Faster, cheaper and more scalable
The advancements in artificial intelligence are reshaping the landscape of cybersecurity, with AI now the single biggest force in the network. AI can discover vulnerabilities faster, it can execute highly scalable automated attacks, and it can help malware adapt and change to avoid detection or gain new capability. In cybersecurity defense, AI is used for real-time threat detection, and it facilitates automated response and triage capabilities, too. But part of the trouble comes from within, where companies are increasingly deploying AI tools without properly securing them, creating entirely new risks for businesses to consider.
The internet is run by machines
Human users versus hackers is no longer a model that applies when it comes to internet security. AI and bot traffic is growing far faster than human user traffic, and automation has given way to AI-driven fraud, account takeovers, credential stuffing and scraping and more. Large-scale attacks are far easier and cheaper to deploy, allowing a literal explosion of bots and automated traffic – machines running machines – across the internet.
You are the product
Free games aren’t really free. Even what seems to be a harmless activity can become a conduit of valuable data, conducting surveillance and recording information. Individual bits of data may not have great meaning, but in aggregate it might. The telemetry gained from devices and applications provides location information, networking and proximity data and more. The exchange of convenience or enjoyment for security and privacy is a well-known tradeoff that bad actors exploit continuously.
Identity is the new attack surface
It used to be that cybersecurity focused on the devices – the endpoints which represented the way into the network. Endpoint security is essential, yet it is the user identity which is the vulnerable element. It has been said that bad actors aren’t hacking systems any longer, they’re just logging in. This means that stolen credentials drive the majority of system breaches. Breaking into and highjacking active sessions, bypassing MFA challenges, and performing other identity-based attacks is now forcing a shift toward continuous authentication and a completely Zero Trust (never trust, always verify) security model.
Cybersecurity has never been easy, but it is harder than ever now that AI is involved. There’s a market out there for enabling the bad guys, like cybercrime as a business model. It’s organized and scalable and terrifying. More than ever before, cyber risk is tied directly to business risk, making security something far more than just IT.
Make Sense?
J


Make Sense?
Today’s workforce is a mobile workforce. Technology has enabled businesses to allow their employees to reach beyond the office walls, doing business and operating effectively from just about any location. SaaS, online access to business data, and smart phone technologies have brought flexibility in working models previously only imagined by the workforce tethered to business locations and office computers. Yet this flexibility comes at a price if the business is to keep up with securing and protecting data assets as readily as it extends access to them. The bad guys are well aware that mobile computing and remote access working models are growing in adoption with businesses, and are finding ways to take ever-greater advantage of the situation.
Make Sense?
One company earns what the other company spends. This is business, and it seems like it would be pretty straightforward, accounting for the money coming in and the money going out. But it is really not that simple when it comes to business finances and accounting for revenue. With investor pressure to improve share prices and market pressures forcing greater competition, businesses have always sought out ways to make the performance look as good as possible – on paper even if not in reality. It is this requirement to make the business look better than it may actually be that drives “innovation” in financial reporting, and encourages some companies to use whatever rules are available to mislead investors or paint a rosy picture for stakeholders. When the balance is lost and financial reporting standards become so oblique as to allow regular and gross misrepresentation, it is time to change the standards.
Make Sense?