How AI Will Solve The Skills Shortage

A mathematical hypothesis called the singularity was suggested by Vinod Khosla’s recent interview in the Wall Street Journal and his prediction of massive job displacement and the growth of new industries due to the widespread adoption of artificial intelligence (AI).

The singularity is a point and phase in the future when bio, nano, energy, robotic, and computer technology will develop at such a rate, become so advanced, and have such a profound impact on humanity, that today’s society has no means to understand or describe what life will be like at that time in the future.

It made me wonder how far and fast we are heading in the same explosion of unfathomable change occurring today in information security. Just as IT revolutionized all forms of business in the last half-century, and the Internet in turn revolutionised IT in the last quarter-century, the trajectory we are on now places AI squarely at the next technology inflection point.

The study of history often provides a strong predictor of human societal change. When history unexpectedly veers off course, it is usually due to a substantial technology advancement and the subsequent seismic changes it brings to business and economic systems.

Our perception and use of AI today, also known as machine intelligence, is still in its infancy. New industries are learning by doing, just as we did when the Internet was in its infancy. 

Looking back, it’s easy to wince and laugh at interviews of experts in the mid-1990s describing the revolutionary nature of email and the world wide web and their dire predictions about the dreaded Y2K. Their projections were both right and wrong, limited in part by what they understood at the time. The impact of what the Internet would ultimately deliver to business and, in turn, society, could not have been foreseen.

The Promise of AI

As a new swath of information security technologies deploy their first generation of AI, seeking to solve many of the security and confidentiality issues that have plagued businesses over the last 40 years, we’re already starting to feel their positive impact.

The information security world is now starved for human capital. There is a global shortage of experienced security workers across the spectrum of skills and specialties. This is holding back advancement and exposing IT systems and Internet businesses to criminality and ransom.

Unlike industries that fear the intrusion of AI, the information security industry, driven largely by a global shortage of qualified employees, is embracing it. As networks become more sophisticated, generate more data, and are exposed to increasingly advanced threats, AI and the automation it empowers are the cure.

This first generation of AI-driven security solutions are focused primarily on automatically sifting through data, hunting for threats, and facilitating a human-led remediation plan. When the first generation of security AI masters threat detection, it will be entrusted with preemptive threat mitigation and auto-remediation of known threats.

Our perception of today’s 24x7 security operations center will eventually be replaced with the second generation of AI-led security technology, leaving human operators to focus on business continuity and critical support issues.

However, just as AI is a boon to the defender, so too is it to the attacker. 

Defense contractors and governments around the world are already using AI to sift through great lakes of network data and intelligence, and hunt for exploitable weaknesses. Just as fast as armies introduced tanks to warfare, tank-on-tank warfare became a necessity. AI-on-AI warfare has just begun.

Dark Reading:              IBM’s Watson Takes Aim At CyberSecurity:    

Artificial Intelligence & Machine Learning Market To Grow Fivefold By 2020:


 

 

« Russia Waging Cyberwar On Ukraine
Vladimir Putin & Donald Trump: Relationship Counselling »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Sequitur Labs

Sequitur Labs

Sequitur Labs is developing seminal technologies and solutions to secure and manage connected devices of today and in the future.

VMRay

VMRay

VMRay delivers advanced threat analysis and detection that combines a unique agentless hypervisor-based network sandbox with a real-time reputation engine.

FinlayJames

FinlayJames

FinlayJames supports cyber security companies to meet the increasing demand and pressure on them by finding top talent within the industry for their sales, marketing and technical teams.

mPrest

mPrest

mPrest is a global provider of mission-critical monitoring and control solutions for the defense, security, utility and Industrial Internet of Things (IoT) sectors.

Identifi Global Recruitment

Identifi Global Recruitment

Identifi Global is one of the UK's leading Cyber Security & IT Recruitment specialists.

Gallarus Industry Solutions

Gallarus Industry Solutions

Gallarus leads innovation within industrial Manufacturing, Production and Management Systems, including Cyber Security solutions specifically developed to protect against the latest cyber criminality.

Sequretek

Sequretek

Sequretek was formed with the aim to “Simplify Security”. We envision a future where enterprise networks are streamlined, secure and simple.

ColorTokens

ColorTokens

ColorTokens Xtended ZeroTrust Platform protects from the inside out with unified visibility, micro-segmentation, zero-trust network access, cloud workload and endpoint protection.

LogicalTrust

LogicalTrust

LogicalTrust security testing specialists find the weakest points in your company and show you how to fix them step-by-step, as well as how to improve your security.

Secret Intelligence Service (SIS - MI6) - UK

Secret Intelligence Service (SIS - MI6) - UK

The UK’s Secret Intelligence Service, also known as MI6, has three core aims: stopping terrorism, disrupting the activity of hostile states, and giving the UK a cyber advantage.

DH2i

DH2i

DH2i is a leading provider of multi-platform Software Defined Perimeter and Smart Availability software enabling customers to create an entire IT infrastructure that is always-secure and always-on.

Dope Security

Dope Security

Dope Security is a fly-direct Secure Web Gateway that eliminates the data center stopover architecture required by legacy providers, instead performing security directly on the endpoint.

Barquin Solutions

Barquin Solutions

Barquin Solutions is a full-service information technology consulting firm focused on supporting U.S. federal government agencies and their partners.

Cyber Castle

Cyber Castle

Linux Demands Sophisticated, Purpose-Built Security. Cyber Castle is the solution. A safe, deployable platform down to the edge device for monitoring Linux security anywhere across the globe.

Black Breach

Black Breach

Black Breach experts protect your organization from cyber threats with military-grade AI-tooled cybersecurity solutions.

Sensfrx

Sensfrx

At Sensfrx, we are dedicated to revolutionizing the landscape of online fraud prevention.