supernav-iconEnhance Security & Compliance Posture Using A Risk Management Framework

Contact Sales

  • Sign In
  • Get Started
HomeBlogMachine Learning and New AI Technologies

How Machine Learning and New AI Technologies Could Change the Cybersecurity Landscape

Drata's analysis found new technology for data handling has security risks on the one hand and potential security benefits on the other.

by Aine Givens

June 02, 2023
AI and New Technologies Hero
Contents
Artificial IntelligenceMachine LearningChatbot TechnologyVirtual Reality

The world has never been more online. From work meetings, emails, and texts to shopping, paying bills, and banking—the possibilities are endless. Technological advances save people time and give companies new tools for growth.

But that connectedness comes with a cost. The internet has also never been more rife with criminals looking for vulnerabilities to exploit, hoping to hold companies hostage with ransomware, executing crafty phishing and social engineering attacks, hacking into proprietary information, or capturing private data such as Social Security numbers and addresses.

Does artificial intelligence or machine learning make it easier or harder for companies to guard against such attacks? Can other improvements provide additional defenses against cyberattacks?

The pros and cons of some of the advances have recently burst into the news. Geoffrey Hinton, the "Godfather of AI," recently left Google to warn of the dangers of the very technology he helped develop. He worries that generative artificial intelligence—which can produce text, images, video, and audio—will be used for misinformation and someday even eclipse humans' creativity. Others say those fears are hypothetical.

Drata compiled a list of four technological innovations changing how firms monitor and protect sensitive data essential to their digital operations.

Artificial Intelligence

AI

Artificial intelligence not only allows a computer to analyze large amounts of data quickly—a game changer as it speeds up response times for a company's security operations—but it becomes more knowledgeable as it gathers more information.

These systems, which include machine learning, natural language processing, and speech recognition, can sort through millions of research papers, news stories, and other data. Industries such as health care, finance, transportation, entertainment, and real estate are all benefitting from the patterns these systems identify.

When their efforts are focused on cybersecurity, they can identify vulnerabilities and risks from hacking, phishing, and other attacks. But they can also spot potential new cyberdefense opportunities. And these systems can be taught to correct their own actions.

Machine Learning

Machine learning

Machine learning, a subset of AI that has often been used interchangeably with it, actually refers to how a computer can improve its performance by interacting with data. The computer learns in the sense that it can change an algorithm as it receives more data. Machine learning can help more accurately detect possible attacks and prioritize which are the most likely and potentially dangerous.

However, as Georgetown University's "Machine Learning and Cybersecurity" report notes, often these technologies are based on older long-standing methods, not new approaches, and draw attacks themselves. The report predicts machine learning is more likely to offer incremental improvements rather than fundamental new approaches—unless there are new breakthroughs in machine learning capabilities.

Chatbot Technology

Chatbot

Chatbot technology is making tremendous advances. ChatGPT is an AI chatbot developed by OpenAI, co-founded by tech billionaire Elon Musk. ChatGPT can answer follow-up questions, admit mistakes, challenge incorrect premises, and reject inappropriate requests, according to OpenAI. Its name comes from the Generative Pre-trained Transformer language model.

More recently, Slack, a messaging app for business, announced plans to offer a chatbot technology called Slack GPT. It will summarize messages missed while you were out of the office, help with writing, take notes on calls, and more.

ChatGPT's ability to write text and create code makes it valuable for nefarious uses. The system can write convincing phishing emails and ransomware code, jumpstart the effort required to build infrastructure and create applications to attack targets, impersonate people, or generate emails that might trick someone at a business into sharing confidential data. At the same time, it may be able to identify security threats.

Virtual Reality

VR

Virtual reality is a three-dimensional image created by a computer. Because it allows you to immerse yourself, it is particularly effective in cybersecurity and for various training exercises—in medicine and the military, for example. A realistic scenario can be created to simulate a cyberattack.

But virtual reality also poses risks. It may be collecting such data as retina scans, fingerprints, facial dimensions, and voice characteristics that could ease impersonation in the metaverse.

Trusted Newsletter
Resources for you
Health Information Breach

4 of the Most Common Ways Private Health Information Was Breached in 2022

History of Cybersecurity (2)

A Short History of Cybersecurity and the Data Breaches That Forced the World to Pay Attention to Data Privacy

4 States Cybersecurity Laws

4 States Passed Nearly Half of All New Cybersecurity Laws Enacted Across the US in 2022

Common Employee Errors (1)

5 Human Errors in Cybersecurity That Put Your Organization at Risk

Aine Givens
Technical Writer & Reporter

2023 Compliance Trends Report

Drata surveyed 300 established and enterprise organizations to tap the pulse of the state of risk and compliance. In doing so, we identified related trends, perceptions, and how compliance impacts the business. This year, the primary takeaway is that a mature compliance program will accelerate a business, not slow it down.

Access Report
Image - 2023 Compliance Trends Report
Related Resources
Health Information Breach

4 of the Most Common Ways Private Health Information Was Breached in 2022

History of Cybersecurity (2)

A Short History of Cybersecurity and the Data Breaches That Forced the World to Pay Attention to Data Privacy

4 States Cybersecurity Laws

4 States Passed Nearly Half of All New Cybersecurity Laws Enacted Across the US in 2022

Common Employee Errors (1)

5 Human Errors in Cybersecurity That Put Your Organization at Risk