* . *
  • Tech News
    Nikon’s Z5 II is the cheapest full-frame camera yet with internal RAW video

    Nikon’s Z5 II is the cheapest full-frame camera yet with internal RAW video

    The Morning After: Let’s talk Switch 2 pricing

    The Morning After: Let’s talk Switch 2 pricing

    Amazon’s ‘Buy for Me’ AI will purchase stuff from third-party websites

    Amazon’s ‘Buy for Me’ AI will purchase stuff from third-party websites

    Vibe coding at enterprise scale: AI tools now tackle the full development lifecycle

    Vibe coding at enterprise scale: AI tools now tackle the full development lifecycle

  • Reviews
  • Noteworthy
  • Science
  • Opinions
  • Applications
  • Blockchain
    Gain an edge with DTX’s groundbreaking Hybrid Blockchain: Presale now open for LINK and XRP Traders

    Gain an edge with DTX’s groundbreaking Hybrid Blockchain: Presale now open for LINK and XRP Traders

    Unraveling the Mystery: What Exactly is Blockchain Technology?

    Unraveling the Mystery: What Exactly is Blockchain Technology?

    Revolutionary Gasless Blockchain Gaming Partnership Between Atari Founder’s New Firm and Skale Labs

    Discover the Exciting Outcome of a Blockchain Experiment: Decentralized Learning Robots Swarm to Success

    Unleashing a Swarm of Decentralized Learning Robots: The Surprising Results of Blockchain Experiment

    Vishvasya: Revolutionizing Citizen-Centric Apps with National Blockchain Framework for Enhanced Security and Transparency

    Vishvasya: Revolutionizing Citizen-Centric Apps with National Blockchain Framework for Enhanced Security and Transparency

  • Applications
  • Culture
  • Deals
  • Events
  • How-to
  • Roundups
  • Startups
Saturday, May 10, 2025
No Result
View All Result
Tech News, Magazine & Review WordPress Theme 2017
  • Contact Us
  • Legal
    • Privacy Policy
    • Terms of Use
    • DMCA
    • Cookie Privacy Policy
    • California Consumer Privacy Act (CCPA)
  • Tech News
    Nikon’s Z5 II is the cheapest full-frame camera yet with internal RAW video

    Nikon’s Z5 II is the cheapest full-frame camera yet with internal RAW video

    The Morning After: Let’s talk Switch 2 pricing

    The Morning After: Let’s talk Switch 2 pricing

    Amazon’s ‘Buy for Me’ AI will purchase stuff from third-party websites

    Amazon’s ‘Buy for Me’ AI will purchase stuff from third-party websites

    Vibe coding at enterprise scale: AI tools now tackle the full development lifecycle

    Vibe coding at enterprise scale: AI tools now tackle the full development lifecycle

  • Reviews
  • Noteworthy
  • Science
  • Opinions
  • Applications
  • Blockchain
    Gain an edge with DTX’s groundbreaking Hybrid Blockchain: Presale now open for LINK and XRP Traders

    Gain an edge with DTX’s groundbreaking Hybrid Blockchain: Presale now open for LINK and XRP Traders

    Unraveling the Mystery: What Exactly is Blockchain Technology?

    Unraveling the Mystery: What Exactly is Blockchain Technology?

    Revolutionary Gasless Blockchain Gaming Partnership Between Atari Founder’s New Firm and Skale Labs

    Discover the Exciting Outcome of a Blockchain Experiment: Decentralized Learning Robots Swarm to Success

    Unleashing a Swarm of Decentralized Learning Robots: The Surprising Results of Blockchain Experiment

    Vishvasya: Revolutionizing Citizen-Centric Apps with National Blockchain Framework for Enhanced Security and Transparency

    Vishvasya: Revolutionizing Citizen-Centric Apps with National Blockchain Framework for Enhanced Security and Transparency

  • Applications
  • Culture
  • Deals
  • Events
  • How-to
  • Roundups
  • Startups
No Result
View All Result
Tech News
No Result
View All Result

AI vs. AI: 6 ways enterprises are automating cybersecurity to counter AI-powered attacks

March 11, 2025
in Tech News
Home Tech News

Our mission is to provide unbiased product reviews and timely reporting of technological advancements. Covering all latest reviews and advances in the technology industry, our editorial team strives to make every click count. We aim to provide fair and unbiased information about the latest technological advances.
Share on FacebookShare on Twitter

Why is AI becoming essential for cybersecurity? Because every day, in fact every second, malicious actors are using artificial intelligence to widen the scope and speed of their attack methods.

For one thing, as Adam Meyers, senior vice president at CrowdStrike, told VentureBeat in a recent interview, “The adversary is getting 10 to 14 minutes faster every year. As their breakout times shrink, defenders have to react even faster — detecting, investigating and stopping threats before they spread. This is the game of speed.”

Meanwhile, Gartner wrote in its recent study, Emerging Tech Impact Radar: Preemptive Cybersecurity, that “[m]alicious actors are exploiting generative AI to launch attacks at machine speed. Organizations can no longer afford to wait for a breach to be detected before taking action. It has become crucial to anticipate potential attacks and prioritize preemptive mitigation measures with predictive analysis.”

One of the most noteworthy findings from Darktrace’s research is the growing threat of weaponized AI and malware-as-a-service (MaaS). According to Darktrace’s recent research, MaaS now constitutes 57% of all cyberattacks, signaling a significant acceleration toward automated cybercrime.

AI is meeting cybersecurity’s need for speed

Breakout times are plummeting. That’s a sure sign that attackers are moving faster and fine-tuning new techniques that perimeter-based legacy systems and platforms can’t catch. Microsoft’s Vasu Jakkal quantified this acceleration vividly in a recent VentureBeat interview: “Three years ago, we were seeing 567 password-related attacks per second. Today, that number has skyrocketed to 7,000 per second.”

Few understand this challenge better than Katherine Mowen, SVP of information security at Rate Companies (formerly Guaranteed Rate), one of the largest retail mortgage lenders in the U.S. With billions of dollars in transactions flowing through its systems daily, Rate Companies is a prime target for AI-driven cyberattacks, from credential theft to sophisticated identity-based fraud.

As Mowen explained in a recent VentureBeat interview, “Because of the nature of our business, we face some of the most advanced and persistent cyber threats out there. We saw others in the mortgage industry getting breached, so we needed to ensure it didn’t happen to us. I think what we’re doing right now is fighting AI with AI.”

Rate Companies’ strategy to attain greater cyber resilience is anchored in AI threat modeling, zero-trust security, and automated response, which offers valuable lessons for security leaders across industries.

“Cyber attackers now leverage AI-driven malware that can morph in seconds. If your defenses aren’t just as adaptive, you’re already behind,” CrowdStrike CEO George Kurtz told VentureBeat. The Rate Companies’ Mowen, for example, is battling adversarial AI with a series of working defensive AI strategies.

Fighting AI with AI: what’s working

VentureBeat sat down with a group of CISOs, who requested anonymity, to better understand their playbooks for fighting AI with AI. Here are six lessons learned from that session:

Improving threat detection with self-learning AI is paying off. Adversarial AI is at the center of an increasingly large number of breaches today. One quick takeaway from all this activity is that signature-based detection is struggling, at best, to keep up with attackers’ latest tradecraft.

Cyberattackers aren’t stopping at exploiting identities and their many vulnerabilities. They’re progressing to using living-off-the-land (LOTL) techniques and weaponizing AI to bypass static defenses. Security teams are forced to shift from reactive to proactive defense.

DarkTrace’s report explains why. The company detected suspicious activity on Palo Alto firewall devices 17 days before a zero-day exploit was disclosed. That’s just one of many examples of the rising number of AI-assisted attacks on critical infrastructure, which the report provides data on. Nathaniel Jones, VP of threat research at Darktrace, observed that “detecting threats after an intrusion is no longer enough. Self-learning AI pinpoints subtle signals humans overlook, enabling proactive defense.”

“Leveraging AI is the best defense against AI-powered attacks,” said Deepen Desai, chief security officer at Zscaler. The Rate Companies’ Mowen emphasized the need for proactive identity security: “With attackers constantly refining their tactics, we needed a solution that could adapt in real time and give us deeper visibility into potential threats.”

AI-driven incident response: Are you fast enough to contain the threat? Every second counts in any intrusion or breach. With breakout times plummeting, there’s no time to waste. Perimeter-based systems often have outdated code that hasn’t been patched in years. That all fuels false alarms. Meanwhile, attackers who are perfecting weaponized AI are getting beyond firewalls and into critical systems in a matter of seconds.

Mowen suggests that CISOs follow the Rate Companies’ 1-10-60 SOC model, which looks to detect an intrusion in one minute, triage it in 10, and contain it within 60. She advises making this the benchmark for security operations. As Mowen warns, “Your attack surface isn’t just infrastructure — it’s also time. How long do you have to respond?” Organizations that fail to accelerate containment risk prolonged breaches and higher damages. She recommends that CISOs measure AI’s impact on incident response by tracking mean time to detect (MTTD), mean time to respond (MTTR), and false-positive reduction. The faster threats are contained, the less damage they can inflict. AI isn’t just an enhancement — it’s becoming a necessity.

Find new ways continuously to harden attack surfaces with AI. Every organization is grappling with the challenges of a constantly shifting series of attack surfaces that can range from a fleet of mobile devices to large-scale cloud migrations or a myriad of IoT sensors and endpoints. AI-driven exposure management proactively identifies and mitigates vulnerabilities in real time.

At Rate Companies, Mowen stresses the necessity of scalability and visibility. “We manage a workforce that can grow or shrink quickly,” Mowen said. The need to flex and adapt its business operations quickly is one of several factors that drove Rate’s strategy to use AI for real-time visibility and automated detection of misconfigurations across its diverse cloud environments.

Detect and reduce the number of insider threats using behavioral analytics and AI. Insider threats, exacerbated by the rise of shadow AI, have become a pressing challenge. AI-driven user and entity behavior analytics (UEBA) addresses this by continuously monitoring user behavior against established baselines and rapidly detecting deviations. Rate Companies faced significant identity-based threats, prompting Mowen’s team to integrate real-time monitoring and anomaly detection. She noted:

“Even the best endpoint protections don’t matter if an attacker simply steals user credentials. Today, we operate with a ‘never trust, always verify’ approach, continuously monitoring every transaction.”

ADVERTISEMENT

Vineet Arora, CTO at WinWire, observed that traditional IT management tools and processes often lack comprehensive visibility and control over AI applications, allowing shadow AI to thrive. He emphasized the importance of balancing innovation with security, stating, “Providing safe AI options ensures people aren’t tempted to sneak around. You can’t kill AI adoption, but you can channel it securely.” Implementing UEBA with AI-driven anomaly detection strengthens security, reducing both risk and false positives.

Human-in-the-loop AI: essential for long-term cybersecurity success. One of the main goals of implementing AI across any cybersecurity app, platform or product is for it to continually learn and augment the expertise of humans, not replace it. There needs to be a reciprocal relationship of knowledge for AI and human teams to both excel.

“Many times, the AI doesn’t replace the humans. It augments the humans,” says Elia Zaitsev, CTO at CrowdStrike. “We can only build the AI that we’re building so quickly and so efficiently and so effectively because we’ve had literally a decade-plus of humans creating human output that we can now feed into the AI systems.” This human-AI collaboration is particularly critical in security operations centers (SOCs), where AI must operate with bounded autonomy, assisting analysts without taking full control.

AI vs. AI: The future of cybersecurity is now

AI-powered threats are automating breaches, morphing malware in real time and generating phishing campaigns nearly indistinguishable from legitimate communications. Enterprises must move just as fast, embedding AI-driven detection, response and resilience into every layer of security.

Breakout times are shrinking, and legacy defenses can’t keep up. The key is not just AI but AI working alongside human expertise. As security leaders like Rate Companies’ Katherine Mowen and CrowdStrike’s Elia Zaitsev emphasize, AI should amplify defenders, not replace them, enabling faster, smarter security decisions.

Do you think AI will outpace human defenders in cybersecurity? Let us know!

Daily insights on business use cases with VB Daily

If you want to impress your boss, VB Daily has you covered. We give you the inside scoop on what companies are doing with generative AI, from regulatory shifts to practical deployments, so you can share insights for maximum ROI.

An error occured.

Tags: AI in cybersecurityAI ThreatsAIpoweredAttacksautomatingAutomationbotscounterCybersecuritycybersecurity best practicesdigital securityenterprisesinnovative strategiesThreat Detectionways

Denial of responsibility! tech-news.info is an automatic aggregator around the global media. All the content are available free on Internet. We have just arranged it in one platform for educational purpose only. In each content, the hyperlink to the primary source is specified. All trademarks belong to their rightful owners, all materials to their authors. If you are the owner of the content and do not want us to publish your materials on our website, please contact us by email – abuse@tech-news.info. The content will be deleted within 24 hours.
Previous Post

Step into the Spotlight: Metallica’s Immersive Video Experience for Vision Pro Users!

Next Post

Unveiling the Vivo V50 Lite: Exciting Renders, Specs, and Pricing Revealed!

RelatedPosts

Nikon’s Z5 II is the cheapest full-frame camera yet with internal RAW video
Tech News

Nikon’s Z5 II is the cheapest full-frame camera yet with internal RAW video

April 5, 2025
The Morning After: Let’s talk Switch 2 pricing
Tech News

The Morning After: Let’s talk Switch 2 pricing

April 5, 2025
Amazon’s ‘Buy for Me’ AI will purchase stuff from third-party websites
Tech News

Amazon’s ‘Buy for Me’ AI will purchase stuff from third-party websites

April 5, 2025
Vibe coding at enterprise scale: AI tools now tackle the full development lifecycle
Tech News

Vibe coding at enterprise scale: AI tools now tackle the full development lifecycle

April 5, 2025
ADVERTISEMENT
Galaxy Ring wireless charging upgrade could ditch the case – Phandroid

Galaxy Ring wireless charging upgrade could ditch the case – Phandroid

April 5, 2025

Nikon’s Z5 II is the cheapest full-frame camera yet with internal RAW video

April 5, 2025

Mechanistic understanding could enable better fast-charging batteries

April 5, 2025

Apple users are ditching the AirTag for this $30 alternative… but why?

April 5, 2025

Grab the 2nd Gen Google Nest for Less than 100 Bucks! – Phandroid

April 5, 2025

How to use the new, easier Guest Mode on Vision Pro

April 5, 2025

The Morning After: Let’s talk Switch 2 pricing

April 5, 2025

Charging electric vehicles 5x faster in subfreezing temps

April 5, 2025

Deals: Moto Edge 60 Fusion and Pixel 9a arrive, iPhone 16  and 15 series are £100 off

April 5, 2025

iPhones Could Cost Up to $2,300 in the U.S. Due to Tariffs, Analyst Says

April 5, 2025

Categories

Select Category

    Archives

    Select Month
      May 2025
      MTWTFSS
       1234
      567891011
      12131415161718
      19202122232425
      262728293031 
      « Apr    
      • California Consumer Privacy Act (CCPA)
      • Contact Us
      • Cookie Privacy Policy
      • DMCA
      • Privacy Policy
      • Tech News
      • Terms of Use

      © 2015-2024 Tech-News.info
      DMCA.com Protection Status

      No Result
      View All Result
      • California Consumer Privacy Act (CCPA)
      • Contact Us
      • Cookie Privacy Policy
      • DMCA
      • Privacy Policy
      • Tech News
      • Terms of Use

      © 2015-2024 Tech-News.info
      DMCA.com Protection Status

      This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.
      Go to mobile version