cerrar
cerrar
Su red del mañana
Su red del mañana
Planifique su camino hacia una red más rápida, más segura y más resistente diseñada para las aplicaciones y los usuarios a los que da soporte.
          Descubra Netskope
          Get Hands-on With the Netskope Platform
          Here's your chance to experience the Netskope One single-cloud platform first-hand. Sign up for self-paced, hands-on labs, join us for monthly live product demos, take a free test drive of Netskope Private Access, or join us for a live, instructor-led workshops.
            Líder en SSE. Ahora es líder en SASE de un solo proveedor.
            Líder en SSE. Ahora es líder en SASE de un solo proveedor.
            Netskope debuta como Líder en el Cuadrante Mágico™ de Gartner® para Single-Vendor SASE
              Protección de la IA generativa para principiantes
              Protección de la IA generativa para principiantes
              Learn how your organization can balance the innovative potential of generative AI with robust data security practices.
                Modern data loss prevention (DLP) for Dummies eBook
                Prevención moderna de pérdida de datos (DLP) para Dummies
                Get tips and tricks for transitioning to a cloud-delivered DLP.
                  Libro SD-WAN moderno para principiantes de SASE
                  Modern SD-WAN for SASE Dummies
                  Deje de ponerse al día con su arquitectura de red
                    Entendiendo dónde está el riesgo
                    Advanced Analytics transforms the way security operations teams apply data-driven insights to implement better policies. With Advanced Analytics, you can identify trends, zero in on areas of concern and use the data to take action.
                        Los 6 casos de uso más convincentes para el reemplazo completo de VPN heredada
                        Los 6 casos de uso más convincentes para el reemplazo completo de VPN heredada
                        Netskope One Private Access is the only solution that allows you to retire your VPN for good.
                          Colgate-Palmolive Salvaguarda su "Propiedad Intelectual" con Protección de Datos Inteligente y Adaptable
                          Colgate-Palmolive Salvaguarda su "Propiedad Intelectual" con Protección de Datos Inteligente y Adaptable
                            Netskope GovCloud
                            Netskope logra la alta autorización FedRAMP
                            Elija Netskope GovCloud para acelerar la transformación de su agencia.
                              Let's Do Great Things Together
                              La estrategia de venta centrada en el partner de Netskope permite a nuestros canales maximizar su expansión y rentabilidad y, al mismo tiempo, transformar la seguridad de su empresa.
                                Soluciones Netskope
                                Netskope Cloud Exchange
                                Netskope Cloud Exchange (CE) provides customers with powerful integration tools to leverage investments across their security posture.
                                  Soporte técnico Netskope
                                  Soporte técnico Netskope
                                  Nuestros ingenieros de soporte cualificados ubicados en todo el mundo y con distintos ámbitos de conocimiento sobre seguridad en la nube, redes, virtualización, entrega de contenidos y desarrollo de software, garantizan una asistencia técnica de calidad en todo momento
                                    Vídeo de Netskope
                                    Netskope Training
                                    La formación de Netskope le ayudará a convertirse en un experto en seguridad en la nube. Estamos aquí para ayudarle a proteger su proceso de transformación digital y aprovechar al máximo sus aplicaciones cloud, web y privadas.

                                      The Impact of AI on Cybersecurity: Balancing the Risks and Opportunities

                                      Jan 17 2023

                                      As artificial intelligence (AI) advances, I am seeing a lot of discussion on LinkedIn and in the online media about the advantages it may bring for either the threat actors (“batten down the hatches, we are all doomed”) or the security defence teams (“it’s OK, relax, AI has you covered”). It has occurred to me that while AI could be a powerful tool for cyber criminals, allowing them to automate attacks and evade detection more effectively, it could also be a powerful tool for security professionals, allowing them to detect and respond to threats more quickly and efficiently.

                                      The polarising predictions have also got me wondering … might the impact of AI advances in cybersecurity end up balancing out? Could every advance made by the bad guys be met with equal progress from the good guys? All supported by the same tools? Of course this balancing act only works as long as everyone keeps up with the competition; as cyber criminals become more adept at using AI, security professionals will also have to ensure they are making use of more advanced tools and techniques to defend against these attacks. 

                                      So in a boxing match style, let’s take a look at who is in the red corner and who is in the blue.  Exactly how might cybercriminals and security professionals make use of AI? And who will win?

                                      In the red corner: The Cyber Criminals

                                      1. Using AI for the identification of targets; scanning the internet for vulnerable systems 
                                      2. Programming AI-bots to mimic human behaviour in order to more effectively evade detection by security systems
                                      3. Generating highly targeted phishing emails with AI, perhaps trained by multiple data sets acquired on the Dark Web so that they include credible details to help lure the target and build trust (with the public becoming more used to interacting with AI-bots for customer service, impersonating these chatbots could become a useful social engineering tool for malicious actors).
                                      4. Creating evermore sophisticated malware, such as using AI to find exploitable patterns in security systems and creating malware that is specifically designed to evade detection, or designing AI-powered evolution into malware, so that malicious programmes adapt and evolve over time, making them more difficult to detect and remove. 

                                      In the blue corner – The Security Professionals

                                      1. Analysing vast amounts of data from multiple sources to identify and track potential threats. Threat Intelligence systems can also learn from past incidents, allowing them to adapt and improve over time. (Generally I would expect much of this AI intelligence gathering to be done by security vendors, and made available to customers and community members.)
                                      2. Offering just-in-time training to the workforce before an incident occurs by identifying risky behavioural patterns, and guiding employees to make better decisions for data protection and system security
                                      3. Triage; sorting through security incidents and prioritising them based on their level of risk. Using AI recommendations to focus efforts on the most critical issues.
                                      4. Detecting patterns that indicate a potential security incident, then automatically triggering a response and alert to security teams (recently proven in its efficacy by NATO).
                                      5. Automating incident investigation; helping identify the root cause of an incident and notifying relevant parties. 

                                      So who will be the winner in this title bout? I am not sure that bookies have a favourite just yet. AI has the potential to revolutionise cybersecurity, but it won’t remove the requirement for a clear architecture and strategy.  We don’t get to outsource our jobs to the machines and go and make a cuppa just yet. Over the coming months and years, it will be important to understand that AI is not a cure-all, or a standalone solution, but rather a complementary tool to be used in combination with other security measures. Just like a human security team, AI requires continuous monitoring, evaluation, and tuning to ensure that it is performing as expected and to address any bias or inaccuracies in the data. And of course there are plenty of ethical considerations to be handled too. If you have enjoyed this post, I recommend hopping into the archive and reading this one too, from our EMEA CISO Neil Thacker, in which he discusses the EU’s upcoming AI Act, and gives some useful tips for organisations looking to prepare for the inevitable legislation around AI this year.

                                      author image
                                      Steve Foster
                                      Steve Foster has spent his career working to bridge the gap between business need and technical solution. Steve comes from networking, with 20 years of experience.
                                      Steve Foster has spent his career working to bridge the gap between business need and technical solution. Steve comes from networking, with 20 years of experience.

                                      ¡Mantente informado!

                                      Suscríbase para recibir lo último del blog de Netskope