Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityTechnologies & SolutionsNew Security Technology

Unlocking the power of generative AI

By Joseph Perry
Google bard logo

Image via Unsplash

August 4, 2023

Discussion of AI tends to follow one of two patterns. The first pattern begins with a complex analysis of how the technology works, breaking down the basics of Neural Networks before moving on to the most advanced concept that the article’s author was able to understand after a few minutes on Google, and eventually ending with a vague prediction of the technology’s impact on various fields. The second pattern begins with a grandiose description of a utopian/dystopian future dominated by a godlike AI, before going on to sheepishly admit that such predictions have been common, and commonly wrong, for more than sixty years. It will be the goal of this article to fall into neither pattern, and to instead break down the ways in which the security industry is being changed right now, today, and the ways in which it is likely to change in the next year or so. 

Generative AI in security today

Microsoft is a major investor in ChatGPT’s creator, OpenAI. Though the tool is currently in a closed beta, users are being added and an open enrollment is likely to be announced any day now, as Microsoft and their competitors rush to capitalize on the opportunity. 

On the other side of the proverbial fence, security leaders see attackers taking their first steps in the automation of offensive security. These tools are less publicized, and it’s common to see a researcher make a tentative first post about their results only to quickly delete that post when they realize the scope of their actions. AI tools have already seen which can perform the initial stages of an attack, discovering open ports, identifying technology versions and applying appropriate exploits. It’s a given that far more powerful, far more sophisticated versions are available to the Nation-state actors and other advanced persistent threats roaming the digital wilds. 

Security leaders are, in short, amid an arms race. Attackers seek to create unstoppable weapons, while defenders try desperately to construct immovable barricades. Each side tries to conceal their own discoveries while learning from those of their opponents. 

12 months of curious minds

One of the core challenges in developing a new technology is its replicability. The scientists working on the Manhattan Project couldn’t just classify the process of enriching uranium, or the process of creating a bomb using a combination of classical and nuclear materials, because those were relatively minor innovations, the sort of thing any competent researcher would eventually discover. Instead, they had to classify entire fields of science, hiding away some of the most groundbreaking achievements in the history of humankind. They had to do this because innovations are fundamentally repeatable. If a discovery is true, and an accurate depiction of the world, then any sufficiently skilled person will rediscover that thing given the right preconditions. The best anyone can do is find the root concept and hide that, as the scientists on the Manhattan Project did with nuclear physics.

When it comes to AI, particularly generative AI, however, that cat is already out of the bag. It doesn’t matter how many security leaders write alarmist letters, the simple fact is that the technology is too well understood, too widespread and too easily replicated to be locked away. This is compounded by the fact that AI itself also serves to increase the pace at which knowledge spreads. In other words, the better the AI someone has today, the harder it is to keep them from getting an even better one tomorrow. After all, the single most dangerous event in the hacking world is when an APT’s tools get leaked to the public. 

Threat intelligence will no longer be a matter of tracking trends and producing graphics to demonstrate the value of the program. As more and more of the offensive and defensive functions are put onto AI, the key differentiator will be how, and on what, that AI is trained. Threat intelligence will not be able to focus on volume but will instead have to tighten its focus on quality, discovering and disseminating information as quickly as possible. If an exploit is made public in hacker communities, every attacker will be able to deploy it in an extremely short timeframe. The companies which are reliant on old-school RSS-based threat intelligence will rapidly find themselves victimized by attackers capable of instantly utilizing cutting edge TTPs as soon as those TTPs are leaked.

Twelve months from now, a security program will live and die based on how well it discovers information about potential attackers, and how well it conceals information from those same attackers. Every other consideration, barring that of the minimum resources needed to participate in this arms race, will fall by the wayside. 

The truth is that no one, not even the most powerful AI models, can predict the future. However, the current trend is away from tools and toward knowledge, as it becomes more and more unlikely that any single tool will be able to compete in breadth or depth with AI. The dissemination and control of information, even information at the most fundamental levels, is the battleground on which the AI wars will be decided. 

KEYWORDS: artificial intelligence (AI) cybersecurity risk management threat intelligence threat landscape

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Joseph Perry is the Advanced Services Lead at MorganFranklin Cyber Fusion Center.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • digital landscape

    Unlocking digital trust: The power of collaboration in a data-driven world

    See More
  • Digital Trust

    Unlocking digital trust: The power of collaboration in a data-driven world

    See More
  • computer open to chatgpt screen

    Fighting the dark side of generative AI

    See More

Related Products

See More Products
  • s and the law.jpg

    Surveillance and the Law: Language, Power and Privacy

  • The Database Hacker's Handboo

  • Physical Security and Safety: A Field Guide for the Practitioner

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing