Business Is Responding To AI Cyber Security Threats

Cyber security teams are changing their strategies to keep pace with emerging AI-based threats targeting businesses, according to a report from cyber security firm Deep Instinct.

Deep Instinct’s Voice of SecOps Report, conducted by Sapio Research, surveyed 500 senior cyber security experts from companies with more than 1,000 US-based employees. The report found that 75% of respondents changed their cybersecurity strategy in the past 12 months to combat AI-powered cyber threats.

  • Almost all (97%) of those surveyed security professionals expressed concern their organisation will suffer a breach stemming from AI.
  • A further 61% admitted to seeing an increase in deepfakes in the past 12 months.
  • Three-quarters (75%) of respondents said they had seen deepfakes attempting to impersonate a CEO or C-suite executive.

Despite the rising concerns about AI, Deep Instinct found that 41% of businesses rely on outdated Endpoint Detection and Response (EDR) solutions to protect their organisations. EDRs monitor end-user devices to detect potential cyber threats.

However, the describes using EDR to combat AI as “equivalent to fighting a five-alarm fire with a garden hose.”

  • Some 31% of respondents said they were planning to increase their EDR investments to combat AI.
  • Away from EDR, 42% of surveyed cyber security professionals said their organisation is using preventative technologies to combat AI attacks, including predictive prevention platforms.
  • Nearly half (45%) of the respondents admitted that they think their employers are wasting their cyber security investments

Other major concerns security professionals highlighted included a lack of experience concerning AI, ageing infrastructure and systems, as well as poor risk assessments.

More than half (53%) of the surveyed professionals said their teams were under increased boardroom pressure, while 56% said their stress levels were worse and 66% said AI is “causing feelings of burnout and stress.” Significantly, the report found that C-suite staff are concerned about their business's readiness to handle AI attacks with one-third (33%) concerned they lack the necessary visibility into AI systems and tools.

Deepfakes continue to plague organisations, with C-suite impersonations rising. Deepfakes, or synthetic audio or video media files that have been digitally manipulated with AI, no longer just impact public figures and celebrities. 

Business leaders  are now prime targets for manipulation and the Deep Instinct found that 61% of organisations experienced a rise in deepfake incidents over the past year, with 75% of these attacks impersonating an organisation’s CEO or another member of the C-suite.

Some 35% of respondents said AI tools improve their productivity and automate routine tasks. The same amount said that adopting a proactive cyber security approach helps relieve role-related stress.

Deep Instinct   |    AI Business   |    MorningStar   |    SecurityInfoWatch   |   Silicon 

Image: CherriesJD

You Might Also Read: 

The Cybersecurity Risks Of Generative AI:

DIRECTORY OF SUPPLIERS - Deepfake & Disinformation Detection:

___________________________________________________________________________________________

If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Original Darktrace Investor Found Not Guilty
The Major AI Threats Cyber Security Teams Must Deal With »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

BruCON

BruCON

Brucon is Belgiums premium security and hacking conference.

HackerOne

HackerOne

HackerOne was started by hackers and security leaders who are driven by a passion to make the internet safer.

Clearwater Security & Compliance

Clearwater Security & Compliance

Clearwater Compliance specialize in Privacy, Security, Compliance and Risk Management Solutions for Health Care, Law Firms and other businesses.

DataSunrise

DataSunrise

DataSunrise Data-Centric high-performance security software protects the sensitive data in real-time in cloud or on premises, and helps organizations to stay compliant.

Cyber Craft

Cyber Craft

CyberCraft is an innovative and dynamic software development, outsourcing and consulting company. Services offered include penetration testing.

Conviso

Conviso

Conviso is a consulting company specialized in Application Security and Security Research.

Orca Security

Orca Security

Orca Security delivers full stack visibility including prioritized alerts to vulnerabilities, compromises, misconfigurations, and more across your entire inventory on all your cloud accounts.

InfoSec Conferences

InfoSec Conferences

InfoSec Conferences is an online directory of infosec conferences. We list every single Information Security conference, event and seminar within every niche in Cybersecurity.

Comparitech

Comparitech

Comparitech strives to promote cyber security and privacy for all. We are committed to providing detailed information to help our readers become more cyber secure and cyber aware.

Across Verticals

Across Verticals

Across Verticals is a boutique cyber security consulting firm that specializes in holistic, deeply technical and end to end cyber security advisory services based on industry best practices.

Riskonnect

Riskonnect

Riskonnect technology empowers organizations with the ability to anticipate, manage, and respond in real-time to strategic, operational, and digital risks across the extended enterprise.

Securance Consulting

Securance Consulting

Since 2002, Securance has empowered enterprises to assume proactive security, compliance, and risk management strategies.

IBM Security

IBM Security

IBM manufactures and markets computer hardware, middleware and software, and offers hosting and consulting services in areas ranging from mainframe computers to nanotechnology.

SEALSQ

SEALSQ

For the last 25 years, SEALSQ have been developing secure semiconductor chips, secure embedded firmware, and tested hardware provisioning services to serve the vision of a safer connected world.

DeviQA

DeviQA

DeviQA provide best-in-class quality assurance services to companies of all sizes.

AKIPS

AKIPS

AKIPS develops the world's most scalable network and infrastructure monitoring software, delivered as a turn-key software appliance.