Today, artificial intelligence represents both a security threat and a solution. But what does the tech mean for the future of the industry?
In 1971, Bob Thomas wrote a self-replicating program designed to move through ARPANET (Advanced Research Projects Agency Network), a predecessor of the modern internet. While it wasn’t malicious, the program did leave behind a message: "I'M THE CREEPER: CATCH ME IF YOU CAN."
The events that followed helped define the cybersecurity industry as we know it today. In response to Creeper, Ray Tomlinson created Reaper—the world's first antivirus program.
While it’s certainly a great piece of trivia, we're specifically interested in what Creeper and Reaper represent: the cyclical nature of cybersecurity. New technology introduces new threats. New threats expose new vulnerabilities. And new vulnerabilities prompt the development of new security solutions.
But before we explore that further, let's jump ahead 30 years to 2004, when a group of international hackers is believed to have sent the Cabir worm directly to antivirus developers. Cabir is credited as the first computer worm to infect mobile phones, and the threat that gave rise to mobile security.
Speaking of mobile phones, we can’t forget the smartphone. The launch of iOS and Android was swiftly followed by the rise of rooting and jailbreaking.
All this is to say that the cybersecurity industry is, for the most part, a reactive one. Today, artificial intelligence (AI) stands as the "new" tech. And despite the widespread panic, history suggests cybersecurity will, in fact, rise to the occasion—just as it has done time and time again.
For the past decade, there’s been an evolving conversation around the "age of automation". As the Harvard Business Review notes, predictions that automation would eliminate 14% of jobs globally and radically transform another 32% didn’t account for the developments seen today with generative AI tools like ChatGPT, Gemini, and others.
Today, automation tools streamline incident detection, response, and reporting, enabling real-time security. But there’s a flip side: AI lowers the technical bar for cybercriminals. There are already extensive reports of AI-assisted cybercrime, where we see gen AI like ChatGPT being used to develop highly targeted phishing attacks and Python scripts for malware attacks.
Despite these challenges, AI presents unique opportunities for the cybersecurity industry, particularly in proactive security. For example, it can detect vulnerabilities in existing code during the development process and analyze large-scale data, boosting automation and improving scalability—all while reducing cybersecurity costs.
Generative AI is the hot "new" technology. In 2023, ChatGPT set the record for fastest growing user base ever at that time. In many ways, the explosion of AI can be compared to technological advancements like smartphones and smart TVs.
Just as smartphones revolutionized communication and introduced security challenges like mobile malware and app vulnerabilities, generative AI is transforming data generation and interaction. ChatGPT, Gemini, and similar platforms have sparked both excitement and apprehension in the cybersecurity community.
The rapid adoption of generative AI is not just a matter of new capabilities but also speed and scale. Traditional technologies evolved over years or even decades, giving cybersecurity professionals time to develop countermeasures. Generative AI’s swift integration into business and life means that both the threats and solutions must evolve in a way that keeps pace.
AI introduces several new cybersecurity threats, including:
AI-driven threats are inherently adaptive and can evolve in response to defensive measures. As a result, cybersecurity professionals must shift the way they think to anticipate potential threats and develop flexible, forward-thinking strategies. It underscores the need for a paradigm shift from reactive to proactive cybersecurity measures, and finding creative ways to leverage AI to stay ahead of hackers and other attacks.
The new threats brought by AI expose various vulnerabilities, including:
As a result, many organizations are reevaluating cybersecurity frameworks that may rely on static defenses that are insufficient against the dynamic nature of AI-driven threats. This evolution requires a multi-layered approach to security that integrates AI-based defenses and greater training with traditional methods to protect against both known and unknown threats.
The good news is that security vendors are adapting their solutions to incorporate AI, enhancing their capabilities in several ways:
AI isn’t just enhancing existing solutions. AI can be used to create dynamic security policies that adjust in real-time based on the threat environment, allowing organizations to be agile and responsive to new threats. It can also be used for resource allocation, so that technical teams are adapting in real-time to a constantly shifting threat landscape.
Just when it seems that you’ve arrived at the end of the process, it starts again when new tech is introduced. AI-powered threats demand that organizations find strategies for continuous adaptation and improvement in cybersecurity measures. Just as smartphones and cloud computing transformed cybersecurity, AI will drive another evolution in threat detection and mitigation strategies.
One look at the potential for the technical implementation of AI-assisted threats underscores how critical it is to stay vigilant. Organizations need plans and partnerships in place that help them adopt preventative measures, industry best practices, and AI-powered tools to stay ahead of emerging threats. In a world of dynamic threats, cybersecurity professionals need a plan for dynamic response. And the cost of the reputational and financial risks posed by AI-assisted attacks is too great to ignore.
Right now, all eyes are on AI but it’s critical to keep an eye on the horizon. Technological innovation will only accelerate, in part powered by AI and supported by other advancements. Areas for leaders to be mindful of include:
Quantum computers have presented a known threat to cybersecurity for years. But recent data suggests that their advancement may be faster than expected. A quantum computer could potentially break current and widely used cryptographic algorithms such as RSA (Rivest–Shamir–Adleman), almost instantly making existing encryption methods obsolete. For leaders, this highlights the need to explore whether it’s time to adopt quantum-resistant cryptographic algorithms. This shift is important because encrypted data could be captured now and decrypted later when the technology allows.
In a year with critical elections around the world and multiple conflicts, it’s important to recognize the risk that AI and future-focused tools pose. Deepfakes could be used to influence election outcomes. Malware could be used to impact critical infrastructure or essential services. As technical talent uncovers ways to use AI to uncover vulnerabilities at scale, they’ll face important questions about whether to share that information with ethical hacking organizations or monetize it by selling to cybercriminals.
Disrupting supply chains in critical industries is another fast-growing target. Supply-chain attacks exploit the trust relationships between organizations and their suppliers, introducing vulnerabilities that can be difficult to detect and mitigate. The SolarWinds Orion hack saw suspected nation-state actors infiltrate thousands of organizations, including U.S. government agencies, by exploiting Orion’s system management tools to access critical systems and data. Organizations will need to consider comprehensive supply-chain security measures, such as rigorous vetting of suppliers, continuous monitoring for vulnerabilities, and collaborative security efforts.
As hardware with pre-installed apps and software becomes more common, it introduces another layer of risk. These pre-installed components can serve as vectors for cyberattacks, allowing malicious actors to exploit vulnerabilities before they’re even identified. As a result, ensuring hardware and software security from manufacturing to deployment requires a comprehensive approach, involving everything from analyzing penetration testing results for specific SDK components to continuous threat monitoring.
As we prepare for the future beyond AI, strategic foresight is becoming cybersecurity’s highest value capital. Anticipating potential threats and understanding the implications of emerging technologies enables organizations to stay ahead. The integration of AI, quantum computing, and other advanced technologies into cybersecurity strategies will continue to support the integrity and security of digital ecosystems.
The future of cybersecurity lies in the ability to anticipate, adapt, and innovate. Rapid technology innovation means constantly introducing new challenges, but it also provides opportunities to enhance defenses and develop new protective solutions.