top of page

Cybersecurity and AI

The chances of the number of cyberattacks decreasing is …zero, nada, null, nil, etc. Likewise, the chances of the types of attacks are exceptionally small. As the years have passed, especially the last seven, the number of attacks has skyrocketed. One general attack accounting for a significant number of these have been the ransomware and BEC attacks. There are also too many individual attacks on large corporations published daily and weekly. Affected persons for each compromise can be as few as a few hundred or over 300M. Each compromise brings revenue in the form of a ransom or the data being sold on the dark net. The data indicates this is not going to slow down any time soon, and, is a good bet to continue to grow.

The blue team is facing insurmountable odds. The threats are located across the globe, all working to successfully attack the organizations. Granted the teams are doing their best to defend against the 7 days a week, 24 hours a day attacks. There is no doubt. Complicating the issue is the attacker’s creativeness. As they create a new piece of malware, the program is detected and a signature created. Being aware of this, the attacker creates a new piece of malware, and the cycle continues. As each attacker does this through the globe, the mass influx of malware is astounding. The difficulty level in defending against the known and unknown threats is difficult at best.


There continues to be a debate on AI whether this is a benefit or detriment; will it further society or be the end of humanity. Cybersecurity is a useful coupling with AI. The task at hand is daunting. One method used to assist with this increasing risk is machine learning (ML) and artificial intelligence (AI). This has been manifested in cybersecurity tools to analyze mass amounts of data, attempting to detect trends of attacks, and other methods. AI learns from its experiences and patterns in addition. This may, for example look for anomalies or odd activity with someone’s email account, indicating a successful phishing attack. This is processed through automation. Once this is placed into service, and trained, the system is able to accomplish its tasks 24 hours a day, seven days a week.

A nuance to this has been to code these applications to seek a new form of malware based on the prior detected examples. In this proactive approach, the system is looking forward attempting to stem the issue prior to it becoming one.


The conventional applications that are in place have difficulty with simply trying to maintain an awareness of present and new malware. This is due to the mountain of malware created every single month. The new tools are apt for detecting malware and its variants. These have the processing power to analyze the data, as it presently does, but also to review a piece of potential malware to gauge the probability of it being malware (aka fuzzy problems). The organizations are teaching the ML/AI systems to detect the viruses and malware through complicated algorithms. This builds from the present database of malware, compares the subject code to the database, and blocks any traffic based on previously noted prior events from known malware. This also works when the attackers have added code into the program which is moot. Even the minimal odd behavior indicating a ransomware attack would be detected and the activity stopped prior to gaining a substantial foothold into the network.

Internal Threats

ML/AI may also be used internally for the organization. This may be used to monitor user’s activity. This would initially be integrated into the system to build a baseline of activity for the specific user. Further activity after the baseline is created is compared for anomalies, and other indicators of employee malfeasance (aka heuristics). Using the processing power, the apps are able to detect this activity within a few cycles. This potentially is able to block the malicious attack, credential theft, deployment of malware, and access to the network. This would be done automatically, in comparison to other solutions that detect and notify.

Another instance involves internal data theft. There have been multiple stories of the disgruntled employee or employee preparing to leave to work for another competitor, and happens to download multiple files within their last week. ML/AI. In this instance, heuristics would also be employed to monitor for any unusual activity, defined as anomalous or above the standard baseline. The program would look for not only the volume of data being downloaded, but also the folders, and file type/extension. This form of user behavior analytics is very useful and able to remove issues.


This innovative application, while relatively new in comparison to the entirety of the industry, has many organizations involved. The senior management has seen the value in this field, and has invested in the future. A few of these are Versive, LogRhythm, Cybereason, SparkCognition, Cylance, Tessian, White Ops, Truu, Anomali, Crowstrike, Darktrace, Cynet, Sovereign Intelligence, Jask, Fortinet, High-Tech Bridge, Palo Alto Networks, Perimeterx, Securonix, Sentinelone, Shape Security, FireEye, Check Point, Symantec, Vectra, PatternEx, CUJO AI, Cyware, Deep Instinct, Obsidian Security, and Lastline.


While there are an immense number of present uses within cybersecurity at this point and many more in the future, there are drawbacks. While AI creates cost savings (e.g. significantly less expense for any potential breach, and labor savings as these systems work efficiently and an exceptionally timely manner, the ML/AI uses cases are not without their own respective issues. These systems, while useful, are still capital intensive in the beginning of their implementation and operation. These require large amounts of memory, data, and computational power. The ML/AI systems learn from data. The greater the amount of data, the better the decision-making capabilities of the system. To arrive at the level required for proficiency and efficiency, the system requires malware, non-malware, and anomalies to learn from. These require the storage and processing power to learn from.


Balbix. (n.d.). Using artificial intelligence in cybersecurity. Retrieved from

Bocetta, S. (2019, June 12). Is AI fundamental to the future of cybersecurity? Retrieved from

Chickowski, E. (2019, December 30). How AI and cybersecurity will intersect in 2020. Retrieved from

Columbus, L. (2019, July 14). Why AI is the future of cybersecurity. Retrieved from

Crane, C. (2019, July 17). Artificial intelligence in cyber security: The savior or enemy of your business? Retrieved from

Delgado, R. (n.d.). What to expect from AI and cyber security roles in the future. Retrieved from

Hypponen, M. (2020, February 11). AI can be an ally in cybersecurity. Retrieved from

IBM Security. (n.d.). Artificial intelligence for a smarter kind of cybersecurity. Retrieved from

inVerita. (2019, October 16). Why you should use artificial intelligence in cybersecurity. Retrieved from

Kharkovyna, O. (2020, February 4). CyberSecurity + AI: Defined, explained and explored. Retrieved from

Laurence, A. (2019, August 22). The impact of artificial intelligence on cyber security. Retrieved from

Mullahy, T. (2020, March 20). AI and cybersecurity: 3 things your team needs to know. Retrieved from

NormShield. (n.d.). Cyber security with artificial intelligence in 10 questions. Retrieved from

Palmer, D. (2020, March 2). AI is changing everything about cybersecurity, for better and for worse. Here’s what you need to know. Retrieved from

Schroeder, A. (2019, July 12). 30 companies merging AI and cybersecurity to keep us safe and sound. Retrieved from

Security Magazine. (2020, March 11). Nearly 60% of security professionals trust cybersecurity findings verified by humans over AI. Retrieved from

About the Author - Charles Parker, II has been working in the info sec field for over a decade, performing pen tests, vulnerability assessments, consulting with small- to medium-sized businesses to mitigate and remediate their issues, and preparing IT and info sec policies and procedures. Mr. Parker’s background includes work in the banking, medical, automotive, and staffing industries.

Featured Posts
Check back soon
Once posts are published, you’ll see them here.
Recent Posts
Search By Tags
No tags yet.
Follow Us
  • Facebook Basic Square
  • Twitter Basic Square
  • Google+ Basic Square
bottom of page