We collect cookies to analyze our website traffic and performance; we never collect any personal data. Cookie Policy
Accept
NEW YORK DAWN™NEW YORK DAWN™NEW YORK DAWN™
Notification Show More
Font ResizerAa
  • Home
  • Trending
  • New York
  • World
  • Politics
  • Business
    • Business
    • Economy
    • Real Estate
  • Crypto & NFTs
  • Tech
  • Lifestyle
    • Lifestyle
    • Food
    • Travel
    • Fashion
    • Art
  • Health
  • Sports
  • Entertainment
Reading: AI vs. AI: 6 methods enterprises are automating cybersecurity to counter AI-powered assaults
Share
Font ResizerAa
NEW YORK DAWN™NEW YORK DAWN™
Search
  • Home
  • Trending
  • New York
  • World
  • Politics
  • Business
    • Business
    • Economy
    • Real Estate
  • Crypto & NFTs
  • Tech
  • Lifestyle
    • Lifestyle
    • Food
    • Travel
    • Fashion
    • Art
  • Health
  • Sports
  • Entertainment
Follow US
NEW YORK DAWN™ > Blog > Technology > AI vs. AI: 6 methods enterprises are automating cybersecurity to counter AI-powered assaults
AI vs. AI: 6 methods enterprises are automating cybersecurity to counter AI-powered assaults
Technology

AI vs. AI: 6 methods enterprises are automating cybersecurity to counter AI-powered assaults

Last updated: March 11, 2025 11:50 pm
Editorial Board Published March 11, 2025
Share
SHARE

Why is AI changing into important for cybersecurity? As a result of each day, in reality each second, malicious actors are utilizing synthetic intelligence to widen the scope and velocity of their assault strategies.

For one factor, as Adam Meyers, senior vp at CrowdStrike, informed VentureBeat in a current interview, “The adversary is getting 10 to 14 minutes faster every year. As their breakout times shrink, defenders have to react even faster — detecting, investigating and stopping threats before they spread. This is the game of speed.”

In the meantime, Gartner wrote in its current examine, Rising Tech Impression Radar: Preemptive Cybersecurity, that “[m]alicious actors are exploiting generative AI to launch attacks at machine speed. Organizations can no longer afford to wait for a breach to be detected before taking action. It has become crucial to anticipate potential attacks and prioritize preemptive mitigation measures with predictive analysis.”

One of the crucial noteworthy findings from Darktrace’s analysis is the rising risk of weaponized AI and malware-as-a-service (MaaS). In line with Darktrace’s current analysis, MaaS now constitutes 57% of all cyberattacks, signaling a big acceleration towards automated cybercrime.

AI is assembly cybersecurity’s want for velocity

Breakout occasions are plummeting. That’s a positive signal that attackers are transferring quicker and fine-tuning new strategies that perimeter-based legacy techniques and platforms can’t catch. Microsoft’s Vasu Jakkal quantified this acceleration vividly in a current VentureBeat interview: “Three years ago, we were seeing 567 password-related attacks per second. Today, that number has skyrocketed to 7,000 per second.”

Few perceive this problem higher than Katherine Mowen, SVP of knowledge safety at Charge Firms (previously Assured Charge), one of many largest retail mortgage lenders within the U.S. With billions of {dollars} in transactions flowing by way of its techniques day by day, Charge Firms is a main goal for AI-driven cyberattacks, from credential theft to stylish identity-based fraud.

As Mowen defined in a current VentureBeat interview, “Because of the nature of our business, we face some of the most advanced and persistent cyber threats out there. We saw others in the mortgage industry getting breached, so we needed to ensure it didn’t happen to us. I think what we’re doing right now is fighting AI with AI.”

Charge Firms’ technique to achieve larger cyber resilience is anchored in AI risk modeling, zero-trust safety, and automatic response, which presents priceless classes for safety leaders throughout industries.

“Cyber attackers now leverage AI-driven malware that can morph in seconds. If your defenses aren’t just as adaptive, you’re already behind,” CrowdStrike CEO George Kurtz informed VentureBeat. The Charge Firms’ Mowen, for instance, is battling adversarial AI with a collection of working defensive AI methods.

Combating AI with AI: what’s working

VentureBeat sat down with a bunch of CISOs, who requested anonymity, to raised perceive their playbooks for combating AI with AI. Listed below are six classes discovered from that session:

Bettering risk detection with self-learning AI is paying off. Adversarial AI is on the middle of an more and more massive variety of breaches immediately. One fast takeaway from all this exercise is that signature-based detection is struggling, at greatest, to maintain up with attackers’ newest tradecraft.

Cyberattackers aren’t stopping at exploiting identities and their many vulnerabilities. They’re progressing to utilizing living-off-the-land (LOTL) strategies and weaponizing AI to bypass static defenses. Safety groups are pressured to shift from reactive to proactive protection.

DarkTrace’s report explains why. The corporate detected suspicious exercise on Palo Alto firewall units 17 days earlier than a zero-day exploit was disclosed. That’s simply considered one of many examples of the rising variety of AI-assisted assaults on important infrastructure, which the report offers knowledge on. Nathaniel Jones, VP of risk analysis at Darktrace, noticed that “detecting threats after an intrusion is no longer enough. Self-learning AI pinpoints subtle signals humans overlook, enabling proactive defense.”

“Leveraging AI is the best defense against AI-powered attacks,” stated Deepen Desai, chief safety officer at Zscaler. The Charge Firms’ Mowen emphasised the necessity for proactive identification safety: “With attackers constantly refining their tactics, we needed a solution that could adapt in real time and give us deeper visibility into potential threats.”

AI-driven incident response: Are you quick sufficient to include the risk? Each second counts in any intrusion or breach. With breakout occasions plummeting, there’s no time to waste. Perimeter-based techniques typically have outdated code that hasn’t been patched in years. That every one fuels false alarms. In the meantime, attackers who’re perfecting weaponized AI are getting past firewalls and into important techniques in a matter of seconds.

Mowen means that CISOs observe the Charge Firms’ 1-10-60 SOC mannequin, which appears to detect an intrusion in a single minute, triage it in 10, and include it inside 60. She advises making this the benchmark for safety operations. As Mowen warns, “Your attack surface isn’t just infrastructure — it’s also time. How long do you have to respond?” Organizations that fail to speed up containment threat extended breaches and better damages. She recommends that CISOs measure AI’s influence on incident response by monitoring imply time to detect (MTTD), imply time to reply (MTTR), and false-positive discount. The quicker threats are contained, the much less injury they’ll inflict. AI isn’t simply an enhancement — it’s changing into a necessity.

Discover new methods repeatedly to harden assault surfaces with AI. Each group is grappling with the challenges of a always shifting collection of assault surfaces that may vary from a fleet of cell units to large-scale cloud migrations or a myriad of IoT sensors and endpoints. AI-driven publicity administration proactively identifies and mitigates vulnerabilities in actual time.

At Charge Firms, Mowen stresses the need of scalability and visibility. “We manage a workforce that can grow or shrink quickly,” Mowen stated. The necessity to flex and adapt its enterprise operations shortly is considered one of a number of elements that drove Charge’s technique to make use of AI for real-time visibility and automatic detection of misconfigurations throughout its various cloud environments.

Detect and cut back the variety of insider threats utilizing behavioral analytics and AI. Insider threats, exacerbated by the rise of shadow AI, have turn into a urgent problem. AI-driven person and entity conduct analytics (UEBA) addresses this by repeatedly monitoring person conduct towards established baselines and quickly detecting deviations. Charge Firms confronted important identity-based threats, prompting Mowen’s workforce to combine real-time monitoring and anomaly detection. She famous:

“Even the best endpoint protections don’t matter if an attacker simply steals user credentials. Today, we operate with a ‘never trust, always verify’ approach, continuously monitoring every transaction.”

Vineet Arora, CTO at WinWire, noticed that conventional IT administration instruments and processes typically lack complete visibility and management over AI purposes, permitting shadow AI to thrive. He emphasised the significance of balancing innovation with safety, stating, “Providing safe AI options ensures people aren’t tempted to sneak around. You can’t kill AI adoption, but you can channel it securely.” Implementing UEBA with AI-driven anomaly detection strengthens safety, lowering each threat and false positives.

Human-in-the-loop AI: important for long-term cybersecurity success. One of many major objectives of implementing AI throughout any cybersecurity app, platform or product is for it to repeatedly study and increase the experience of people, not substitute it. There must be a reciprocal relationship of information for AI and human groups to each excel.

“Many times, the AI doesn’t replace the humans. It augments the humans,” says Elia Zaitsev, CTO at CrowdStrike. “We can only build the AI that we’re building so quickly and so efficiently and so effectively because we’ve had literally a decade-plus of humans creating human output that we can now feed into the AI systems.” This human-AI collaboration is especially important in safety operations facilities (SOCs), the place AI should function with bounded autonomy, helping analysts with out taking full management.

AI vs. AI: The way forward for cybersecurity is now

AI-powered threats are automating breaches, morphing malware in actual time and producing phishing campaigns almost indistinguishable from official communications. Enterprises should transfer simply as quick, embedding AI-driven detection, response and resilience into each layer of safety.

Breakout occasions are shrinking, and legacy defenses can’t sustain. The secret’s not simply AI however AI working alongside human experience. As safety leaders like Charge Firms’ Katherine Mowen and CrowdStrike’s Elia Zaitsev emphasize, AI ought to amplify defenders, not substitute them, enabling quicker, smarter safety choices.

Do you assume AI will outpace human defenders in cybersecurity? Tell us!

Every day insights on enterprise use circumstances with VB Every day

If you wish to impress your boss, VB Every day has you coated. We provide the inside scoop on what corporations are doing with generative AI, from regulatory shifts to sensible deployments, so you may share insights for optimum ROI.

An error occured.

You Might Also Like

AI denial is turning into an enterprise threat: Why dismissing “slop” obscures actual functionality positive factors

GAM takes purpose at “context rot”: A dual-agent reminiscence structure that outperforms long-context LLMs

The 'reality serum' for AI: OpenAI’s new technique for coaching fashions to admit their errors

Anthropic vs. OpenAI pink teaming strategies reveal completely different safety priorities for enterprise AI

Inside NetSuite’s subsequent act: Evan Goldberg on the way forward for AI-powered enterprise methods

TAGGED:AIpoweredattacksautomatingcountercybersecurityenterprisesways
Share This Article
Facebook Twitter Email Print

Follow US

Find US on Social Medias
FacebookLike
TwitterFollow
YoutubeSubscribe
TelegramFollow
Popular News
Closing Ceremony Live Updates: Beijing Says Goodbye to a Second Pandemic-Era Olympics
Sports

Closing Ceremony Live Updates: Beijing Says Goodbye to a Second Pandemic-Era Olympics

Editorial Board February 20, 2022
Commentary: Hunter Biden lays into Democrats, Jake Tapper and George Clooney
Evaluate: Velázquez’s Queen Mariana portrait is a whiz-bang spectacle on view in Pasadena
Chuck E. Cheese desires to develop up. What it is like inside the brand new, adult-focused Chuck’s Arcade
How Samantha Jones Was Written Out of ‘And Just Like That’

You Might Also Like

Nvidia's new AI framework trains an 8B mannequin to handle instruments like a professional
Technology

Nvidia's new AI framework trains an 8B mannequin to handle instruments like a professional

December 4, 2025
Gong examine: Gross sales groups utilizing AI generate 77% extra income per rep
Technology

Gong examine: Gross sales groups utilizing AI generate 77% extra income per rep

December 4, 2025
AWS launches Kiro powers with Stripe, Figma, and Datadog integrations for AI-assisted coding
Technology

AWS launches Kiro powers with Stripe, Figma, and Datadog integrations for AI-assisted coding

December 4, 2025
Workspace Studio goals to unravel the true agent drawback: Getting staff to make use of them
Technology

Workspace Studio goals to unravel the true agent drawback: Getting staff to make use of them

December 4, 2025

Categories

  • Health
  • Sports
  • Politics
  • Entertainment
  • Technology
  • Art
  • World

About US

New York Dawn is a proud and integral publication of the Enspirers News Group, embodying the values of journalistic integrity and excellence.
Company
  • About Us
  • Newsroom Policies & Standards
  • Diversity & Inclusion
  • Careers
  • Media & Community Relations
  • Accessibility Statement
Contact Us
  • Contact Us
  • Contact Customer Care
  • Advertise
  • Licensing & Syndication
  • Request a Correction
  • Contact the Newsroom
  • Send a News Tip
  • Report a Vulnerability
Term of Use
  • Digital Products Terms of Sale
  • Terms of Service
  • Privacy Policy
  • Cookie Settings
  • Submissions & Discussion Policy
  • RSS Terms of Service
  • Ad Choices
© 2024 New York Dawn. All Rights Reserved.
Welcome Back!

Sign in to your account

Lost your password?