algorithms:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« ‘Godfather Of AI’ Warns Of Imminent Dangers
Meta Will Contest EU $1.3B Data Privacy Fine »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Caliber Security Partners

Caliber Security Partners

Caliber Security Partners is a full-service information security company, with a wide range of security services for clients with varying levels of security maturity.

iLand

iLand

iland is a global cloud service provider of secure and compliant hosting for infrastructure (IaaS), disaster recovery (DRaaS), and backup as a service (BaaS).

Sangfor Technologies

Sangfor Technologies

Sangfor is a global leader of IT infrastructure, security solutions, and cloud computing.

CyberProof

CyberProof

CyberProof aims to give clarity and confidence to businesses worldwide using a new risk-based approach to cyber security services.

Pipeline Security

Pipeline Security

Pipeline Security protects businesses with real-time threat data, threat detection & prevention, continuous cyber security monitoring and security analytics.

NFIR

NFIR

NFIR is a specialist in the field of cyber security incident response and digital forensics.

Exeon Analytics

Exeon Analytics

Exeon Analytics is a Swiss cyber security company that is specialized in detecting hidden data breaches and advanced cyber attacks.

New Enterprise Associates (NEA)

New Enterprise Associates (NEA)

As one of the world’s largest and most active venture capital firms, NEA has developed deep domain expertise and insight into our industries of focus - technology and healthcare.

TAG Cyber

TAG Cyber

TAG Cyber's mission is to provide world-class cyber security research, advisory, and consulting services to enterprise security teams around the world.

INVISUS

INVISUS

INVISUS protects businesses against the latest cyber risks – including business and employee identity theft, data breaches, and cybersecurity compliance.

Conversant Group

Conversant Group

Conversant Group is an IT infrastructure and security consulting company, providing technical, organizational, procedural, and process consulting internationally.

InfusionPoints

InfusionPoints

InfusionPoints is your independent trusted partner dedicated to assisting you in building your secure and compliant business solutions.

Votiro

Votiro

Votiro is an award-winning cybersecurity company that specializes in file sanitization, ensuring every organization is safe from zero-day and undisclosed attacks.

Traced

Traced

TRACED is changing the detection paradigm. Empowering defenders to go on the offense to engage cyber attackers before they compromise your organization.

Snare

Snare

Snare is a comprehensive set of event monitoring and analysis tools designed to address critical auditing and security requirements.

Corona IT Solutions

Corona IT Solutions

At Corona IT Solutions, our team of specialists in networking, wireless and VoIP are dedicated to providing proactive monitoring and management of your IT systems.