Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Enterprise ServicesSecurity Leadership and ManagementCybersecurity News

Tipping the Scale for Effective Cybersecurity

By Dustin Hillard
cyber network
May 8, 2019

New technologies, including cloud computing, the Internet of Things and artificial intelligence, are constantly bringing new opportunities and challenges to attackers and defenders alike. This is not just the age of machines but of machine-scale. As such, IT security analysts need new tools to defend the network.

This brings up the important point that humans are still needed in the loop of cybersecurity. Machine-scale defense is not about replacing people. Instead, efforts should focus on how to compensate for human error and resource limitations within security strategies and how to augment the skills of cybersecurity defenders. In other words, how can chief information security officers (CISOs) leverage new, advanced technologies to successfully address the scale and complexity of today’s evolving threat landscape?

 

Cyber-attacks at machine-scale

All sorts of malicious actors are converging upon today’s increasingly vulnerable attack surface, regardless of whether they are motivated by pride, money or ideology. Major attacks such as the Mirai botnet Distributed Denial of Service (DDoS) and WannaCry ransomware are clear demonstrations of the scope and breadth of cyber threat actors. Furthermore, 2.6 billion records were compromised worldwide in 2017, an 87 percent increase over 2016, which translates to 7.1 million records that are stolen or lost per day.  

What’s enabled the scale of these attacks is the combination of cheaper, easier access to technology with the democratization of the tools and knowledge required to execute these sorts of operations. You no longer have to be a nation-state to have access to sophisticated hacking tools. Malware-as-a service, in all of its guises, is readily available on the Dark Web and sold on a commission basis. Anyone who wants to make a fast buck and knows how to get on the Dark Web can become a hacker. The goal posts have changed.


Why human-scale is no longer enough

Machine-scale threats are not only the result of malicious intent. Be it an innocent mistake, sheer carelessness or malicious intent, the complexity and scale of today’s digitized platforms poses a serious challenge to traditional models of security, as there is still a probability of human error.

The increased complexity of enterprise cybersecurity and why securing the network now requires an integrated AI and expert analyst approach, results from a number of factors:

  • Organizations assume that well-known cloud infrastructure technology companies have better security practices, so they outsource their security to those companies. This is true in terms of the security of the infrastructure, but the cloud customer takes on many new responsibilities for configuring the available security settings and securing their own data.
  • With the interconnectedness and cloud-hosting of many services, the threat landscape is greatly expanded. Most people assume their organizations use up to 40 cloud apps when, in reality, the number is generally closer to 1,000.
  • It is difficult for security analysts to detect patterns across the scale of big data. How big? By 2025, there will be a projected 163 zettabytes of digital data in existence.
  • Security teams are uncertain about how best to secure cloud applications due to the newness of the technologies. In June 2017, the names, addresses and account details of some 14 million Verizon customers were found in an unsecured data repository on a cloud server. This was not a result of a malicious attack; the repository was simply exposed to the internet because of an incorrect configuration. 

 

Striking back with integrated machines and humans

With so many new technologies ringing in our ears, how do we choose a security strategy that will work? If we cut through the noise, we can all agree that these machine-scale problems require machine-scale solutions, like machine learning. But the conversation needs to be about how to apply these technologies in the right way, to augment the analysts, not replace them. The use of integrated machine learning can have a pertinent and powerful impact on its application in cybersecurity.

If organizations want to implement machine learning – or, more broadly, AI – to the greatest effect, the cybersecurity paradigm needs to shift. This involves moving from finding low-level patterns in siloed data and then aggregating the output to aggregating data from across the network and looking for the patterns that matter in data that is aggregated across many sources. Using these tools within an integrated approach will optimize the use of these new technologies. It will ensure that the data used to determine cybersecurity incident trends and patterns are relevant, informative and accurate. The promise of AI is to help organizations to automate the time-consuming process of analyzing the data to understand a threat and to augment their human analysts, who then must add context and determine how to respond.

To evolve from human-scale to machine-scale in cybersecurity defense, it is important to have an understanding of the three stages of change management. These are:

 

1. AI-Human action: Often, cybersecurity platforms based on AI attempt to reduce cyber threats by monitoring instrumentation from multiple sources (such as the network and endpoints). The results of the analysis should be delivered to a highly skilled analyst, who will then take action.

2. Stemming the flood: The next stage of change management is automating the machine-to-human process to avoid the floods of alerts being generated by most tools today.

3. Integrating Machine Learning: The use of integrated machine learning enables AI-based cybersecurity platforms to achieve the best outcomes as it is applied holistically across an entire enterprise security strategy. These systems use automation to complete complex human tasks by using data from an entire system, not just a single focus point.

 

Machine-scale cybersecurity

Cyber threats continue to evolve in scope and sophistication, but so do the tools to confront them. This includes artificial intelligence and machine learning. Organization must deploy these advanced technologies, working toward human and machine collaboration, to address the shifting threat landscape. To win this fight, organizations will need to adopt integrated AI platforms that empower cybersecurity analysts in new, effective ways.

 

This article originally ran in Today’s Cybersecurity Leader, a monthly cybersecurity-focused eNewsletter for security end users, brought to you by Security magazine. Subscribe here.

KEYWORDS: artificial intelligence (AI) cloud computing cybersecurity Internet of Things

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Dustin hillard lg

Dustin Hillard, CTO, is responsible for leading product development and technology innovation at eSentire.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cybersecurity
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Coding on screen

Research reveals mass scanning and exploitation campaigns

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • cyber 2 feat

    8 Questions for Effective Cybersecurity in Your Enterprise

    See More
  • Outsourcing Data: Don't Take a Fairytale Approach

    The Importance of Effective Correlation for Threat Intelligence Users

    See More
  • blockchain-enews

    Why the global cannabis industry needs blockchain for more effective quality control

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing