AI Will Soon Replace Cyber Security Staff

Artificial Intelligence (AI) is becoming normal in today's electronically connected world. Combining the latest powerful software with top-of-the-range hardware, AI tools are being used to transform many areas of everyday life, from healthcare to traffic problems.  Running on huge amounts of data and  detailed algorithms, AI systems can perform mammoth computing tasks faster and more efficiently than humans, helping making big strides in research and development.  Now, a survey has revealed the widespread conviction that  cyber security jobs will eventually be entirely automated, operating without human intervention. 

Based on  interviews with 500 UK IT decision-makers, the leading security firm Trend Micro has found that more than third  (41%) believe that AI will replace their role by 2030.

AI's effect on many types of work will prove to be disruptive, projecting a future vision in which robots take jobs from human workers. Alternatively, there is a vision that automation can  create more jobs than it eliminates by providing new tools to exploit as yet unimagined business opportunities.

  • 32% of respondents said that they believed that technology would eventually automate all cyber security jobs.
  •  Only 9% of the survey respondents said they were confident that AI would “definitely” not replace their jobs within the next ten years.
  •  45% of IT bosses were planning to invest in cyber security  training and education - a crucial development  if individuals that are negatively impacted by AI can be re-deployed in other roles.

There are a range of concerns about the impact of  AI, from making many forms of employment for certain professions  obsolete, to the existential  threat that a super intelligent, self-learning machine could pose to humanity.  However, AI can be designed to empower people to share their skills and knowledge and the scope of human intelligence will always exceed even the most powerful AI.

For this reason, it’s important to remain focused on using this powerful technology to support humans, not replace them. While certain industries will need to adapt to AI being used for many tasks, this will remain under the direction of humans.

The risk in coming years is that businesses will attempt to use AI negatively, instead of reinforcing human knowledge and skills. If businesses use AI to undermine their staff and make them feel vulnerable, like using it solely to monitor employee performance, then trust will evaporate. When planning how to best deploy and develop AI decision makers should remember that it’s much harder to regain after it’s been lost than it is to build and maintain it. 

Trend Micro:    TechRadar:        Synet Solutions:      Techradar:      Wired

You Might Also Read: 

E-Businesses That Don’t Require Employees:

 

« Take Your Network Security One Step Further
The Cyber Security Top Ten Power List »

Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Free Access: Cyber Security Supplier Directory listing 5,000+ specialist service providers.

WEBINAR: How To Build A Security Observability Strategy In AWS

WEBINAR: How To Build A Security Observability Strategy In AWS

Thursday, Apr 22, 2021 - Join this webinar to learn how to build a security observability strategy in AWS, covering cloud-native monitoring sources, guardrails, and automation capabilities.

eBook: Practical Guide to Security in the AWS Cloud

eBook: Practical Guide to Security in the AWS Cloud

AWS Marketplace would like to present you with a digital copy of the new book, Practical Guide to Security in the AWS Cloud, by the SANS Institute.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Perimeter 81

Perimeter 81

Perimeter 81 is a Zero Trust Network as a Service designed to simplify secure network, cloud and application access for the modern and distributed workforce.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

National Cyber Security Centre (NCSC) Norway

National Cyber Security Centre (NCSC) Norway

NCSC is part of the Norwegian Security Authority, and is Norway's national cyber security hub and the national CERT.

Halo Consulting

Halo Consulting

We provide advice on products from all of the major insurance providers including cyber liability insurance.

Ikarus Security Software

Ikarus Security Software

Ikarus focuses on antivirus and content-security solutions.

PRODAFT

PRODAFT

PRODAFT, Proactive Defense Against Future Threats, is a cyber security and cyber intelligence company providing solutions to commercial customers and government institutions.

_cyel

_cyel

_cyel is introducing a new cybersecurity strategy: not a new generation of patches and firewalls, but moving target security – we take away the targets. Without replacing your existing system.

Miradore

Miradore

Miradore is a software company specializing in effective, cloud-based device management. Our goal is to help IT Service Providers and IT departments secure and control devices.

NTIC Cyber Center

NTIC Cyber Center

NTIC Cyber Center is an organization dedicated to making the National Capital Region (Washington DC) more resilient to cyber-attacks.

CryptoSec.info

CryptoSec.info

CryptoSec.info is a web resource focused on educating the beginners in the cryptocurrency space on how to properly secure their online assets from hackers and scammers.

David Hayes-Export Controls

David Hayes-Export Controls

David Hayes-Export Controls provides assistance to companies affected by export controls or who are considering entering the market but are unsure of the commercial and regulatory implications.

Censys

Censys

Our customers rely on Censys data to get the global visibility they need of their attack surfaces in order to proactively prevent nation-state attacks and emerging threats.