
It is 2:13 on Sunday, and the worst nightmares of SOC teams will soon come true.
The attackers on the other side of the planet begin an attack on the company’s infrastructure. Thanks to many uncomposed end points, which have not seen updates since 2022, they got here up with the circuit in lower than a minute.
Attacks with the skills of the national state team are after Active Directory to dam the entire network, while creating latest powers at the administrator level that may close every try to close them. Meanwhile, other members of the attacker release bots of bots designed to gather clients gigabytes, employees and financial data through the API interface, which has never been turned off after the last large version of the product.
At SOC, notifications begin to light up consoles, resembling the latest Auto Grand Theft Auto on Nintendo Switch. SOC analysts are becoming pengued on mobile phones, attempting to sleep one other six -day week, during which many will gain almost 70 hours.
Ciso receives a phone around 2:35 am from the company’s MDR supplier, in which a large -scale violation becomes. “This is not our dissatisfied accounting team, right? The guy who tried” office space “is no longer there, right?” Ciso asks half asleep.
The upcoming storm of cybersecurity: Gen AI, confidential and rising burnout
Generative AI creates a digital diaspora of techniques, technology and tradition, which everyone takes, from dishonest attackers to national armies trained in the field of Cyberwar. Confidential threats also grow, accelerated by uncertainty of labor and growing inflation. All these challenges and more on Ciso shoulders and it is not surprising that it copes more with burnout.
The meteoric growth of AI for the opponent and justified use is in the center of all this. The most vital advantages of artificial intelligence to enhance cyber security while reducing the risk is what the achievement of the ordinance is pushed by CISO.
This is not an easy task, because the security of artificial intelligence evolves in a short time. IN Garter latest Dataview on safety and risk managementThe Analytyka company reacted how leaders react to AI gene. They found it 56% organizations are already implementing Gen AI solutions, but 40% Security leaders grant significant gaps in their ability to effectively manage AI threats.
AI gene is most frequently implemented InfraskConstruction safety where 18% enterprises are fully operational and 27% Today they are actively implementing systems based on genes. The second is safety operations where 17% enterprises have fully used AI systems. Data security is the third hottest use of use 15% enterprises using systems based on AI genes to guard clouds, hybrid and local data storage systems and data lakes.
Confidential threats require the response of the AI-Pirst gene
Gen AI completely ordered the internal landscape of the threat of each company, making the Insider more autonomous threats, insidious ICHallenging is identification. Shadow AI is a threat vector that Ciso couldn’t imagine, and now it is one of the most porous surfaces.
“I see it every week”, Vineet Arora, CTO W WinwireVenturebeat said recently. “Department jumps on unconvinced AI because direct benefits are too tempting to ignore.” Arara quickly notices that employees are not intentionally malicious. “It is crucial for organizations to define strategies with solid safety, while enabling employees to effectively use AI technology,” explains Arora. “Total bans often drive AI using the underground, which only increases the risk.”
“We see 50 new AI applications a day and we have already cataloged over 12,000,” said Itamar Golan, CEO and co -founder Fast safetyduring the last interview with Venturebeat. (*1*)
Traditional detection models based on rules are now not enough. Leading security teams change towards behavioral evaluation directed by the AI generation, which establish dynamic foundations of worker activities that may discover anomalies in real time and contain risk and potential threats.
Suppliersincluding fast safety, Proofpoint Insider Ground Management, AND Character, They quickly introduce innovations due to the latest generation detection engines, which correlate the file, cloud, endpoint and real -time telemetry. Microsoft ProView confidential risk management It also embeds the latest generation AI models to autonomously discover high -risk behavior in hybrid working force.
Conclusion – part 1
SOC bands are in the race against time, especially if their systems are not integrated with each other, and over 10,000 alerts per day they generate, they may not synchronize. The attack from the other side of the planet at 2:13 in the morning will probably be a challenge to incorporate in older systems. Since opponents relentless in refining Tradecraft from the AI gene, more firms must speed up and smarter to get more value from existing systems.
Cyber security sellers to supply the maximum value of systems already installed in SOC. Get appropriate integration and avoid the must rotate chairs through the SOC floor to examine the warning integrity from one system to a different. Know that invasion is not a false alarm. The attackers show the extraordinary ability to re -again again. Time more SoC, and the firms of them did the same.