Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceCybersecurity News

5 reasons automation can't take over cybersecurity

By Ray Steen
security-automation-freepik1170.jpg

Image by katemangostar via Freepik

September 27, 2022

The past few years have seen explosive growth in automation technologies for cybersecurity professionals, from security orchestration automation and response (SOAR) security technologies to user and entity behavior analytics (UEBA). 


With Deloitte predicting that the market for cyber artificial intelligence (AI) tools will increase by $19 billion before 2026, many hail their arrival as the next major advance in cybersecurity.


It’s not hard to understand their enthusiasm: as an ever-increasing number of cyber threats combines with a shortage of IT talent across the board, today’s organizations need as much help as possible. Advances in AI have transformed many industries, and cybersecurity seems like the next logical step.


Unfortunately, history has proven that businesses tend to overestimate the transformative potential of automation in the short term while misunderstanding it in the long term. And if we take a closer look at the current state of automation in cybersecurity, we see it’s nowhere close to replacing human talent — if anything, we probably depend on it too much already.


Over the next decade in cybersecurity, automation and expertise will go hand in hand, with humans at the helm of the ship. In the short term, there are better ways to deal with mounting cybersecurity challenges than throwing automation at the problem.


Automation and Complacency

Although cybersecurity automation is only in its nascent stages, many organizations are already relying on it, sometimes at the expense of their cyber preparedness and bottom line. A recent report found that cybersecurity incidents caused by network misconfigurations cost organizations 9% of their annual revenue, with less than 5% of respondents prioritizing cybersecurity for routers, switches and network edge devices.


The same report gives us some idea of why: 70% blamed inaccurate automation as a top challenge for meeting their security and compliance requirements. Trumped-up marketing has encouraged an attitude of complacency towards network perimeters — exactly where a human touch is needed most. 


But why is a human touch needed in the first place? With a baseline for normal behavior and training set for malicious activity, network security seems like the ideal use case for machine learning (ML) and automated rule-setting. Here are five simple reasons:


1. Inherent Limitations

Ultimately, automated solutions can only reliably respond to threats they have been trained to detect. But cyber actors are innovative and constantly developing new techniques to stay ahead of cyber defenders — automation tools lack the situational awareness to recognize a novel attack vector, leading to false positives and negatives.


Ultimately, even the best-automated solutions suffer from the same weakness that has made servers vulnerable to distributed denial of service attacks (DDoS): if attackers can’t find a way around them, they can simply overload them with junk data and requests.


2. “Automated” is not “Autonomous”

In the real world, few automated systems can function without an army of human experts to guide them. Algorithms do almost all stock trading today, but that has not eliminated traders or analysts from Wall Street — their jobs have simply changed, and some have been replaced by the computer engineers required to make it all work. Likewise, all existing automation technologies — from SOAR and UEBA to Extended detection and response (XDR) — depend on humans to set rules and workflows while monitoring their behavior over time.


3. The Danger of Misconfiguration

Because automated systems depend on human configuration, they are only as good as the rules they are given. Misconfigurations can lead to disaster — if a workflow with faulty parameters is automated, for instance, the system can generate thousands of wrong tickets. 


Poorly configured rules and detection thresholds can lead to overfitting (identifying legitimate activity as malicious) or underfitting (failing to detect real threats). Cyber experts will always have to be present to evaluate and adjust the performance of automated systems in real-time and in response to the changing threat landscape.


4. Automation Can’t Solve Social Engineering

According to Deloitte, up to 91% of all cyberattacks begin with a phishing email to an unsuspecting victim — and email does not exhaust the phishing channels that cyber actors use today (social media, mobile apps, SMS). Unfortunately, automation can do little to prevent employees from succumbing to social engineering attacks — that requires cyber training and education from experienced professionals.


5. The Impending AI Arms Race

Cybercrime is no longer dominated by lone wolfs or small hacking teams — it is an organized, international operation in which trillions of dollars change hands. It intersects with geopolitical interests, corporate espionage and a teaming black market where cyber actors constantly work to develop better tactics, techniques and procedures (TTPs).


As businesses adopt AI to defend their networks, cyber actors will adopt the same AI to attack them more effectively. In the future, defending against global cybercrime will be a never-ending arms race where no team has a clear advantage unless it comes in the form of human expertise, creative thinking and the ability to adapt rapidly.


Augmentation Over Replacement

In the big picture, automation will inevitably play a role in cyber strategies of the future — but it will assist cyber operators rather than replace them. It will help eliminate repetitive and routine tasks — it will reduce human error and augment threat analysis while reducing the rate of false positives.


But in both the long and short term, automation can’t replace cyber operators in a security operations center (SOC) — nor can it provide cybersecurity experts to help organizations maintain resilience against threats to their bottom line. For that, businesses can look to managed service providers (MSPs) and outsourced IT positions like virtual chief information officers (vCIOs). 

KEYWORDS: automation cyber security network security risk management Security Operations Center (SOC)

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Ray steen

Ray Steen is the Chief Security Officer of D.C.-Metro based IT managed services firm, MainSpring. Ray has more than 20 years of experience in strategy, consulting, and communications. At MainSpring, he oversees high-level consulting with new and existing clients, professional services engagements, and strategic partnerships.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Leadership and Management
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Person working on laptop

Governance in the Age of Citizen Developers and AI

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Healthcare Data Compliance: Maintaining Integrity, Privacy and Security

    Three Reasons Healthcare CISOs Can’t Ignore Vendor Compliance

    See More
  • Cargo ship sailing

    Amidst Tariff Uncertainty, Physical Security Can’t Take a Backseat

    See More
  • dataminr-gsoc6

    3 key reasons why SOCs should implement policies over security standards

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!