Download as pdf or txt
Download as pdf or txt
You are on page 1of 56

CYBERSECURITY AND ARTIFICIAL INTELLIGENCE: THREATS AND OPPORTUNITIES

Cybersecurity and
Artificial Intelligence:
Threats and
Opportunities

By Steve Wilson (CPO, Contrast Security) –


with help from various AI technologies

1 contrastsecurity.com
I
n the rapidly evolving world “Cybersecurity and Artificial
of technology, the intersection Intelligence: Threats and Opportunities”
of artificial intelligence and covers essential topics such as
cybersecurity has become AI-assisted phishing campaigns,
a critical area of concern machine learning-powered malware,
for individuals and organizations and cutting-edge AppSec technologies
alike. “Cybersecurity and Artificial like IAST and RASP. By delving into the
Intelligence: Threats and Opportunities“ latest advancements and techniques,
is your comprehensive guide to this book empowers you with the
understanding the impact of AI on knowledge to defend against
the security landscape, the emerging AI-driven threats and secure your
threats posed by advanced digital landscape.
AI-powered cyberattacks, and the
Whether you’re a developer, IT
cutting-edge techniques developers
professional, or just a tech-savvy
can use to protect their applications
individual interested in the world of
in this new era.
cybersecurity and AI, this book is an
As AI continues to revolutionize invaluable resource. Equip yourself
various industries, cybercriminals are with the tools and insights needed to
harnessing its power to launch more navigate the complex intersection of
sophisticated and targeted attacks. artificial intelligence and cybersecurity,
This book will provide you with an and confidently safeguard your digital
understanding of the role AI plays in assets in the face of ever-evolving
both offensive and defensive threats.
cybersecurity, helping you to stay
ahead of the curve and ensure your
digital assets remain secure. Explore
the evolution of AI technologies, learn
about the increased security threats
they present, and discover how to
leverage AI-driven tools to protect
your applications and systems.
CYBERSECURITY AND ARTIFICIAL INTELLIGENCE: THREATS AND OPPORTUNITIES

Forward�������������������������������������������������������������������������������������������������������������������������������������������������������������������������������� 5

Introduction��������������������������������������������������������������������������������������������������������������������������������������������������������������������� 6
The importance of cybersecurity in the age of AI 7
The changing landscape of security 7
Goals of This Book 9

Section I: The AI revolution���������������������������������������������������������������������������������������������������������������������������� 10


A brief history of AI 11
The evolution of AI technologies 11
Special Note: Deepfakes 12
How AI is changing the world 14

Section II: AI in cybersecurity���������������������������������������������������������������������������������������������������������������������� 15


A double-edged sword 16
The positive impact of AI on cybersecurity 16
The dark side of AI in cybersecurity  17
Special note: AI-powered phishing, spear phishing and social engineering 18
Advantages of AI-driven security solutions 20
Special note: AI-powered threat detection 21
Challenges and risks associated with AI in security 22
AI-powered cyberattacks 22
Special note: Nation-state attacks utilizing AI 24

Section III: Increased security threats with advanced AI������������������������������������������������� 26


AI-powered hacking techniques 27
Special note: AI-powered attack bots 28
The rise of AI-driven cyber crime 30
The impact on businesses and individuals 31

Section IV: Techniques for protecting applications in a world with AI������������������ 32


Secure development practices 33
Application Security (AppSec) technologies 33
Special note: A new type of vulnerability 34
Encryption and data protection 36
AI-driven security solutions: Harnessing the power of AI for protection 36
The importance of proactive AppSec in the age of AI 37

Section V: Preparing for the future of AI-driven cybersecurity����������������������������������� 38


Emerging trends in AI-driven cybersecurity 39

Section VI: Legal and ethical considerations in AI-driven cybersecurity���������� 40


Data privacy and protection 41
Transparency and explainability 41
Legal liability and responsibility 42
Ethical considerations 42
Special note: Will an AI keep your secrets? 42

Conclusion: Navigating the AI-driven cybersecurity landscape�������������������������������� 45


Appendices������������������������������������������������������������������������������������������������������������������������������������������������������������������� 47
Appendix A: The history and development of ChatGPT 48
Appendix B: The history and development of Stable Diffusion 49
Appendix C: Recommended resources and further reading 50
Appendix D: Glossary 51
About Contrast Security 53
About the Author 54

contrastsecurity.com
3
CYBERSECURITY AND ARTIFICIAL INTELLIGENCE: THREATS AND OPPORTUNITIES

4
CYBERSECURITY AND ARTIFICIAL INTELLIGENCE: THREATS AND OPPORTUNITIES

Forward
As of this writing, it’s just a few months after the launch of ChatGPT by Open AI
and a few weeks after the launch of the new GPT-4 engine. The rapt attention
to AI across all industries is sudden, and unexpected, by many. However, we’ve
been on a gradual path of increasing use of Machine Learning (ML) technologies
for the past decade. There are now a huge number of (mostly) self-driving cars
on the road — personally, my car has been driving most of my miles since 2018!
And we’ve already seen AI starting to transform parts of industries like
medicine and finance. Amazon sells over 50,000,000 Alexa devices per year,
adding personal AI assistants to millions of homes.

What makes these recent advances in Generative AI — such as GPT and Stable
Diffusion for image generation — so exciting is that they’re so accessible.
Almost anyone can instantly use them. They demonstrate a much broader
understanding of human language, vision, and even (seemingly) human nature!
This means that we must start to strongly evaluate how AI will impact
cybersecurity — both for good and for bad.

Given that we’re at the start of this new era, it seemed timely to leverage some
of these new technologies in the construction of this book. As such, most of
the text written in this book has been generated as part of a conversation on
this topic I’ve carried out with GPT-4. Also, the images in this book were created
based on prompts that I provided to Stable Diffusion. My AI-generated “avatars”
were created with the Lensa app on my iPhone.

Let’s jump into the discussion!

Steve Wilson
Chief Product Officer
Contrast Security
April 2023

contrastsecurity.com
5 5
CYBERSECURITY AND ARTIFICIAL INTELLIGENCE: THREATS AND OPPORTUNITIES

INTRODUCTION

6
CYBERSECURITY AND ARTIFICIAL INTELLIGENCE: THREATS AND OPPORTUNITIES

The importance of
cybersecurity in the
age of AI
Why cybersecurity and AI matter. The rapid advancement
of technology has transformed our lives in numerous
ways, offering convenience, efficiency, and countless
opportunities. However, these benefits come with a price:
an ever-evolving digital landscape that presents new
challenges and threats. As the world becomes more
connected and reliant on technology, cybersecurity has
become increasingly important.

Artificial Intelligence (AI) has emerged as a groundbreaking


technology, revolutionizing various industries, including
cybersecurity. AI presents both opportunities and challenges
for the field, as it can be harnessed to protect networks
and users or be weaponized by adversaries to wreak havoc.
This book aims to help you understand the implications of
AI on cybersecurity and how to navigate the threats and
opportunities it presents.

The changing landscape digital assets. Organizations are increasingly leveraging


of security AI-driven solutions for threat detection, risk assessment,
and incident response, resulting in more efficient and
The cybersecurity landscape is in a constant state of flux, effective security measures. For example, AI-powered tools
as technology continues to evolve and threat actors adapt can analyze network traffic patterns to identify anoma-
their tactics to exploit new vulnerabilities. The adoption of lies and potential intrusions, enabling security teams to
AI has significantly altered this landscape, introducing both respond more quickly and accurately to potential threats.
novel opportunities and challenges that have far-reaching
implications for cybersecurity professionals and users However, the same capabilities that make AI a powerful
alike. AI, with its ability to process vast amounts of data ally in the fight against cybercrime can also be exploited
and make decisions at an unprecedented speed, has the by malicious actors to develop more sophisticated and
potential to revolutionize the way we protect our networks targeted attacks. Adversaries are now using AI to automate
and digital assets. Organizations are increasingly leveraging their attacks, making them faster, more adaptable, and
AI-driven solutions for threat detection, risk assessment, and harder to detect. This includes AI-assisted phishing
incident response, resulting in more efficient and effective campaigns that can craft highly convincing emails,
security measures. For example, AI-powered tools can AI-driven vulnerability discovery tools that can identify
analyze network traffic patterns to identify anomalies and and exploit weak points in systems more efficiently,
AI, with its ability to process vast amounts of data and make and intelligent malware that can evolve to bypass
decisions at an unprecedented speed, has the potential to security measures.
revolutionize the way we protect our networks and

contrastsecurity.com 7
CYBERSECURITY AND ARTIFICIAL INTELLIGENCE: THREATS AND OPPORTUNITIES

Below is an example of intelligent malware generated by ChatGPT and publicly posted to Facebook recently by
programmer and ChatGPT expert Ruben Hassid:

The rise of AI has also given birth to new ethical and As a result of these developments, it has become more
privacy concerns, as advanced algorithms can be used to critical than ever for organizations and individuals to
mine personal data or conduct surveillance on a massive understand the implications of AI on cybersecurity and
scale. For example, AI-powered facial recognition systems adapt their strategies accordingly. Traditional defenses
can be employed to track individuals in public spaces, need to be augmented with AI-driven tools and techniques
potentially infringing on their privacy rights. Furthermore, to stay ahead of the curve, and security professionals must
AI can be used to create deepfakes – manipulated audio or constantly update their knowledge and skills to address
video content that can be nearly indistinguishable from the the evolving threat landscape.
original – that can have significant implications for privacy,
This book will guide you through the changing security
security, and trust in digital communication.
landscape, providing you with the knowledge and tools
The implications of AI on cybersecurity are not limited to needed to understand and navigate the complex interplay
private organizations and individuals. Nation-states are between AI and cybersecurity. By exploring both the
also becoming more invested in AI-driven cyber warfare opportunities and challenges presented by AI, you will
capabilities, either to launch sophisticated cyberattacks be better prepared to protect your digital assets and
against adversaries or to bolster their defenses against contribute to a safer, more secure digital world.
such attacks. This development is likely to exacerbate the
global cyber arms race, as countries seek to outpace one
another in the development and deployment of AI-driven
cyber capabilities.

8
Goals of this book
As the world becomes increasingly interconnected and
reliant on technology, it is vital for professionals and
individuals alike to grasp the implications of AI on the
security landscape.

This book provides a comprehensive understanding of the


intricate relationship between cybersecurity and AI that
will lead to a solid foundation in:

1 Understanding how AI affects the security landscape: How AI is transforming


the field of cybersecurity, both as a powerful tool for protection and as a weapon
wielded by malicious actors.

2 Identifying emerging security threats in a world with advanced AI being used by


hackers: Emerging AI-driven threats, their implications and how they might evolve
in the future.

3
Learning techniques developers should use to secure and protect their applications:
The AppSec tools and techniques, such as Interactive Application Security Testing
(IAST) and Runtime Application Self-Protection (RASP), that developers can employ to
fortify their applications against increasingly sophisticated attacks.

4 Preparing for the future of AI and cybersecurity: Ethical, legal, and regulatory
considerations surrounding AI-driven security solutions, as well as potential
future developments in the field.

5 Cultivating a security-aware mindset: The importance of adopting a security-first


approach, building a security-aware culture within organizations, and staying
informed about the latest trends and threats in the cybersecurity landscape.

With this knowledge, you’ll be better equipped to protect


your digital assets, safeguard your privacy, and contribute
to a more secure digital world. Moreover, you’ll be prepared
to face the challenges and capitalize on the opportunities
presented by the intersection of AI and cybersecurity,
allowing you to stay ahead of the curve in this rapidly
evolving field.

contrastsecurity.com 9
CYBERSECURITY AND ARTIFICIAL INTELLIGENCE: THREATS AND OPPORTUNITIES

SECTION I:
The AI revolution

10
A brief history of AI
Artificial Intelligence (AI) has come a long way since its
inception. The term was first coined by John McCarthy in
1956 during Dartmouth College’s Summer Research
Project on Artificial Intelligence: a seminal event for
artificial intelligence as a field. Early AI research focused
on symbolic reasoning and problem-solving, with early
successes such as the General Problem Solver developed
by Allen Newell and Herbert A. Simon.

In the 1980s, a new approach called machine learning (ML)


emerged. ML focused on teaching computers to learn from
data. This led to the development of algorithms such as
decision trees, support vector machines and neural
networks. The current AI revolution has been fueled by a
resurgence of neural networks in the form of deep learning
in the early 2010s. Deep learning techniques, powered by
advances in computational power and large amounts of
2. Natural language processing (NLP): NLP techniques
data, have enabled AI to achieve remarkable performance
have improved dramatically, allowing AI systems to
in tasks like image and speech recognition, natural
better understand and process human language.
language processing and game playing.
This has led to the development of advanced social
engineering attacks that leverage AI-generated
The evolution of AI content, such as phishing emails and deepfake videos,

technologies
making it increasingly difficult for users to distinguish
between genuine and malicious content.

As AI technologies continue to evolve and mature, their 3. Reinforcement learning (RL): RL is an area of AI that
applications in various domains, including cybersecurity, focuses on training models to make optimal decisions
have become more powerful and sophisticated. The based on trial and error. RL has been used to create
evolution of AI technologies has contributed to both AI-driven cybersecurity tools that can adapt and learn
positive and negative impacts on cybersecurity. Some of from their environment, improving their effectiveness
the key advancements in AI technologies that have over time. However, adversaries can also use RL to
influenced the cybersecurity landscape include: develop attack strategies that can bypass traditional
security measures and adapt to the defenses in place.
1. ML and deep learning: ML algorithms — and their
more advanced subset, deep learning — have made 4. Generative adversarial networks (GANs): GANs are a
significant strides in recent years. These advance- type of deep learning architecture in which two neural
ments have enabled the development of powerful networks, a generator and a discriminator, are trained
AI-driven security tools capable of detecting and in competition with each other. GANs have been used
responding to threats more effectively. On the other to create realistic synthetic data, such as images,
hand, adversaries have also utilized these techniques audio and text. While GANs have numerous legitimate
to create more sophisticated and adaptive attacks. applications, they can also be used by cyber criminals
to create deepfake content, impersonate legitimate
users or generate realistic-looking phishing emails.

contrastsecurity.com 11
CYBERSECURITY AND ARTIFICIAL INTELLIGENCE: THREATS AND OPPORTUNITIES

5. Autonomous and intelligent agents: AI-driven teams to focus on more strategic initiatives.
autonomous and intelligent agents have the potential However, cyber criminals can also develop malicious
to revolutionize the way organizations manage and autonomous agents that can autonomously identify
respond to cybersecurity incidents. These agents can and exploit vulnerabilities, making attacks faster and
automate time-consuming tasks, such as threat more difficult to detect.
hunting and incident response, allowing security

12
CYBERSECURITY AND ARTIFICIAL INTELLIGENCE: THREATS AND OPPORTUNITIES


Special note:
Deepfakes
My friend Brian Lovett, who
goes by the Twitter handle @
AllYourTech, is a popular social
media and YouTube personality.
He recently decided to
experiment with Stable
Diffusion image generation
technology to create
celebrity deepfakes. He was able to easily
create a photo-realistic picture of Elon Musk (CEO of
Tesla) on a date with Mary Barra (CEO of General
Motors). He posted this to Twitter and quickly racked up
over 10 million views. People weren’t sure if it was real!
Eventually Elon himself responded, trying to dispel the
rumor by quipping “I’d never wear that outfit.”

The evolution of AI technologies has significantly


influenced the cybersecurity landscape, offering both
powerful tools for defense and novel attack vectors for
adversaries. As AI technologies continue to advance, it is
essential for developers, organizations, and individuals
to stay informed and adapt their security strategies
accordingly to effectively protect against AI-driven
cyber threats.

contrastsecurity.com
13 13
CYBERSECURITY AND ARTIFICIAL INTELLIGENCE: THREATS AND OPPORTUNITIES

How AI is changing 3. Transportation: AI is playing a crucial role in the


development of self-driving cars and optimizing
the world traffic management systems. Autonomous vehicles
use AI-powered sensors and algorithms to process
The AI revolution is having a profound impact on various real-time data, make decisions and navigate complex
aspects of our lives and industries, from healthcare and environments. This has the potential to improve road
finance to transportation and entertainment. As AI systems safety, reduce traffic congestion and revolutionize the
continue to advance and become more integrated into our transportation industry. Additionally, AI-driven traffic
daily lives, they are transforming the way we work, live and management systems can analyze data from various
interact with technology. Here are some of the ways AI is sources, such as cameras and sensors, to optimize
changing the world: traffic flow and reduce congestion in urban areas.

1. Healthcare: AI is revolutionizing the healthcare 4. Manufacturing: AI-powered robots and automation


industry by improving diagnostics, drug discovery and systems are enhancing productivity, reducing errors,
personalized medicine. By analyzing vast amounts of and optimizing the supply chain in the manufacturing
medical data and images, AI algorithms can identify industry. These intelligent systems can perform
patterns and correlations that human experts might repetitive tasks with high precision, freeing up human
miss. This enables earlier detection of diseases, workers to focus on more complex and creative tasks.
more accurate diagnoses, and the development of AI-driven predictive maintenance systems can also
targeted treatments tailored to individual patients’ analyze data from equipment sensors to identify
genetic makeup and medical history. Furthermore, potential issues and schedule repairs before they
AI-driven telemedicine and virtual healthcare cause costly downtime. In supply-chain management,
assistants are making healthcare more accessible and AI algorithms can optimize inventory levels,
efficient, particularly in remote or underserved areas. transportation routes and demand forecasting,
One example: A small startup called Glass Health is resulting in increased efficiency and reduced costs.
hoping to use AI chatbots to offer services to doctors.
The goal is to dramatically reduce the paperwork 5. Entertainment: AI is transforming the entertainment
burden physicians face, enabling them to spend more industry by creating personalized recommendations
face-to-face time with their patients. for movies, music, and video games based on users’
preferences and behavior. This allows for a more
2. Finance: AI is transforming the financial sector by tailored and engaging entertainment experience.
enhancing fraud detection, credit scoring, and AI is also playing a role in content creation, such as
algorithmic trading. AI systems can analyze large generating realistic visual effects, virtual characters,
datasets and identify suspicious transactions, making and even composing music. Moreover, AI-driven NLP
it easier to detect and prevent fraud in real-time. and voice-recognition technologies are enabling the
In credit scoring, AI algorithms can process multiple development of interactive, immersive experiences in
data points to assess the creditworthiness of gaming and virtual reality.
borrowers more accurately and fairly. In the realm of
algorithmic trading, AI-driven systems can analyze As AI continues to advance and integrate into our daily
market trends and execute trades at lightning speed, lives, it is also playing an increasingly important role in the
outperforming traditional trading strategies. field of cybersecurity. In the next section, we will explore
the ways AI is shaping cybersecurity and the implications
for individuals and organizations.

14
CYBERSECURITY AND ARTIFICIAL INTELLIGENCE: THREATS AND OPPORTUNITIES

SECTION II:
AI in cybersecurity

contrastsecurity.com
15 15
CYBERSECURITY AND ARTIFICIAL INTELLIGENCE: THREATS AND OPPORTUNITIES

A double-edged sword 3. Predictive analytics: By analyzing historical data and


learning from past security incidents, AI can help
AI is transforming the cybersecurity landscape by predict and prevent future attacks. This enables
offering new ways to detect, analyze and respond to organizations to proactively address vulnerabilities
threats. AI-driven security solutions can help organizations and improve their overall security posture.
stay ahead of increasingly sophisticated cyberattacks,
4. Security automation: AI can automate repetitive
improve efficiency and reduce human error, but it can also
and time-consuming tasks, such as log analysis and
be weaponized by malicious actors to launch more
vulnerability scanning, freeing up valuable time
sophisticated cyberattacks. Understanding this complex
for security professionals to focus on more
relationship is crucial for organizations and individuals
strategic issues.
looking to protect their digital assets.
5. Advanced risk assessment and management:
Here’s how AI is shaping cybersecurity in ways both
AI algorithms can process and analyze vast amounts
positive and negative:
of data from various sources, such as user behavior,
network traffic, and device configurations, to identify

The positive impact of AI potential vulnerabilities and assess the overall risk
to an organization. This enables security teams to
on cybersecurity prioritize their efforts and allocate resources more
effectively, ultimately resulting in a more robust
1. Threat detection: AI-powered systems can analyze
security posture.
vast amounts of data from various sources — such as
network traffic, logs and user behavior — at incredible
speeds to identify patterns and anomalies indicative
of cyber threats. This allows for faster and more
accurate detection of attacks compared with
traditional, rule-based systems, enabling real-time
detection of anomalies and potential threats. By
automating the process of threat detection, AI can
identify patterns and correlations that human
analysts might overlook, resulting in more accurate
and efficient detection of cyberattacks.

2. Enhanced incident response: AI can assist security


teams in responding to, containing and mitigating
cyber incidents more effectively and more rapidly by
automating certain tasks, such as log analysis, data
correlation and prioritization of alerts. AI-driven tools
can analyze the nature of the attack, determine the
most effective response and even initiate remediation
actions, thus enabling security teams to minimize the
potential impact of a security breach.

16
The dark side of AI in c. The cyber arms race: The increasing reliance on AI in
cybersecurity is contributing to a global cyber arms
cybersecurity race, as nation-states and other actors vie for
superiority in AI-driven cyber capabilities. This
a. AI-driven cyberattacks: As AI technology advances, competition can lead to the development of more
it also becomes more accessible to malicious actors advanced cyber weapons and increase the likelihood
who can use it to develop sophisticated and targeted of cyber conflicts, potentially escalating geopolitical
cyberattacks. AI-powered tools can automate the tensions and causing widespread harm.
process of identifying vulnerabilities, crafting
convincing phishing emails, and bypassing security
measures, making it increasingly challenging for
organizations to defend against these threats.

b. Ethical and privacy concerns: The use of AI in


cybersecurity raises numerous ethical and privacy
concerns. For instance, AI-driven surveillance tools
can potentially infringe on individuals’ privacy rights,
while AI algorithms used for threat detection and risk
assessment may inadvertently introduce biases or
discriminate against certain groups. Navigating these
challenges requires a careful balance between
security and privacy considerations.

contrastsecurity.com 17
CYBERSECURITY AND ARTIFICIAL INTELLIGENCE: THREATS AND OPPORTUNITIES


Special note:
AI-powered phishing, spear phishing
and social engineering
For many years, computer scientists talked about
the Turing test to evaluate computer intelligence.
In essence, the test involves testing whether a
computer could fool a human into thinking the
computer was actually human. With technology
like GPT, we’re getting closer to that all the time.
As it now stands, GPT will pass the Turing test in
certain constrained cases. While that’s exciting in
many ways, it means that it’s now going to
become very commonplace for hackers to use
these technologies to deceive people.

In a recent story from Chicago’s ABC7 News, Alex


Hamerstone of TrustedSec notes that “One of the
biggest pieces of advice that we’ve always given
over the years for these phishing attacks, or
phishing emails and other things, [is] to look for
poorly written emails. You know, a lot of the people
who write these are based overseas, and maybe
English isn’t their first language, and you can often
identify [the messages as being malicious].”

18
CYBERSECURITY AND ARTIFICIAL INTELLIGENCE: THREATS AND OPPORTUNITIES

He goes on to say, “With these To navigate the complex interplay between AI and
cybersecurity, it is crucial for organizations and individuals
new AI technologies that help to understand both the opportunities and challenges

people write, it’s almost presented by this technology. In order to lay the
groundwork for a digital future that’s as secure as possible,
impossible to discern some of we all can work together by leveraging AI-driven
security solutions while remaining vigilant against the
these phishing attacks from a potential risks.
legitimate email at this point.”

Blackberry Global Research


conducted a February 2023
survey of 15,000 IT professionals
on AI threats to security.
The researchers found that
ChatGPT’s ability to help
hackers craft more believable
and legitimate-sounding
phishing emails was the top
global concern, with 53% of
respondents noting the concern.
Security professionals are going
to need to update their phishing
training for their companies, and
vendors need to update their
phishing prevention tools.

contrastsecurity.com 19
CYBERSECURITY AND ARTIFICIAL INTELLIGENCE: THREATS AND OPPORTUNITIES

Advantages of AI-driven
security solutions
The integration of AI into cybersecurity offers numerous
advantages, including:

1. Enhanced Threat Detection: AI-driven security tools 3. Improved Efficiency: AI can automate repetitive and
can identify patterns and anomalies that may be time-consuming tasks, enabling security teams to
missed by traditional, rule-based systems, resulting in allocate their resources more effectively and focus on
more accurate and timely threat detection. high-priority issues.

2. Reduced False Positives: AI algorithms can help filter 4. Proactive Security: AI’s predictive capabilities allow
out false alarms by analyzing and learning from organizations to identify and address vulnerabilities
historical data, allowing security teams to focus on before they are exploited, leading to a more proactive
genuine threats. approach to cybersecurity.

5. Scalability: AI-driven solutions can easily scale to


accommodate the growing volume and complexity of
cyber threats, making them a sustainable option for
organizations of all sizes.

20
CYBERSECURITY AND ARTIFICIAL INTELLIGENCE: THREATS AND OPPORTUNITIES


Special note:
AI-powered threat detection
While I was at Citrix, I was lucky enough to work with my
friends Kedar Poduri and Ebenezer Schubert to develop a
new set of services called Citrix Analytics for Security.
This now popular service takes in a massive amount of
user-behavior data such as mouse-clicks, keystrokes from
every user, along with location and network information.
Machine learning models of each user are trained to
establish their normal, baseline behavior. The models
then evaluate abnormal behavior to see if it should flag a
security risk.

In one interesting example, the team was able to train


machine learning models to differentiate typing styles
between individual users. This meant that the system could
identify a nefarious user accessing an account they don’t
own. This allows the system to flag such users just based
on matching their typing style to the style of the proper
account owner. This is just one of many, many models the
system uses to establish a security risk score for each user
that’s updated continuously.

I recently spoke about AI security threats with my friend Joe


Verderame, who was VP of Global Technology and Security
at Citrix when we worked together. He told me, “As for the
topic, the key is in fact in the statement — ‘things will move
fast.’ Using these training algorithms to build protection
inherently in the system will be the only way to keep up.”

contrastsecurity.com 21
CYBERSECURITY AND ARTIFICIAL INTELLIGENCE: THREATS AND OPPORTUNITIES

Challenges and risks 5. AI-assisted phishing campaigns

associated with AI a. NLP for crafting convincing emails: AI-driven


NLP techniques can be used to generate highly
in security convincing phishing emails, making it more
difficult for recipients to identify them as
While AI offers significant benefits to the field of fraudulent. These algorithms can analyze previous
cybersecurity, it also presents new risks and challenges: communications and mimic the writing style of a
trusted contact, increasing the likelihood that the
1. Adversarial AI: Just as AI can be used for cyber de-
target will fall for the scam.
fense, it can also be weaponized by cybercriminals to
create more sophisticated and targeted attacks, such a. Social engineering
as AI-generated phishing emails or automated vulner- and AI-driven target
ability discovery. selection: AI algorithms
can also be used to
2. Data Privacy Concerns: AI-driven security solutions
analyze large amounts
often require access to large amounts of data, raising
of publicly available
concerns about user privacy and data protection.
data, such as social
3. Algorithmic Bias: AI algorithms can inadvertently media profiles, to
perpetuate biases present in the data they are trained identify potential
on, potentially leading to unfair or discriminatory targets for phishing
outcomes. campaigns. By
determining individuals’
4. Dependence on AI: Over-reliance on AI-driven securi-
interests, relationships
ty solutions can create a false sense of security and
and recent activities,
potentially leave organizations vulnerable if AI systems
cybercriminals can craft
fail or are compromised.
highly targeted and
In the next section, we will delve deeper into the increased persuasive phishing
security threats that arise in a world with hackers who are messages that appeal
using more advanced AI, as well as strategies for address- to the target’s personal
ing these challenges. circumstances.

AI-powered cyberattacks
As AI technology becomes more advanced and accessible,
it also opens new avenues for cybercriminals to exploit.
Malicious actors can leverage AI-driven tools and tech-
niques to launch more sophisticated and targeted cyberat-
tacks, posing significant challenges for organizations and
individuals seeking to protect their digital assets. Here are
some examples of AI-powered cyberattacks:

22
2. AI-driven vulnerability discovery and exploitation b. Targeted, AI-driven payloads: AI-driven malware
and ransomware can also deliver more targeted
a. Automated fuzzing and exploit generation:
payloads, causing maximum damage and
AI-powered tools can automate the process of
disruption to specific victims or industries.
discovering vulnerabilities in software and
By analyzing the target’s environment,
generating exploits to take advantage of them.
infrastructure and data, AI-powered threats can
By using techniques such as fuzz testing, which
identify high-value assets and tailor their attacks
involves inputting large amounts of random data
to inflict maximum harm. This can result in more
to identify potential weaknesses, AI-driven tools
effective ransomware attacks, as victims may be
can quickly and efficiently identify security flaws
more likely to pay ransoms if their most critical
that human researchers
systems or data are compromised.
might overlook.
4. Advanced persistent threats (APTs) and
b. Adapting to security
nation-state actors
measures in real-time:
AI-driven cyberattacks a. AI-driven cyber espionage: Nation-state actors
can also adapt to security and APT groups can utilize AI-driven tools
measures in real-time, and techniques to conduct cyber espionage
making them more campaigns. These campaigns can involve the
difficult to detect and use of AI-powered malware to infiltrate target
prevent. For example, networks, gather intelligence and exfiltrate
malware can use AI sensitive information without being detected.
algorithms to analyze the AI-driven cyber espionage can have significant
target environment, implications for national security and geopolitical
identify security tools in stability, as it enables adversaries to gain access
place, and alter its to valuable intelligence and potentially disrupt
behavior to avoid critical infrastructure.
detection or circumvent
b. AI-powered cyber warfare: Nation-state actors
protective measures.
can also leverage AI technology to develop
more advanced cyber weapons and engage in
AI-powered cyber warfare. AI-driven cyberattacks
3. Intelligent malware and ransomware can be used to disrupt critical infrastructure,
manipulate public opinion, or sabotage military
a. AI-enhanced evasion techniques: AI-powered
and intelligence operations. As the global cyber
malware can employ sophisticated evasion
arms race intensifies, the potential for AI-driven
techniques to avoid detection by traditional
cyber conflicts to escalate and cause widespread
security tools. For instance, it can use ML
harm increases, making it crucial for governments
algorithms to analyze patterns in the target
and organizations to remain vigilant and invest in
environment and modify its behavior or
AI-driven cyber defenses.
appearance accordingly, making it more
challenging for antivirus software and other
security tools to identify and block the threat.

contrastsecurity.com 23
CYBERSECURITY AND ARTIFICIAL INTELLIGENCE: THREATS AND OPPORTUNITIES


Special note:
Nation-state attacks utilizing AI

Many countries such as Russia, China and North


Korea have well-known, government-funded
hacking capabilities. In just one example, while I
was at Citrix, we were contacted by the FBI,
which advised us about a security incident they’d
discovered as part of tracking international
cyber-criminals. At the time, Citrix publicly
published a blog from its CISO, disclosing that on
March 6, 2019, the FBI had contacted the company
to advise that the bureau “ had reason to believe
that international cyber criminals gained
access to the internal Citrix network.” In a more
recent and more severe example, in December
2022, the U.S. National Security Agency (NSA)
issued a warning that an advanced persistent
threat (APT) group from China was actively
exploiting zero-day vulnerabilities in the Citrix
Application Delivery Controller product. These two
examples are just from one company — one that
has an advanced security program. Such issues are
pervasive across the world and across industries.

24
CYBERSECURITY AND ARTIFICIAL INTELLIGENCE: THREATS AND OPPORTUNITIES

It’s almost certain that APTs In light of the growing prevalence of AI-powered
cyberattacks, it is essential for organizations and
from these countries are already individuals to be aware of the evolving threat landscape

actively exploiting AI technology, and take appropriate steps to protect their digital assets.
By understanding the capabilities of AI-driven threats
and we will see that trend and investing in advanced security solutions, we can work
together to create a more secure digital future.
accelerate. In fact, Blackberry
Global Research’s February 2023
survey found that 71% of IT
professionals believe that
foreign states may already be
using ChatGPT-style technology
for malicious purposes against
other nations.

contrastsecurity.com 25
CYBERSECURITY AND ARTIFICIAL INTELLIGENCE: THREATS AND OPPORTUNITIES

SECTION III:
Increased security threats with advanced AI

26
AI-powered hacking
techniques
As AI technologies become more advanced, they also fall 2. AI-generated phishing attacks: AI can be used to craft
into the hands of cybercriminals, who use them to highly targeted and personalized phishing emails,
develop more sophisticated and hard-to-detect attacks. making them more convincing and increasing the
Some notable AI-powered hacking techniques include: likelihood of success. By analyzing victims’ online
behavior and communication patterns, AI-generated
1. Automated vulnerability detection: AI-driven tools phishing attacks can be difficult to distinguish from
can quickly scan systems and applications to identify legitimate messages.
vulnerabilities and potential exploits. Cybercriminals
can use these tools to discover and target weaknesses 3. Deepfake technology and disinformation campaigns:
in an organization’s security infrastructure. AI-powered deepfake technology can create highly
realistic fake images, videos, and audio recordings.
Cybercriminals can use deepfakes to impersonate
individuals or spread false information, undermining
trust and causing reputational damage.

contrastsecurity.com 27
CYBERSECURITY AND ARTIFICIAL INTELLIGENCE: THREATS AND OPPORTUNITIES


Special note:
AI-powered attack bots

My friend Reuven Cohen, who goes by the


Twitter handle @ruv, has recently been
experimenting with using GPT to power attack
bots. He recently posted this on his Facebook page
after being able to create such an attack bot
very quickly:

“Autonomous AI Hack Bots are going to change


things in IT Security. This example of a bot can
scan for exploits, generate custom code and
exploit a site with no human oversight directly in
the ChatGPT interface.

“This example output shows a network scan for


vulnerabilities using Nmap. The results provide
information on open ports, services, and versions,
along with details about vulnerabilities found (CVE
numbers, disclosure dates, and references).

“The Metasploit Framework’s auxiliary scanner


module scans the target web server for accessible
directories, revealing three directories in the r
esponse. The Metasploit Framework offers various
auxiliary modules for different types of

28
CYBERSECURITY AND ARTIFICIAL INTELLIGENCE: THREATS AND OPPORTUNITIES

vulnerability scans, such as port


scanning, service enumeration,
and vulnerability assessment.

“After the pen test is completed,


the hack bot will analyze the
results and identify any
vulnerabilities or exploits.”

This is just one example of what


an individual, smart hacker can
assemble now within days.
Imagine how this is going to scale
up as larger teams and even
nation-state-level entities start to
leverage this kind of technology.
This will lead to a dramatic
escalation in the intelligence of
automated attacks.

contrastsecurity.com 29
CYBERSECURITY AND ARTIFICIAL INTELLIGENCE: THREATS AND OPPORTUNITIES

The rise of AI-driven


cyber crime
The increasing use of AI by cybercriminals has led to a rise
in AI-driven cybercrime. These sophisticated attacks can
have severe consequences for individuals, organizations
and governments. Some examples of AI-driven cybercrime
include:

1. AI-assisted ransomware: AI can be used to optimize


ransomware attacks by targeting high-value systems,
automating the encryption process and generating
unique ransom notes for each victim.

2. AI-enhanced botnets: Some day, AI-powered botnets


could be able to adapt and evade detection more
effectively than traditional botnets, making them
harder to disrupt and more capable of launching
large-scale attacks.

3. Automated social engineering: AI can analyze and


mimic communication patterns to automate social
engineering attacks, such as spear phishing or CEO
fraud, making these scams more effective and difficult
to detect.

30
The impact on businesses a. Regulatory penalties: Businesses that fail to
adequately protect sensitive data or comply with
and individuals regulations, such as the General Data Protection
Regulation (GDPR) or the California Consumer
The growing prevalence of AI-driven cyber threats has Privacy Act (CCPA), may face substantial fines and
significant implications for businesses and individuals sanctions.
alike. Advanced AI used by hackers can lead to a range of
negative outcomes, including: b. Legal liability: Organizations experiencing data
breaches may be subject to lawsuits from
1. Increased financial losses: AI-driven cyberattacks can affected customers, partners or shareholders,
lead to substantial financial losses for businesses due further increasing the financial and reputational
to theft, ransom payments and business disruption. costs of an attack.
These attacks can be more targeted and efficient,
resulting in greater financial impact than traditional 4. Personal privacy concerns: AI-driven attacks targeting
cyberattacks. individuals can lead to identity theft, financial fraud
and violation of personal privacy.
a. Direct theft: AI-enhanced attacks can more
effectively infiltrate financial systems, enabling a. Identity theft: Cybercriminals using AI-powered
hackers to steal funds directly from businesses tools can more effectively gather and exploit
and individuals. personal information, increasing the risk of
identity theft for individuals.
a. Cost of recovery: The complexity of AI-driven
attacks can increase the time and resources b. Financial fraud: AI-enhanced social engineering
required to recover from an incident, further attacks can trick individuals into revealing
amplifying the financial impact. sensitive financial information or transferring
funds to fraudulent accounts.
2. Reputational damage: Cyberattacks, especially
those involving data breaches or deepfake c. Privacy violations: AI-driven attacks can expose
disinformation campaigns, can have lasting effects on sensitive personal data, such as health records or
an organization’s reputation and customer trust. private communications, leading to violations of
privacy and potential emotional distress for the
a. Loss of customer confidence: Businesses affected individuals.
suffering from AI-driven attacks may experience
a decline in customer trust, leading to reduced Understanding the potential impacts of AI-driven cyber
sales and customer attrition. threats is crucial for businesses and individuals alike.
In the next section, we will discuss the techniques
a. Damage to brand image: High-profile cyberattacks developers should use to protect their applications in a
can tarnish an organization’s brand image, making world with AI, helping to mitigate the risks associated with
it more challenging to attract new customers, AI-driven cyber threats.
partners or investors.

3. Legal and regulatory implications: Failure to protect


sensitive data or comply with data protection
regulations can result in fines and legal repercussions
for businesses.

contrastsecurity.com 31
CYBERSECURITY AND ARTIFICIAL INTELLIGENCE: THREATS AND OPPORTUNITIES

SECTION IV:
Techniques for protecting
applications in a world with AI

32
Secure development suited to handle AI-powered threat vectors, as it can
identify vulnerabilities and malicious behavior that
practices might be missed by static analysis tools. By providing
immediate feedback on security risks, IAST allows
Implementing secure development practices is critical to developers to address vulnerabilities before they can
protecting applications from AI-driven cyber threats. Some be exploited by AI-driven attacks.
essential practices include:
2. Runtime Application Self-Protection (RASP): RASP
1. Security by design: Integrating security measures solutions monitor and protect applications during
throughout the entire development process, from runtime, detecting and blocking attacks in real time.
design to deployment, ensures that applications are By integrating with the application itself, RASP can
built with a strong security foundation. provide more accurate and context-aware protection
compared with traditional perimeter defenses, such as
2. Regular code reviews: Conducting frequent and
Web Application Firewalls (WAFs). Unlike WAFs, which
thorough code reviews helps
primarily rely on pre-defined rules
identify and fix potential
and signatures to identify, and
vulnerabilities before they can
block known attack patterns, RASP
be exploited.
can analyze application behavior
3. Security testing: Perform various and block malicious activity on
types of security testing, such as the fly, making it more effective
static and dynamic analysis, against AI-powered threats that
penetration testing, and fuzz can adapt and evolve to bypass
testing, to identify and address traditional security measures.
security weaknesses. Furthermore, RASP’s self-protec-
tion capability helps ensure that
4. Patch management: Regularly applications remain secure even
update and patch software in the face of advanced AI-driven
components to address known attacks that might compromise other security layers,
vulnerabilities and reduce the attack surface. including network-based defenses like WAFs.

By adopting modern AppSec technologies like IAST and


Application Security RASP, as well as implementing secure development

(AppSec) technologies practices, robust authentication and access control,


encryption and data protection, and effective monitoring
Incorporating AppSec technologies into your application’s and incident response, developers can enhance the
security strategy can help mitigate the risks associated security of their applications in a world with AI. These
with AI-driven cyber threats. Some notable AppSec techniques provide a more proactive and adaptable ap-
technologies include: proach to AppSec, better equipping organizations to
defend against the increasing risks associated with
1. Interactive Application Security Testing (IAST): IAST AI-driven cyber threats. In particular, RASP’s superiority
tools analyze applications during runtime to identify over traditional network-based techniques, such as
security vulnerabilities in real time. This enables WAFs, offers a more effective defense against advanced,
developers to detect and remediate issues more AI-powered attacks.
quickly than traditional testing methods. IAST’s
continuous monitoring capability makes it better

contrastsecurity.com 33
CYBERSECURITY AND ARTIFICIAL INTELLIGENCE: THREATS AND OPPORTUNITIES


Special note:
A new type of vulnerability

AppSec practitioners are very familiar with


common vulnerability types. Most of them, such
as injection vulnerabilities, have been around for
many years. The OWASP Top 10, which catalogs
the most common application vulnerability types,
is mostly static from year to year. However, with
AI systems becoming used more prevalently in
industry, security teams need to think about
how to protect those systems. It will be a very
different task.

In April 2023, The Economist wrote about one such


new vulnerability type, noting that “algorithms
that underlie modern artificial-intelligence (AI)
systems need lots of data on which to train. Much
of that data comes from the open web which,
unfortunately, makes the AIs susceptible to a type
of cyber-attack known as data poisoning.”

In one published example, researchers were able to


use data poisoning to make a self-driving car
mistake a stop-sign for a speed limit sign. In
another example, Google’s image recognition
algorithms were tricked into seeing turtles as rifles.

34
CYBERSECURITY AND ARTIFICIAL INTELLIGENCE: THREATS AND OPPORTUNITIES

We can expect to see these types Strengthening


of attacks targeting AI systems authentication and
accelerate, and security access control
practitioners will need to think Robust authentication and access control mechanisms
hard about how to protect can help prevent unauthorized access to applications and
sensitive data:
against them.
1. Multi-factor authentication (MFA): Implement MFA
to add an extra layer of security to the authentication
In January 2022, the U.S. Naval process, making it more difficult for attackers to gain
unauthorized access.
Institute wrote about the
2. Role-based access control (RBAC): Use RBAC to
national security implications restrict access to sensitive information and
of data poisoning in a world functionality based on users’ roles and responsibilities
within the organization.
where AI is increasingly involved
3. Regular audits: Conduct regular audits of user access
in defense applications, noting rights to ensure that only authorized individuals have
that “By poisoning these access to sensitive data and resources.

example datasets, adversaries


can corrupt the machine’s
training process, potentially
causing the United States to field
unreliable or dangerous assets.”

contrastsecurity.com 35
CYBERSECURITY AND ARTIFICIAL INTELLIGENCE: THREATS AND OPPORTUNITIES

Encryption and data tools can help security teams detect and respond
to threats more quickly and efficiently.
protection b. Predictive analytics: AI-driven predictive analytics
Protecting sensitive data, both at rest and in transit, is can be used to forecast potential cyberattacks by
crucial to mitigating the risks associated with AI-driven analyzing historical data and identifying patterns
cyber threats: that may indicate an impending threat. This allows
organizations to take proactive measures to
1. Data encryption: Encrypt sensitive data using strong mitigate risks before they materialize, resulting in
encryption algorithms to render it unreadable to a more robust security posture.
unauthorized parties.
2. AI-powered incident response and remediation
2. Secure data storage: Store sensitive data in secure
locations, such as encrypted databases or hardware a. Security orchestration, automation, and r
security modules (HSMs), to reduce the risk of esponse (SOAR): AI-driven SOAR platforms can
unauthorized access or tampering. help organizations streamline their incident
response processes by automating tasks, such
3. Secure communication channels: Utilize secure as log analysis, data correlation and alert
communication protocols, such as HTTPS and TLS, to prioritization. By automating these tasks, security
protect data transmitted between the application and teams can respond to incidents more effectively
its users. and minimize the potential impact of a
security breach.

AI-driven security b. AI-driven forensics and root cause analysis:

solutions: Harnessing AI algorithms can assist in the digital forensics


process by automating the analysis of large
the power of AI for amounts of data and identifying patterns or

protection connections that may indicate the origin of a


cyber-attack. This can help security teams
pinpoint the root cause of a breach and implement
As AI technology continues to advance, it is also being
targeted remediation measures to prevent
leveraged to develop innovative security solutions that
future attacks.
can help organizations and individuals defend against
the ever-evolving cyber threat landscape. AI-driven 3. AI-enhanced User and Entity Behavior Analytics
security tools and techniques offer various benefits, (UEBA)
such as improved threat detection, faster response times
and enhanced adaptability. Here are some examples of a. User risk profiling: AI-driven UEBA tools can
AI-driven security solutions: analyze user behavior to identify potential security
risks, such as compromised credentials or insider
1. AI-based threat detection and analysis threats. By creating risk profiles for individual
users, AI algorithms can help organizations
a. Anomaly detection: AI algorithms can analyze
detect and mitigate threats that might otherwise
large volumes of data from network traffic, user
go unnoticed.
behavior and system logs to identify unusual
patterns or deviations from the norm. These b. Adaptive authentication: AI-enhanced
anomalies may indicate potential security threats, authentication systems can use machine learning
such as unauthorized access or data exfiltration. algorithms to assess user behavior and context,
By flagging these anomalies in real-time, AI-driven

36
adjusting the level of authentication required 3. Strengthen authentication and access control
based on the perceived risk. For example, if a user mechanisms to prevent unauthorized access to
logs in from an unfamiliar location or device, the applications and sensitive data. Multi-factor
AI-driven system might require additional authentication (MFA) and role-based access control
verification steps, such as MFA, to ensure the (RBAC) are crucial components of a robust access
user’s identity. control strategy.

By harnessing the power of AI-driven security solutions, 4. Prioritize encryption and data protection measures to
organizations and individuals can enhance their defenses safeguard sensitive data, both at rest and in transit.
against cyber threats and better protect their digital Utilize strong encryption algorithms, secure data
assets. However, it is essential to remain vigilant and storage solutions, and secure communication
continuously adapt to the evolving threat landscape, as protocols to minimize the risk of unauthorized access
malicious actors also leverage AI technology to develop and data breaches.
more sophisticated attacks.
5. Develop effective monitoring and incident response
capabilities to quickly detect and mitigate AI-driven
The importance of cyber threats. Employ security information and event

proactive AppSec in the


management (SIEM) systems, AI-driven anomaly
detection tools, and comprehensive incident response

age of AI plans to ensure your organization can respond


efficiently and effectively to security incidents.
In the face of rapidly evolving AI-driven threats, it is more
By emphasizing the importance of proactive AppSec and
critical than ever for developers to step up their game
implementing these key strategies, developers can create a
and implement proactive and robust AppSec measures.
stronger defense against the growing risks associated with
By adopting modern AppSec technologies and best
AI-driven cyber threats. As the cyber landscape continues
practices, developers can better protect their applications
to evolve, it is essential for developers to stay informed
against sophisticated attacks that leverage advanced
and adopt the latest security measures to protect their
AI techniques.
applications and safeguard the sensitive data they handle.
Some key takeaways for developers to consider when
By staying informed of emerging trends, investing in
protecting their applications in a world of AI-driven cyber
AI-driven security solutions, fostering a security-aware
threats include:
culture, collaborating with the security community, and
1. Embrace modern AppSec technologies like IAST and developing a long-term security strategy, developers,
RASP, which offer superior protection compared with organizations, and individuals can better prepare for the
traditional security measures, such as WAFs. IAST challenges and opportunities presented by the future of
provides real-time vulnerability detection and AI-driven cybersecurity.
feedback, while RASP offers context-aware and
self-protective capabilities that help defend against
adaptive AI-powered attacks.

2. Implement secure development practices, such as


security by design, regular code reviews, and
comprehensive security testing. This proactive
approach to security will help identify and remediate
vulnerabilities before they can be exploited by
AI-driven cyber threats.

contrastsecurity.com 37
CYBERSECURITY AND ARTIFICIAL INTELLIGENCE: THREATS AND OPPORTUNITIES

SECTION V:
Preparing for the future of
AI-driven cybersecurity

38
Emerging trends in 5. Foster a security-aware culture: Creating a
security-aware culture within your organization is
AI-driven cybersecurity essential for mitigating the risks associated with
AI-driven cyber threats. This involves providing regular
1. AI-driven threat intelligence: As cyber threats become security training and awareness programs for
more sophisticated, AI-powered threat intelligence employees, promoting secure development practices,
tools are increasingly important for identifying and and encouraging a proactive approach to security.
analyzing new attack patterns and vulnerabilities.
By leveraging machine learning and natural language 6. Collaborate with the security community: As AI-driven
processing, these tools can help organizations stay cyber threats continue to evolve, collaboration
ahead of emerging threats and between organizations,
proactively strengthen their researchers and the security
security posture. community is crucial for
staying informed and
2. AI-based deception developing effective counter-
technologies: measures. Participate in
Deception technologies, such information-sharing initiatives,
as honeypots and traps, can be attend security conferences and
enhanced with AI to better detect engage with security experts to
and analyze attacker behavior. keep up to date with the latest
AI-driven deception technologies trends and best practices.
can provide valuable insights into
attackers’ techniques, helping 7. Develop a long-term security
organizations develop more strategy: To successfully
effective countermeasures. navigate the future of AI-driven
cybersecurity, organizations need
3. Adversarial AI: Adversarial AI to develop a long-term security
techniques, which involve strategy that anticipates and
creating inputs designed to addresses emerging threats.
deceive or manipulate AI This involves regularly reviewing
systems, are becoming a and updating security policies,
significant concern in the cybersecurity landscape. procedures and technologies, as well as investing in
Defending against adversarial AI attacks will require ongoing security research and development.
new approaches and tools to ensure the integrity and
reliability of AI systems.

4. Invest in AI-driven security solutions: Organizations


should consider investing in AI-driven security tools
and solutions to stay ahead of the evolving threat
landscape. These tools can help automate threat
detection, analysis and response, enabling
organizations to more effectively defend against
AI-driven cyber threats.

contrastsecurity.com 39
CYBERSECURITY AND ARTIFICIAL INTELLIGENCE: THREATS AND OPPORTUNITIES

SECTION VI:
Legal and ethical considerations
in AI-driven cybersecurity

40
As AI technologies become increasingly integrated into cybersecurity, it is
essential to consider the legal and ethical implications that may arise. What
follows are some of the key legal and ethical considerations surrounding
the use of AI in cybersecurity, as well as recommendations for addressing
these concerns.

Data privacy and Transparency and


protection explainability
1. Compliance with data protection regulations: As 1. Providing transparency in AI decision-making: Due to
AI-driven security solutions often require large the complexity of AI algorithms, understanding and
amounts of data to function effectively, organizations explaining their decision-making processes can be
must ensure they are in compliance with relevant data challenging. However, organizations should strive to
protection regulations, such as the General Data provide as much transparency as possible, particularly
Protection Regulation (GDPR) and the California when AI-driven security tools are used to make critical
Consumer Privacy Act (CCPA). This involves obtaining decisions that may impact users or customers.
necessary consents, implementing data minimization
2. Developing explainable AI solutions: To increase
techniques, and ensuring data is securely stored
transparency and trust in AI-driven security tools,
and processed.
organizations should consider investing
2. Addressing biases in AI algorithms: in explainable AI solutions that provide
AI algorithms can inadvertently insights into the reasoning behind their
perpetuate biases if they are trained decisions. This can help users and
on biased or unrepresentative data stakeholders better understand the
sets. Organizations should actively actions taken by AI-driven security
work to identify and mitigate tools and ensure that they are in line
potential biases in their AI-driven with organizational policies and ethical
security tools to prevent unfair or guidelines.
discriminatory outcomes. There are
resources that can help, such as the
Brookings Institute’s framework
for algorithmic hygiene, which
identifies some specific causes of
biases and employs best practices
to identify and mitigate them.1

1. Brookings Institution: “Algorithmic bias detection and mitigation: Best practices and policies to reduce consumer harms,” Nicol Turner
Lee, Paul Resnick and Genie Barton, May 2019.

contrastsecurity.com 41
CYBERSECURITY AND ARTIFICIAL INTELLIGENCE: THREATS AND OPPORTUNITIES


Special note:
Will an AI keep your secrets?

In April 2023, it was widely reported that confidential


information from South Korean megacorporation
Samsung was leaked as the result of employee
usage of ChatGPT. Reportedly, in three cases,
individual employees uploaded confidential
information such as source code and internal
meeting notes to GPT in order for the AI to help the
employee with work tasks. In turn, this data became
part of GPT’s training data set and is now available
to users around the world who ask the right
questions of GPT.

Leaks like this aren’t just happening with corporate


secrets; they also entail personal privacy. Along
those lines, in April 2023, Italy became the first
government to ban the usage of ChatGPT under the
premise that it violated personal privacy laws.
The Italian regulatory body responsible for the
decision said that there “appears to be no legal basis
underpinning the massive collection and processing
of personal data in order to ‘train’ the algorithms on
which the platform relies.”

42
I asked my friend Michelle Legal liability and
Dennedy, CEO of Privacy Code responsibility
and author of The Privacy 1. Establishing clear lines of responsibility: As AI-driven
Engineer’s Manifesto, “Can AI security tools become more autonomous, determining
who is legally responsible for their actions can become
systems be trusted to keep our complicated. Organizations should establish clear

secrets?” lines of responsibility for the decisions and actions


taken by their AI-driven security solutions, including
defining the roles of developers, operators and users.
She answered philosophically, 2. Addressing potential legal liabilities: Organizations
“I think your question knows the should work with legal experts to identify potential
legal liabilities associated with the use of AI-driven
answer — nope. It currently security tools and develop strategies for mitigating

cannot. The same way a banana these risks. This may include implementing robust
monitoring and oversight mechanisms, as well as
cannot become a slice of pizza. ensuring that AI-driven security tools adhere to

If we want a system to behave a relevant legal frameworks and industry standards.

certain way, we have to design it


that way. And sometimes, a
Ethical considerations
1. Balancing security and privacy: While AI-driven
banana can become banana security tools can help organizations protect their
bread but it is always a banana.” networks and data, it is essential to strike a balance
between security and privacy. This involves carefully
considering the potential impact of AI-driven security
Privacy and security policies measures on user privacy and ensuring that these
measures are proportionate and necessary.
are in for a major upgrade as
2. Promoting fairness and equity: Organizations should
this world of AI algorithms actively work to ensure that their AI-driven security
quickly expands. tools do not unfairly target or discriminate against
specific groups or individuals. This involves
considering the potential ethical implications of
AI-driven security measures and working to promote
fairness and equity in their implementation.

contrastsecurity.com 43
CYBERSECURITY AND ARTIFICIAL INTELLIGENCE: THREATS AND OPPORTUNITIES

By considering and addressing the legal and ethical


implications associated with the use of AI in cybersecurity,
organizations can not only protect their networks and
data but also ensure that they do so in a responsible and
ethically sound manner. This will help build trust in
AI-driven security solutions and contribute to a safer,
more secure digital environment for all.

44
CYBERSECURITY AND ARTIFICIAL INTELLIGENCE: THREATS AND OPPORTUNITIES

CONCLUSION:
Navigating the AI-driven
cybersecurity landscape

contrastsecurity.com
45 45
CYBERSECURITY AND ARTIFICIAL INTELLIGENCE: THREATS AND OPPORTUNITIES

To navigate the AI-driven cybersecurity landscape 6. Develop a long-term security strategy: Anticipate and
successfully, it is important to: address emerging threats by regularly reviewing
and updating security policies, procedures and
1. Understand the impact of AI on cybersecurity:
technologies, and investing in ongoing security
Recognize both the opportunities provided by
research and development.
AI-driven security tools and the challenges posed
by AI-powered adversaries. 7. Consider legal and ethical implications: Ensure that
the use of AI in cybersecurity aligns with relevant
2. Stay informed of AI advancements: Keep up to date
data protection regulations, ethical guidelines and
with the latest trends, technologies and research in
organizational policies.
AI and cybersecurity to anticipate and adapt to
emerging threats. By following these guidelines and adapting to the rapidly
changing AI-driven cybersecurity landscape, developers,
3. Invest in AI-driven security solutions: Utilize
organizations, and individuals can better protect their
cutting-edge security tools, such as IAST and RASP,
digital assets and contribute to a safer, more secure
to effectively defend against AI-powered attacks and
digital environment for all. As AI technologies continue to
stay ahead of the evolving threat landscape.
advance, it is essential to remain vigilant, learn from the

4. Foster a security-aware culture: Encourage a experiences of others, and work together to build a more

proactive approach to security within your resilient and secure digital world.

organization, promote secure development practices,


and provide regular security training and awareness
programs for employees.

5. Collaborate with the security community: Engage


with security experts, researchers, and the broader
community to share information, learn from
others, and develop effective countermeasures
against AI-driven cyber threats.

46
CYBERSECURITY AND ARTIFICIAL INTELLIGENCE: THREATS AND OPPORTUNITIES

APPENDICES:

contrastsecurity.com
47 47
CYBERSECURITY AND ARTIFICIAL INTELLIGENCE: THREATS AND OPPORTUNITIES

Appendix A: fine-tuned to generate conversational responses and


provide useful insights in a wide range of domains.
The history and The development of ChatGPT has opened up numerous
development of ChatGPT opportunities for AI-powered applications, including
customer support, content generation, education and
The development of ChatGPT, an advanced AI language tutoring, and cybersecurity. For instance, ChatGPT can be
model, is rooted in the progress of natural language used to build intelligent chatbots and virtual assistants
processing (NLP) and deep learning. that provide efficient and accurate customer support. Its
ability to generate contextually relevant and coherent text
ChatGPT is a product of OpenAI, an AI research
makes it valuable for creating articles, blog posts and other
organization that aims to develop and promote friendly
forms of written content. In the education sector, ChatGPT
AI for the benefit of humanity. OpenAI has been at the
can be employed as an AI tutor, providing personalized
forefront of AI research, producing numerous cutting-edge
assistance and guidance to students in various subjects.
models and tools. ChatGPT is based on the GPT (Generative
The advanced language understanding capabilities of
Pre-trained Transformer) architecture, which is a product
ChatGPT can also be utilized to analyze and detect
of years of research and development in NLP and deep
phishing emails, social engineering attacks and other
learning.
text-based cyber threats.
The first iteration of the GPT architecture, GPT-1, was
The development of ChatGPT is a testament to the
introduced in 2018. GPT-1 was based on the transformer
rapid advancements in AI research and the potential for
architecture, which was proposed by Vaswani et al. in
AI-driven solutions to transform industries, including
a paper titled “Attention is All You Need.” GPT-1
cybersecurity. As AI models like ChatGPT continue to
demonstrated the potential of using unsupervised
evolve and improve, it is crucial to stay informed about
pre-training to generate human-like text. Building upon
their capabilities and implications in order to harness their
the success of GPT-1, OpenAI released GPT-2 in 2019.
benefits responsibly and effectively.
GPT-2 marked a significant improvement in terms of
model size and performance, with 1.5 billion parameters.
This version of the model gained widespread attention due
to its ability to generate coherent and contextually relevant
text passages.

In 2020, OpenAI unveiled GPT-3, a groundbreaking


model with 175 billion parameters. GPT-3 demonstrated
an unprecedented level of performance in a wide range of
NLP tasks, including translation, summarization and
question-answering. GPT-3’s release sparked a new wave
of interest in AI-powered language models and their
potential applications across various industries.

ChatGPT is based on the GPT-4 architecture, an even more


advanced version of the GPT series. With a larger number
of parameters and improved training techniques, ChatGPT
exhibits even better performance in generating human-like
text and understanding context. This model has been

48
Appendix B: Stable Diffusion Image Generation technology, as we know
it today, is the result of significant advancements in the
The history and understanding and implementation of diffusion models.

development of Stable These advancements have led to more stable and


efficient training processes, as well as higher-quality
Diffusion image generation compared with earlier models.

The Stable Diffusion Image Generation Technology is an The core idea behind Stable Diffusion Image Generation
innovative approach to creating high-quality images technology is to model the process of image generation
using deep learning techniques and has the potential to as a diffusion process, where the image is gradually
revolutionize the field of computer vision and artificial constructed over time. This approach allows for better
intelligence. control over the generated image’s quality and diversity,
leading to more realistic and visually appealing results.
Stable Diffusion Image Generation technology stems from
the broader field of generative modeling in machine Stable Diffusion Image Generation technology has a wide
learning. Generative models are designed to learn the range of potential applications, including:
underlying patterns and structures within data and use
1. Art and design: This technology can be used to create
this knowledge to generate new, realistic samples. In the
unique and visually striking artwork or design ele-
context of image generation, these models aim to create
ments for various purposes, such as advertisements,
visually appealing and diverse images that closely
web design or digital art.
resemble real-world objects and scenes.
2. Data augmentation: By generating realistic and diverse
One of the key breakthroughs in generative modeling came
images, Stable Diffusion Image Generation technology
with the introduction of Generative Adversarial Networks
can be employed to augment existing datasets,
(GANs) by Ian Goodfellow and his colleagues in 2014.
improving the performance of machine learning
GANs consist of two neural networks, a generator and a
models in tasks like object recognition and
discriminator, that work together to produce high-quality
segmentation.
images. The generator creates new images, while the
discriminator evaluates their quality and provides 3. Video game development: Stable Diffusion Image
feedback to the generator, leading to a continuous Generation technology can be used to create realistic
improvement in the generated images. and diverse environments, characters and objects for
video games, enhancing the overall gaming experience.
Despite the success of GANs in generating visually
appealing images, they have faced some challenges, such 4. Simulation and virtual reality: The technology can
as mode collapse and training instability. To address be utilized to generate realistic and immersive
these issues, researchers began exploring alternative environments for simulations and virtual reality
approaches to image generation, which ultimately led to experiences, with applications in training, education
the development of Stable Diffusion Image Generation and entertainment.
technology.
The development of Stable Diffusion Image Generation
The concept of diffusion models for image generation technology is an exciting milestone in the field of AI and
can be traced back to the work of researchers such as computer vision. As the technology continues to evolve
Sohl-Dickstein et al., who introduced a scalable method and improve, it is essential to stay informed about its
for generating samples from a diffusion process in 2015. capabilities and potential applications to harness its
This work laid the foundation for further exploration of benefits effectively and responsibly.
diffusion-based generative models.

contrastsecurity.com 49
CYBERSECURITY AND ARTIFICIAL INTELLIGENCE: THREATS AND OPPORTUNITIES

Appendix C: c. edX: “AI for Cybersecurity” by RITx: This course


explores the application of AI techniques in
Recommended resources cybersecurity, including intrusion detection,

and further reading malware analysis and data protection.

d. Udemy: “Practical Ethical Hacking – The Complete


Course” by Heath Adams: This hands-on course
teaches ethical hacking techniques and tools,
1. Books
providing a solid foundation for understanding and
a. “Artificial Intelligence: A Guide to Intelligent testing the security of computer systems.
Systems” by Michael Negnevitsky: This book
3. Websites and blogs
provides a comprehensive introduction to artificial
intelligence, covering various AI techniques and a. Krebs on Security (https://krebsonsecurity.com):
applications, including their use in cybersecurity. A leading cybersecurity news website, featuring
in-depth articles and analysis on the latest
b. “The Hundred-Page Machine Learning Book” by
cybersecurity threats, trends and technologies.
Andriy Burkov: A concise and practical guide to
machine learning, perfect for those looking to b. AI Alignment (https://ai-alignment.com):
understand the fundamentals and real-world A blog that discusses the ethical and safety
applications of machine learning techniques. considerations of AI, including topics related to
AI-driven cybersecurity.
c. “Data Science for Cybersecurity” by Igor
Faynberg, Hyoungshick Kim and Paul Wallich: c. Dark Reading (https://www.darkreading.com):
This book explores how data science techniques A popular online resource for cybersecurity
can be applied to cybersecurity, providing insights professionals, providing news, insights and
into threat analysis, risk management and analysis on the latest developments in the
security optimization. industry.

d. “Black Hat Python: Python Programming for d. OpenAI Blog (https://openai.com/blog): The official
Hackers and Pentesters” by Justin Seitz: blog of OpenAI, featuring research updates,
A practical guide to using Python for cybersecurity technical discussions and insights on AI
tasks, including developing custom tools for technologies and their potential impact on society.
penetration testing and vulnerability analysis.
e. OWASP (https://owasp.org): The Open Web
2. Online courses Application Security Project is an international
non-profit organization dedicated to improving the
a. Coursera: “Cybersecurity and Its Ten Domains”
security of software through community-led
by the University System of Georgia: This course
open-source projects, documentation, tools
provides a comprehensive overview of the various
and resources.
domains of cybersecurity, including network
security, software security and cryptography. f. Contrast Security (https://www.contrastsecurity.
com): A leading provider of AppSec solutions,
b. bCoursera: “Introduction to Artificial Intelligence
including IAST and RASP technologies. The
(AI)” by IBM: A beginner-friendly course that cov-
company’s website offers insights, case studies
ers the basics of AI, including machine learning,
and resources on modern AppSec practices.
neural networks, and natural language processing.

50
4. Research papers and journals • CAPTCHA (Completely Automated Public Turing test
to tell Computers and Humans Apart): A test used on
a. IEEE Transactions on Dependable and Secure
websites to differentiate between human users and
Computing (TDSC): A leading journal focusing on
automated bots, typically requiring users to solve
research related to dependable and secure
visual or audio challenges to prove they are human.
computing systems, including AI-driven
cybersecurity. • Data Breach: An incident where unauthorized
individuals gain access to sensitive and confidential
b. Journal of Machine Learning Research (JMLR):
information, potentially compromising the privacy and
A top machine learning journal that publishes
security of users or organizations.
high-quality research papers on various aspects
of machine learning and its applications. • Deep Learning: A subset of machine learning that uses
artificial neural networks with multiple layers to model
c. arXiv.org: A free, open-access repository of
and solve complex problems, enabling the AI system to
preprints for research papers in various fields,
learn from vast amounts of data.
including computer science, machine learning and
cybersecurity. Search for relevant papers using • Encryption: The process of converting data into a code
keywords such as “AI,” “cybersecurity” and or ciphertext to prevent unauthorized access, ensuring
“machine learning.” the confidentiality and integrity of the data.

By exploring these resources and further reading • Endpoint Security: The practice of securing devices
materials, you can deepen your understanding of (endpoints) such as desktops, laptops, smartphones,
AI-driven cybersecurity, stay informed about the latest and tablets that connect to an organization’s network,
developments in the field and enhance your skills in protecting them from cyber threats and potential
protecting digital assets from evolving threats. data breaches.

• GAN (Generative Adversarial Network): A type of


Appendix D: deep learning architecture where two neural

Glossary
networks, a generator and a discriminator, are trained
in competition with each other, producing realistic
synthetic data.
• Adversarial AI: Techniques used to create inputs
designed to deceive or manipulate AI systems, • GPT (Generative Pre-trained Transformer): A type of
potentially causing them to behave unexpectedly or deep learning model architecture used primarily for
produce incorrect outputs. natural language processing tasks, such as text
generation, translation, and summarization.
• AI (Artificial Intelligence): The development of
Developed by OpenAI, the GPT series has evolved
computer systems that can perform tasks that
through multiple iterations, with each version
typically require human intelligence, such as learning,
demonstrating significant improvements in terms of
reasoning, problem-solving, perception and language
performance and capabilities. The GPT models use
understanding.
unsupervised pre-training and rely on the transformer
• APT (advanced persistent threat): A sophisticated architecture, which was first introduced in the
and well-resourced cyber threat actor, often paper “Attention is All You Need” by Vaswani et al.
state-sponsored, that conducts long-term, targeted The transformer architecture is characterized by its
attacks on specific organizations or individuals to use of self-attention mechanisms, which help the
gather intelligence or achieve strategic objectives. model to understand and generate contextually rele-

contrastsecurity.com 51
CYBERSECURITY AND ARTIFICIAL INTELLIGENCE: THREATS AND OPPORTUNITIES

vant and coherent text. GPT models, including ChatGPT, • Reinforcement Learning: A type of machine
have been widely adopted for various AI-powered learning that focuses on training models to make
applications, such as virtual assistants, chatbots and optimal decisions based on trial and error, with the
content generation. AI system learning from its interactions with the
environment.
• IAST (Interactive Application Security Testing):
A security testing technology that combines aspects of • Secure Software Development Life Cycle (SSDLC):
static and dynamic AppSec testing, providing real-time A framework for incorporating security best practices
feedback on potential security vulnerabilities in and processes throughout the entire Software
an application. Development Life Cycle, ensuring that applications are
designed, developed and maintained with security
• Incident Response: The process of identifying,
in mind.
analyzing and responding to security incidents,
including containing the threat, investigating the • SIEM (Security Information and Event Management):
cause and taking steps to prevent future incidents. A technology that collects, analyzes and correlates
security event data from various sources, enabling
• IoT (Internet of Things): A network of interconnected
organizations to detect and respond to security
devices, sensors and software that communicate and
incidents more effectively.
exchange data with each other, often without human
intervention, enabling greater automation and • Social Engineering: The use of deception and
efficiency across various industries. manipulation to trick individuals into revealing
sensitive information or performing actions that
• Machine Learning: A subset of AI that focuses on
compromise their security, often relying on human
developing algorithms that enable computers to learn
psychology and trust.
from and make predictions or decisions based on data,
without being explicitly programmed to do so. • Stable Diffusion: An advanced image generation
technology based on diffusion models, a class of
• NLP (Natural Language Processing): A branch of AI
generative modeling techniques in machine learning.
that focuses on enabling computers to understand,
The core idea behind Stable Diffusion is to model the
interpret, and generate human language, allowing for
process of image generation as a diffusion process,
more natural interactions between humans
where the image is gradually constructed over time.
and machines.
This approach allows for better control over the

• Phishing: A cyberattack where attackers use generated image’s quality and diversity, leading to

fraudulent emails or websites to deceive victims into more realistic and visually appealing results. Stable

revealing sensitive information or installing malware Diffusion Image Generation technology has been

on their devices. developed to address challenges faced by other


generative models, such as Generative Adversarial
• RASP (Runtime Application Self-Protection): A security Networks (GANs), including mode collapse and training
technology that monitors an application’s behavior instability. Potential applications for Stable Diffusion
during runtime and can detect, block or mitigate technology include art and design, data augmentation,
security threats in real time, providing a more video game development, and simulation and virtual
proactive approach to AppSec. reality experiences.

52
• Threat Intelligence: The collection, analysis, and testing, protection, serverless, supply chain, application
dissemination of information about potential or programming interfaces (APIs) and languages help
existing cyber threats, helping organizations enterprises achieve true DevSecOps transformation
understand and respond to risks more effectively. and compliance.

• Two-Factor Authentication (2FA): A security measure Contrast protects against major cybersecurity attacks for
that requires users to provide two different forms of its customer base, which represents some of the largest
identification to access an account or system, brand-name companies in the world, including BMW, AXA,
adding an extra layer of security to protect against Zurich, NTT, Sompo Japan and The American Red Cross,
unauthorized access. as well as numerous other leading global Fortune 500
enterprises. Contrast partners with global organizations
• WAF (Web Application Firewall): A security solution
such as AWS, Microsoft, IBM, GuidePoint Security, Trace3,
that monitors and filters HTTP traffic between a
Deloitte and Carahsoft, to seamlessly integrate and
web application and the internet, protecting web
achieve the highest level of security for customers.
applications from various types of attacks, such as
SQL injection and cross-site scripting. The growing demand for the world’s only platform for code
security has landed the company on some of the most
• Zero-Day Vulnerability: A previously unknown security
prestigious lists, including the Inc. 5000 List of America’s
vulnerability in a software or hardware system, which
Fastest-Growing Companies and the Deloitte Technology
can be exploited by attackers before the vendor has
Fast 500 List of fastest-growing companies.
had a chance to develop and release a patch to fix
the issue. Learn more: https://www.contrastsecurity.com

About Contrast Security


A world-leading code security platform company purposely
built for developers to get secure code moving swiftly and
trusted by security teams to protect business applications.
Developers, security and operations teams quickly secure
code across the complete Software Development Life Cycle
(SDLC) with Contrast to protect against today’s targeted
AppSec attacks.

Founded in 2014 by cybersecurity industry veterans,


Contrast was established to replace legacy AppSec
solutions that cannot protect modern enterprises. With
today’s pressures to develop business applications at
increasingly rapid paces, the Contrast Secure Code
Platform defends and protects against full classes of
Common Vulnerabilities and Exposure (CVEs). This allows
security teams to avoid spending time focusing on false
positives so as to remediate true vulnerabilities faster.
Contrast’s platform solutions for code assessment,

contrastsecurity.com 53
CYBERSECURITY AND ARTIFICIAL INTELLIGENCE: THREATS AND OPPORTUNITIES

About the Author


Steve is currently the Chief Product Officer at Contrast Security. Today his team
is responsible for Engineering, Product Management, Product Marketing and
Product Design for all products.

Steve has over 25 years of experience developing and marketing products at


multibillion-dollar technology companies such as Citrix, Oracle and Sun
Microsystems. Prior to Contrast, Steve was the Vice President of Product
Management for Citrix Cloud, where he led the transformation of Citrix products
from traditional on-prem to software as a service (SaaS). At Oracle, he led core
engineering for a billion-dollar product line of systems management software.
During his time at Sun Microsystems, Steve was an early member of the team
that developed the Java computer programming system, the most widely used
set of software development tools in history.

He founded his first AI company, called Emergent Behavior, in 1992.


More recently, he has led product teams using natural language processing to
control IoT devices and pioneered a new business leveraging massive datasets
and machine learning to deliver User and Entity Behavior Analytics (UEBA) for
Security and Performance at Citrix.

Steve is the author of “Java Platform Performance: Strategies and Tactics” and
“The Father/Daughter Guide to Cryptocurrency Mining.” He is a popular speaker
on future of work and artificial intelligence topics and has recently presented
at The Churchill Club, Silicon Valley Leadership Group, DLA Piper Global
Technology Summit, IDG Agenda, SAP TechEd and WSJ Tech D.Live. He holds a
degree in Business Administration from the University of San Diego and a
second-degree black belt from the American Taekwondo Association.

54
CYBERSECURITY AND ARTIFICIAL INTELLIGENCE: THREATS AND OPPORTUNITIES
CYBERSECURITY AND ARTIFICIAL INTELLIGENCE: THREATS AND OPPORTUNITIES

contrastsecurity.com

You might also like