UC Advanced - issue #9

Q How is Artificial Intelligence affecting the Cyber Security industry? Fiona Whyte: “Attackers are harnessing advancements in technology such as AI and Quantum computing as powerful weapons. Phishing attacks are still the number one delivery method of Malware, and AI is being used to craft more convincing and personalised messages by employing machine learning algorithms to generate content that appears legitimate and tailored to each recipient. “AI is also playing a growing part in identity theft attacks where attackers are investing more in AI to optimise their attack strategies; these types of attacks allow cybercriminals to just “log in” rather than having to hack into a system which is challenging itself as it makes it very difficult for security teams to distinguish between legitimate users and legitimate users.”

that nearly half of UK businesses have been victims of a cyberattack, showing the need for cyber professionals to fight back and utilise AI to enhance their threat detection, response, and mitigation offerings. “On top of developing practical detection and defence packages, many providers are also utilising AI to create comprehensive solutions that include proactive threat detection, pattern recognition, and behavioural analysis, which give organisations the ability to identify cyber-attacks with increased accuracy and speed. They also produce AI-based solutions focused on educating employees and increasing awareness of the potential look and feel of AI-powered cyber-attacks. “This approach, partnered with traditional technical defences, will help organisations to establish a secure and robust security culture to ensure they stay protected from developing attack methods.” Q What effect has Hybrid Working had on Business Security? Tim Freestone: “The shift to a hybrid workforce model has introduced new cybersecurity challenges. Employees using personal devices and home networks, which often lack the robust security measures found in corporate environments, expand the attack surface and complicate IT teams’ ability to maintain visibility and control over data access. “Home routers and public WiFi networks are prime targets for hackers seeking to gain access to corporate networks. The blurred lines between work and personal life in a hybrid setting also increase the risk of sensitive data being accessed or shared inappropriately.” Fiona Whyte: “Undoubtedly, the evolution of remote working has created a new threat landscape. Computers and networks have had to evolve at a rapid pace to facilitate the new Modern Workplace, which could be a user’s home, a public space or a shared office. “One of the biggest advancements is the widespread adoption of Cloud services; this means that the traditional network security of a perimeter-based outer layer of protection around the outside of your network does not necessarily apply now.

David Jani Content Analyst

getapp.co.uk

Phishing attacks are still the number one delivery method of Malware, and AI is being used to craft more convincing and

Stephan Robineau: “AI has the potential to take network

monitoring and management to the next level. By monitoring activity on the network, it is capable of understanding and detecting any abnormalities before the IT team even notices a fault, providing a much better experience for users. “It is early days for the technology, but AI is primed to transform network management: providing a new level of assurance that network operations are working smoothly and data on that network is secure. It also frees up resources to focus on other more strategic tasks.” Andy Syrewicze, Security Evangelist at Hornetsecurity, said: “The rise of Generative AI has permanently changed the cybersecurity threat landscape for businesses in the UK. A race has emerged between malicious actors and cybersecurity specialists who are both using the power of AI for opposing reasons. “Cybercriminals, armed with sophisticated AI tools, can now target organisations at an unprecedented pace by automating attacks and adopting new strategies to bypass traditional defences. The progression of malicious versions of widely used large language models (LLMs) such as DarkBERT and WormGPT has led to a rise in phishing attacks over the past year. “Research from Hornetsecurity has found

personalised messages...

Stephan Robineau Executive Vice President, Network Business Division

al-enterprise.com

“Remote workers and Cloud-based applications mean that your network

CONTINUED

ucadvanced.com

Powered by