Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the the-events-calendar domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home3/aijournc/public_html/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the rocket domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home3/aijournc/public_html/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the pods domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home3/aijournc/public_html/wp-includes/functions.php on line 6114

Warning: Cannot modify header information - headers already sent by (output started at /home3/aijournc/public_html/wp-includes/functions.php:6114) in /home3/aijournc/public_html/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home3/aijournc/public_html/wp-includes/functions.php:6114) in /home3/aijournc/public_html/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home3/aijournc/public_html/wp-includes/functions.php:6114) in /home3/aijournc/public_html/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home3/aijournc/public_html/wp-includes/functions.php:6114) in /home3/aijournc/public_html/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home3/aijournc/public_html/wp-includes/functions.php:6114) in /home3/aijournc/public_html/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home3/aijournc/public_html/wp-includes/functions.php:6114) in /home3/aijournc/public_html/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home3/aijournc/public_html/wp-includes/functions.php:6114) in /home3/aijournc/public_html/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home3/aijournc/public_html/wp-includes/functions.php:6114) in /home3/aijournc/public_html/wp-includes/rest-api/class-wp-rest-server.php on line 1893
{"id":252406,"date":"2024-05-22T15:29:51","date_gmt":"2024-05-22T15:29:51","guid":{"rendered":"https:\/\/aijourn.com\/?p=252406"},"modified":"2024-05-22T15:56:33","modified_gmt":"2024-05-22T15:56:33","slug":"ai-cybersecurity-how-prepared-should-we-be","status":"publish","type":"post","link":"https:\/\/aijourn.com\/ai-cybersecurity-how-prepared-should-we-be\/","title":{"rendered":"AI & Cybersecurity \u2013 how prepared should we be?"},"content":{"rendered":"\n

Policymakers, business executives and cybersecurity professionals are all feeling the pressure to adopt AI within their operations. With this, comes the threat of generative AI adoption outpacing the industry\u2019s ability to understand the security risks that these new capabilities will introduce.<\/p>\n\n\n\n

For IBM X-Force, IBM Consulting\u2019s security services arm, the expectation is that a universal AI attack surface will materialize once AI adoption reaches a critical mass. This will force organisations to prioritise security defenses that can adapt to these threats at scale.<\/p>\n\n\n\n

For the attackers, their best tool for compromising these networks may well be generative AI too, which is already emerging as a supplementary tool in the cyberattacker arsenal.<\/p>\n\n\n\n

Despite these looming generative AI-enabled threats, however, X-Force hasn\u2019t observed any concrete evidence of such cyberattacks being used directly to date or a rapid shift in attackers\u2019 goals and objectives from previous years.<\/p>\n\n\n\n

The risk remains, however, of other methods of cyberattack being enhanced by AI. In 2023, the IBM X-Force team discovered that many cybercriminals could wreak havoc on corporate networks by simply logging in through valid accounts\u2014and as bad actors begin investing in AI to help them identify priority targets, this problem is only expected to worsen.<\/p>\n\n\n\n

A Growing Identity Crisis<\/strong><\/h2>\n\n\n\n

According to IBM\u2019s 2024 X-Force Threat Intelligence Index report<\/a>, cyberattacks caused by exploited user identities rose by 71% in the past year globally and represented 50% of all security incidents in the UK.<\/p>\n\n\n\n

Cybercriminals are increasingly seeking the path of least resistance to get through organisations\u2019 security measures. Chief among these inroads is the practice of exploiting valid accounts, which enables attackers to bypass initial security checks by simply logging in to an organisation\u2019s network.<\/p>\n\n\n\n

Given the ease and effectiveness of these attacks, criminal operations to gain access to users\u2019 identities have risen sharply over the past year. In addition to accessing compromised credentials from the Dark Web, attackers are innovating and investing in infostealing malware, designed to obtain personally identifiable information like emails, social media and messaging app credentials, and banking details. In 2023, X-Force witnessed a 266% rise in this type of malware.<\/p>\n\n\n\n

What Now?<\/strong><\/h2>\n\n\n\n

With at-scale attacks harnessing generative AI looming on the horizon, it\u2019s never been more critical for organisations to carefully examine their networks and user access structure to ensure they\u2019re operating with sound security fundamentals.<\/p>\n\n\n\n

Just as businesses seek to leverage generative AI to summarise and prioritise data, cybercriminals may turn to it for data distillation: putting AI to work with the troves of compromised data they\u2019ve collected to identify the best targets for an attack. The interest is there\u2014in 2023 alone, X-Force observed more than 800,000 posts about AI and GPT on Dark Web forums.<\/p>\n\n\n\n

While these threats are poised to worsen as cybercriminals continue to innovate ways to expedite their attacks or improve their stealth, it\u2019s not a problem without a solution. There are actions organisations can take to better safeguard their networks from identity-based attacks.<\/p>\n\n\n\n

    \n
  1. Test & Stress Test:<\/strong> Organisations should frequently stress test environments for potential exposures and develop incident response plans for when\u2014not if\u2014a security breach occurs. The stress tests that X-Force conducted in 2023 for clients revealed that identification and authentication failures (e.g. weak password policies) were the second-most observed security risk.<\/li>\n<\/ol>\n\n\n\n
      \n
    • Leverage Intuitive Tools: <\/strong>When it comes to securing users\u2019 access to networks, not only is it important to ensure a users are who they say they are, but they need to act like it too. It\u2019s paramount in today\u2019s environment to leverage behavioral analytics and biometrics as a form of verification. Habits, typing speed, and keystrokes are just a few examples of behavioural analytics that can verify a unique user is legitimate. AI-enabled tools can help detect and block anomalous behaviors before they achieve impact.<\/li>\n<\/ul>\n\n\n\n
        \n
      • Enforce Multi-Factor Authentication (MFA) for Users:<\/strong> Organisations can strengthen their credential management practices to protect system or domain credentials by implementing MFA and strong password policies to include the use of passkeys and leverage hardened system configurations that make accessing credentials more difficult.<\/li>\n<\/ul>\n\n\n\n

        What Next?<\/strong><\/h2>\n\n\n\n

        For those in the process of exploring AI and defining their AI strategies, it\u2019s important to consider that securing AI is broader than AI itself. Organisations can leverage existing guardrails to help secure the AI pipeline. The key tenets to focus on are securing the AI underlying training data, the models, and the use and inferencing of the models, but also the broader infrastructure surrounding the models. <\/p>\n\n\n\n

        The same access points that cybercriminals leverage to compromise enterprises pose the same risk to AI. And as organisations offload operational business processes to AI, they also need to establish governance and make operational guardrails central to their AI strategy.<\/p>\n","protected":false},"excerpt":{"rendered":"

        Policymakers, business executives and cybersecurity professionals are all feeling the pressure to adopt AI within their operations. With this, comes the threat of generative AI adoption outpacing the industry\u2019s ability …<\/p>\n","protected":false},"author":7150,"featured_media":252414,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_eb_attr":"","_glsr_average":0,"_glsr_ranking":0,"_glsr_reviews":0,"footnotes":""},"categories":[203],"tags":[],"class_list":["post-252406","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security"],"_links":{"self":[{"href":"https:\/\/aijourn.com\/wp-json\/wp\/v2\/posts\/252406","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/aijourn.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/aijourn.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/aijourn.com\/wp-json\/wp\/v2\/users\/7150"}],"replies":[{"embeddable":true,"href":"https:\/\/aijourn.com\/wp-json\/wp\/v2\/comments?post=252406"}],"version-history":[{"count":2,"href":"https:\/\/aijourn.com\/wp-json\/wp\/v2\/posts\/252406\/revisions"}],"predecessor-version":[{"id":252436,"href":"https:\/\/aijourn.com\/wp-json\/wp\/v2\/posts\/252406\/revisions\/252436"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/aijourn.com\/wp-json\/wp\/v2\/media\/252414"}],"wp:attachment":[{"href":"https:\/\/aijourn.com\/wp-json\/wp\/v2\/media?parent=252406"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/aijourn.com\/wp-json\/wp\/v2\/categories?post=252406"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/aijourn.com\/wp-json\/wp\/v2\/tags?post=252406"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}