Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Enterprise ServicesSecurity Leadership and ManagementSecurity Education & Training

Education & Training

Balancing data privacy and security in the age of AI-powered defenses

As much as AI can do to supplement cybersecurity measures, one of the most effective ways to stay ahead of evolving hacking trends is collaboration.

By Kelly McCracken
generative AI

gorodenkoff / iStock / Getty Images Plus via Getty Images

January 11, 2024

Cyber threats are always evolving. Not only has artificial intelligence (AI) lowered the bar required to launch an attack, but adversaries are also using the technology to enhance the speed and sophistication of their tactics — through methods like code generation, password cracking, social engineering, phishing attempts and more. For example, hackers can use generative AI to build convincing profiles on social media platforms, making it easier for hackers to impersonate individuals or create fake personas for social engineering attacks.

Conversely, AI has also paved the way for a new era of enhanced cyber defense. Organizations can fight fire with fire by leveraging AI as a force multiplier for their threat intel and defense teams. AI can enable organizations to increase efficiency and more quickly identify and respond to threats by automating repetitive tasks, predicting behaviors, recommending response actions, developing detection, processing large datasets and continuously scanning for anomalies.

While AI is only as good as the data that powers it, data privacy and ethics should never be a trade-off for security. In order to wield the technology to their benefit, organizations must prioritize trust among all stakeholders. Cybersecurity professionals play a critical role in upholding that trust in their organizations by safeguarding against cyber threats, mitigating against bias and implementing transparent practices.


Protecting privacy and upholding transparency

Many organizations already have guardrails and guidelines in place to protect customer data and privacy, such as identifying trends and anomalies based on bulk datasets. By training models to identify anomalies like a surge in traffic or volume of login attempts, they can identify potential threat vectors without individuals’ data.

Companies should also be transparent with users about how their data is used and how long it is retained. Additional rules specific to generative AI should address the use and privacy of personal data for training future models, thereby safeguarding personal data within the AI ecosystem. More communication and transparency with users will build and strengthen trust among users and stakeholders.


❝

By understanding the broader threat landscape and how other entities are managing them, organizations can learn how to better protect their own systems and data.”


Mitigating outdated and biased data

It’s not enough to ensure the data is protected — it must also be accurate. The biggest AI-powered security threats for an organization aren’t always from external adversaries. Outdated or incomplete data powering AI models can skew outcomes and lead to discrepancies, overlooking anomalies and introducing biases within AI models, all of which can significantly erode trust in an organization. For instance, biases in data could result in false positives, and incomplete data could limit visibility on viable security risks, predict incorrect recommendations for an analyst to follow, or fail to recognize an emerging threat altogether.

To help stay ahead of these possible pitfalls, human interaction and oversight is key. Organizations should conduct regular audits and assessments of their data to identify and resolve potential biases, such as datasets of any underrepresented or overrepresented groups. Cybersecurity professionals should then continually monitor the AI models and update them based on new insights.

Though AI can drive efficiency, cybersecurity teams have an in-depth understanding of a company’s assets and knowledge of the broader operational context that cannot be replicated by any AI model. Cybersecurity experts can help prevent incorrect AI outputs and stay ahead of AI-powered hacking methods by ensuring humans still play an integral role in their security efforts.


Collaboration is critical

As much as AI can do to supplement cybersecurity measures, one of the most effective ways to stay ahead of evolving hacking trends is collaboration. As technology and defense teams advance, so too are attackers finding ways to circumvent AI-based security measures. That’s why building relationships with other vendors, partners and government agencies is one of the most effective, proactive measures to help companies stay ahead of evolving AI-powered cyber threats. Responsible disclosure and information sharing is also a critical component of these relationships. By understanding the broader threat landscape and how other entities are managing them, organizations can learn how to better protect their own systems and data.

Companies can also build relationships with ethical hackers through bug bounty programs and live hacking events. These ethical hackers can help inform how security teams evade criminal hacker tactics — especially as they increasingly use AI.

Ultimately, AI is a double-edged sword for cybersecurity — security teams will use AI to improve their defenses against cyberattacks, but cybercriminals will also use AI to conduct evolved attack vectors and tactics. But in order for them to successfully evade threats, cybersecurity professionals must place trust at the center of their response strategy.

KEYWORDS: artificial intelligence (AI) data privacy ethical hacking hacker

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Kelly mccracken photo

Kelly McCracken is SVP of Detection & Response at Salesforce. 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Coding on screen

    Dangers of DeepSeek’s privacy policy: Data risks in the age of AI

    See More
  • Person tapping AI app on phone

    Security isn’t convenient, and that’s a big problem in the age of AI

    See More
  • Woman with phone and laptop in art working station

    Only 11% of SMBs Are Utilizing AI-Powered Defenses

    See More

Related Products

See More Products
  • 9780367030407.jpg

    National Security, Personal Privacy and the Law

  • s and the law.jpg

    Surveillance and the Law: Language, Power and Privacy

  • 9780367667887.jpg

    Surveillance, Privacy and Security

See More Products

Events

View AllSubmit An Event
  • December 12, 2024

    AI-Powered Security: Empowering Teams and Protecting Your Future

    ON DEMAND: Discover how artificial intelligence is revolutionizing modern security practices in this webinar “AI-Powered Security: Empowering Your Team, Protecting Your Future.”
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing