{"id":26912,"date":"2019-04-03T15:20:25","date_gmt":"2019-04-03T13:20:25","guid":{"rendered":"https:\/\/www.getsmarter.com\/blog\/?p=26912"},"modified":"2025-09-23T14:09:23","modified_gmt":"2025-09-23T12:09:23","slug":"opportunities-and-risks-of-ai-in-cybersecurity","status":"publish","type":"post","link":"https:\/\/www.getsmarter.com\/blog\/opportunities-and-risks-of-ai-in-cybersecurity\/","title":{"rendered":"Big Data: the Risks and Opportunities of AI in Cybersecurity"},"content":{"rendered":"\n<p>There has been a lot of fuss about big data, and on how the data streams have been increasing exponentially. In order to fully understand this massive digital growth, Cybersecurity Ventures has framed this by predicting, \u201cthe total amount of data stored in the cloud\u2026 will be 100 times greater in 2021 than it\u2019s today\u201d. Globally, digital content is expected to encompass 96 billion terabytes (96 zettabytes) by 2020.<sup>1<\/sup><\/p>\n\n\n\n<h2>The big picture on big data and artificial intelligence<\/h2>\n\n\n\n<p>In an ever-connected world \u2013 the Internet of Things (IoT) will experience a \u2018Big Data Big Bang\u2019, where the sheer amount of online devices that might be online by 2020 is mind-boggling.<sup>2<\/sup> It\u2019s certainly not inconceivable that the global embrace of <a href=\"https:\/\/www.getsmarter.com\/blog\/what-is-artificial-intelligence\/\" target=\"_blank\" rel=\"noopener noreferrer\">artificial intelligence (AI)<\/a> has steadily been gaining traction. The link between AI and big data is apparent when you examine big data\u2019s role in empowering AI.<sup>3<\/sup><\/p>\n\n\n\n<figure class=\"wp-block-pullquote\"><blockquote><p>Cybersecurity Ventures has framed this by predicting, \u201cthe total amount of data stored in the cloud\u2026 will be 100 times greater in 2021 than it\u2019s today.\u201d <\/p><\/blockquote><\/figure>\n\n\n<div>\n            <!-- Responsive picture tag -->\n        <picture class=\"picture-block\">\n            <source media=\"(min-width: 768px)\" srcset=\"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2019\/03\/SLOT-33-Q4_infographic_03_desktop_970px.png\" >\n            <img decoding=\"async\" src=\"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2019\/03\/SLOT-33-Q4_infographic_04_mobile_400px_02.png\" alt=\"\">\n        <\/picture>\n    <\/div>\n\n\n<p style=\"text-align: center;\"><strong>With this much, often confidential, data being produced \u2013 what is being done to protect it?<\/strong><\/p>\n\n\n\n<h2>THE RISKS<\/h2>\n\n\n\n<p>AI is becoming a powerful force in organisations, especially in this digital age, due in part to technology unlocking the potential of big data with AI capabilities.<sup>5<\/sup> If that thought doesn\u2019t give you pause, it should. While AI can be used for good, it\u2019s a tool \u2013 and conversely, it can also be used to commit harmful acts.<\/p>\n\n\n\n<h3>1. Privacy breaches<\/h3>\n\n\n\n<p>\u201cIt\u2019s not just a coincidence that privacy issues dominated 2018. These events are symptoms of larger, profound shifts in the world of data privacy and security that have major implications for how organisations think about and manage both,\u201d says Andrew Burt, Chief Privacy Officer and Legal Engineer at Immuta.<sup>6<\/sup><\/p>\n\n\n<div>\n            <!-- Responsive picture tag -->\n        <picture class=\"picture-block\">\n            <source media=\"(min-width: 768px)\" srcset=\"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2019\/03\/SLOT-33-Q4_infostat_01_desktop_970px.png\" >\n            <img decoding=\"async\" src=\"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2019\/03\/SLOT-33-Q4_infostat_01_mobile_400px.png\" alt=\"\">\n        <\/picture>\n    <\/div>\n\n\n<p>The modern world is experiencing an overlap of privacy and security concerns where AI plays a big role in boosting the viability of both digital protection and cybercrime.<sup>8<\/sup> Privacy is a top priority for businesses, especially now \u2013 whereas before, this was paramount to individuals. Big data has changed the availability of so-called private information, by making it at risk of data breaches. According to the 2019 Official Annual Cybercrime Report by Cybersecurity Ventures, sponsored by Herjavec Group, \u201cCybercrime is the greatest threat to every company in the world, and one of the biggest problems with mankind.\u201d<sup>9<\/sup><\/p>\n\n\n\n<h3>2. Cyber attacks<\/h3>\n\n\n\n<p>A cybercrime, cyber threat or <a href=\"https:\/\/www.getsmarter.com\/blog\/how-to-detect-a-cyberattack\/\" target=\"_blank\" rel=\"noopener noreferrer\">cyber attack<\/a> is an illegal activity involving a computer or a network-connected device like an iPad or cell phone.<sup>10<\/sup> The cyber attacker or cyber hacker has the intention of gaining access to a network, stealing confidential data, using the computer as an accessory to a crime, or downloading software to a person\u2019s device without their knowledge.<\/p>\n\n\n<div>\n            <!-- Responsive picture tag -->\n        <picture class=\"picture-block\">\n            <source media=\"(min-width: 768px)\" srcset=\"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2019\/03\/SLOT-33-Q4_infostat_01_desktop_970px-1.png\" >\n            <img decoding=\"async\" src=\"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2019\/03\/SLOT-33-Q4_infostat_01_mobile_400px-1.png\" alt=\"\">\n        <\/picture>\n    <\/div>\n\n\n<p>Steve Morgan, founder and editor-in-chief of Cybersecurity Ventures agrees, \u201cRansomware has emerged as the default mode of attack for cybercriminals in 2018.\u2019\u2019<sup>12<\/sup><\/p>\n\n\n\n<p>The different types of cyber hacking include:<\/p>\n<ul>\n<li>DoS attacks<\/li>\n<li>Drive-by downloads<\/li>\n<li>Malvertising<\/li>\n<li>Malware<\/li>\n<li>Man in the middle<\/li>\n<li>Password attacks<\/li>\n<li>Phishing<\/li>\n<li>Ransomware<\/li>\n<li>Rogue software<\/li>\n<\/ul>\n\n\n\n<h2>How AI is being used in cyber threats and cyber hacking<\/h2>\n\n\n\n<p>The threat of cybercrime is increasing, due to population growth and access to the internet:<sup>13<\/sup><\/p>\n\n\n<div>\n            <!-- Responsive picture tag -->\n        <picture class=\"picture-block\">\n            <source media=\"(min-width: 768px)\" srcset=\"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2019\/03\/SLOT-33-Q4_infographic_04_desktop_970px.png\" >\n            <img decoding=\"async\" src=\"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2019\/03\/SLOT-33-Q4_infographic_03_mobile_400px_01.png\" alt=\"\">\n        <\/picture>\n    <\/div>\n\n\n<p>In 2017, artificial intelligence technology was detected by Darktrace Incorporated, in a cyber attack that occurred in India.<sup>14<\/sup> What the malware managed to do was use AI to figure out normal user behaviour patterns used in the network; mimic the behaviour of the network, systems and the users of the system; and then hide in the background making it difficult to detect. Although the cyber attack was detected in the early stages, according to Chief Executive of Darktrace, Nicole Eagan, this is just the beginning \u2013 these are just the <strong>early signs of machine learning and artificial intelligence being used to attempt (and soon succeed at committing) cybercrimes.<\/strong><sup>15<\/sup><\/p>\n\n\n\n<h2>THE OPPORTUNITIES<\/h2>\n\n\n\n<h3>1. AI can improve cybersecurity<\/h3>\n\n\n\n<p>Put simply, this is a practice concerned with the confidentiality and availability of information (such as data), as well as the protection of that information. The level of cyber protection needed depends on whether you\u2019re dealing with an amateur cyber hacker or a dangerous criminal group. The good news is the emergence of using AI to combat cyber attacks could reinforce and improve cyber protection strategies \u2013 leading to businesses saving a lot of money.<\/p>\n\n\n\n<p>As we work our way through the 21st century, it\u2019s imperative for every business, whether they\u2019re a small enterprise or a large corporation, to have a cyber protection leadership plan in place. \u201cCybersecurity has emerged as a hot commodity in the tech sector in 2018 thanks to fresh revelations, new regulations and a rise in data breaches.\u201d<sup>16<\/sup><\/p>\n\n\n\n<p>As more people learn to utilize the benefits of AI, others are learning to exploit it by aiding cyber attacks. Harold Moss, Senior Director of Strategy and Business Development at Akamai Technologies, and a Guest Expert on the Cybersecurity: Managing Risk in the Information Age online short course from Harvard\u2019s Office of the Vice Provost for Advances in Learning, in association with HarvardX, describes cyber threats like this:<\/p>\n\n\n\n<p>\u201cIt\u2019s almost like kidnappers \u2013 kidnappers watch where people go, and then they say \u2018okay, <strong>I know this is a point where you\u2019re going to be vulnerable, that\u2019s where I\u2019m going to get you<\/strong>\u2019. Cyber hackers are no different.\u201d<\/p>\n\n\n\n<h3>2. How AI is revolutionising risk management and digital protection<\/h3>\n\n\n\n<p>The extent of this cyber threat in the US is compared to an out-of-control epidemic.<sup>17<\/sup> A supervisory special agent with the Federal Bureau of Investigation genuinely believes that all private data on US citizens has already been stolen through cybercrime, and is available for sale on the dark web<sup>18<\/sup> \u2013 a notorious part of the internet that isn\u2019t indexed by search engines, that illegally sells items to other criminals, which is only accessible through special software.<\/p>\n\n\n\n<p>These types of private data could include:<\/p>\n<ul>\n<li>Links<\/li>\n<li>Networks<\/li>\n<li>Architecture protocols<\/li>\n<li>The state of network nodes<\/li>\n<\/ul>\n\n\n\n<p>AI will possibly be the most effective tool for interpreting this data to continually identify present vulnerabilities and to consequently, take action to counterattack and prevent attacks in the future.<sup>19<\/sup> Just two years on and we\u2019re already seeing the <strong>use of AI to improve issues like risk management, and to detect anomalies, network cyber attacks, and malicious applications or software.<\/strong><\/p>\n\n\n\n<p>New AI algorithms use machine learning to adapt over time. The latest updates to malware and other cyber attacks have become difficult to detect using traditional digital security methods. As threats evolve, so should the security systems, as well as the individuals responsible for deploying these systems. By implementing the use of AI, digital security professionals will be able to free up a lot of their time to develop and improve current protection strategies. Chris Ganje, CEO and Co-founder of Amplyfi, a company offering products harnessing artificial intelligence and offering corporate strategic thinking, says:<\/p>\n\n\n\n<p>\u201cIn cybersecurity, AI can automatically identify potentially malicious software behaviour, attack vectors and related anomalies in real time, allowing a continuously adaptive defence mechanism to identify and shut down intrusions faster and easier than ever before. This technological advancement not only significantly reduces the number of cybersecurity breaches, but also empowers analysts to better focus their time and speeds up the process to identify breaches from hundreds of days to mere hours.\u201d<sup>20<\/sup><\/p>\n\n\n\n<figure class=\"wp-block-pullquote\"><blockquote><p>Cybersecurity has emerged as a hot commodity in the tech sector in 2018 thanks to fresh revelations, new regulations and a rise in data breaches.<\/p><\/blockquote><\/figure>\n\n\n\n<h4>Four digital security companies utilising AI:<\/h4>\n\n\n\n<ol>\n<li><strong>SparkCognition<\/strong><br>This US-based company creates artificial intelligence solutions to problems related to defence and cyber protection. SparkCognition offers DeepArmor, an antivirus product using AI to identify mutating viruses and detect new malware approaches.<sup>21<\/sup><\/li>\n<li><strong>Cylance<\/strong><br>The company\u2019s product line is based on the premise of blocking data breaches, and their product, CylancePROTECT uses AI technology to identify and stop malware. This unique product has an edge through \u201cPredictive Advantage\u201d, as it uses algorithms to determine how future cyber attacks will occur.<sup>22<\/sup><\/li>\n<li><strong>Appthority<\/strong><br>This company focuses on mobile cyber protection and uses artificial intelligence by providing customers with a platform to automatically detect and grade suspicious behaviour like malware, intellectual property exposure, and corporate data security breaches.<sup>23<\/sup><\/li>\n<li><strong>BehavioSec<\/strong><br>This behavioural biometric company monitors end-users\u2019 keystrokes and mouse movements to create digital fingerprints. This form of security ensures continuous authentication, makes it easier to detect anomalies, verifies customers, and prevents cyber attacks and fraud. The artificial intelligence technology can be deployed on a cloud-based system or on-site.<sup>24<\/sup><\/li>\n<\/ol>\n\n\n\n<h3>3. A rise in demand for digital security jobs<\/h3>\n\n\n\n<p><strong>In 2022, you can expect a 1.8 million shortage of digital security professionals in the global workforce.<\/strong><sup>25<\/sup> The 2017 results of the eighth Global Information Security Workforce Study were surveyed from over 19,000 information security professionals worldwide. People holding IT jobs need to recognise that these positions, by necessity, also include digital security responsibilities. Examples of such duties include: protecting and defending apps, data, devices, infrastructure, and people. Making the need for working professionals with expertise in cyber protection, more in demand than ever before.<sup>26<\/sup><\/p>\n\n\n\n<p>Although the emergence of artificial intelligence in the field of digital protection is predicted by many to become a double-edged sword. Having a continually-evolving <a href=\"https:\/\/www.getsmarter.com\/products\/uct-business-risk-management-online-short-course\" target=\"_blank\" rel=\"noopener noreferrer\">understanding of risk management<\/a> and current cyber hacking trends, is imperative to distinguish the vulnerabilities of your organisation.<\/p>\n\n\n\n<div id=\"accordion\">\n<div class=\"card\">\n<div id=\"headingOne\" class=\"card-header\">\n<h6 class=\"mb-0\"><button class=\"btn\" style=\"background-color: transparent;\" data-toggle=\"collapse\" data-target=\"#sources\" aria-expanded=\"true\" aria-controls=\"sources\"> <strong>Click here to view sources<\/strong> <\/button><\/h6>\n<\/div>\n<div id=\"sources\" class=\"collapse\" aria-labelledby=\"headingOne\" data-parent=\"#accordion\">\n<div class=\"card-body\">\n<ul class=\"mx-0\" style=\"list-style: none;\">\n\n<li class=\"mb-4\"><sup>1<\/sup> Morgan, S. (Dec, 2018). \u2018Cybercrime damages $6 trillion by 2021\u2019. Retrieved from <a href=\"https:\/\/cybersecurityventures.com\/cybercrime-damages-6-trillion-by-2021\/\" target=\"_blank\" rel=\"noopener noreferrer\"> Cybersecurity Ventures<\/a>.<\/li>\n\n<li class=\"mb-4\"><sup>2<\/sup> Morgan, S. (Dec, 2018). \u2018Cybercrime damages $6 trillion by 2021\u2019. Retrieved from <a href=\"https:\/\/cybersecurityventures.com\/cybercrime-damages-6-trillion-by-2021\/\" target=\"_blank\" rel=\"noopener noreferrer\"> Cybersecurity Ventures<\/a>.<\/li>\n\n<li class=\"mb-4\"><sup>3<\/sup> (2018). \u2018Big Data Executive Survey 2018\u2019. Retrieved from <a href=\"http:\/\/newvantage.com\/wp-content\/uploads\/2018\/01\/Big-Data-Executive-Survey-2018-Findings.pdf\" target=\"_blank\" rel=\"noopener noreferrer\"> NewVantage Partners<\/a>.<\/li>\n\n<li class=\"mb-4\"><sup>4<\/sup> (2018). \u2018Big Data Executive Survey 2018\u2019. Retrieved from <a href=\"http:\/\/newvantage.com\/wp-content\/uploads\/2018\/01\/Big-Data-Executive-Survey-2018-Findings.pdf\" target=\"_blank\" rel=\"noopener noreferrer\"> NewVantage Partners<\/a>.<\/li>\n\n<li class=\"mb-4\"><sup>5<\/sup> (2018). \u2018Big Data Executive Survey 2018\u2019. Retrieved from <a href=\"http:\/\/newvantage.com\/wp-content\/uploads\/2018\/01\/Big-Data-Executive-Survey-2018-Findings.pdf\" target=\"_blank\" rel=\"noopener noreferrer\"> NewVantage Partners<\/a>.<\/li>\n\n<li class=\"mb-4\"><sup>6<\/sup> Burt, A. (Jan, 2019) \u2018Privacy and cybersecurity are converging. Here\u2019s why that matters for people and for companies\u2019. Retrieved from <a href=\"https:\/\/hbr.org\/2019\/01\/privacy-and-cybersecurity-are-converging-heres-why-that-matters-for-people-and-for-companies\" target=\"_blank\" rel=\"noopener noreferrer\"> Harvard Business Review<\/a>.<\/li>\n\n<li class=\"mb-4\"><sup>7<\/sup> Morgan, S. (Oct, 2018). \u2018Top 5 Cybersecurity Facts, Figures, Predictions, And Statistics For 2019 To 2021\u2019. Retrieved from <a href=\"https:\/\/cybersecurityventures.com\/top-5-cybersecurity-facts-figures-predictions-and-statistics-for-2019-to-2021\/\" target=\"_blank\" rel=\"noopener noreferrer\"> Cybersecurity Ventures<\/a>.<\/li>\n\n<li class=\"mb-4\"><sup>8<\/sup> Burt, A. (Jan, 2019) \u2018Privacy and cybersecurity are converging. Here\u2019s why that matters for people and for companies\u2019. Retrieved from <a href=\"https:\/\/hbr.org\/2019\/01\/privacy-and-cybersecurity-are-converging-heres-why-that-matters-for-people-and-for-companies\" target=\"_blank\" rel=\"noopener noreferrer\"> Harvard Business Review<\/a>.<\/li>\n\n<li class=\"mb-4\"><sup>9<\/sup> (2019). \u2018The 2019 Official Annual Cybercrime Report\u2019. Retrieved from <a href=\"https:\/\/www.herjavecgroup.com\/the-2019-official-annual-cybercrime-report\/\" target=\"_blank\" rel=\"noopener noreferrer\"> Herjavec Group<\/a>.<\/li>\n\n<li class=\"mb-4\"><sup>10<\/sup> (2019). \u201811 ways to help protect yourself against cybercrime\u2019. Retrieved from <a href=\"https:\/\/us.norton.com\/internetsecurity-how-to-how-to-recognize-and-protect-yourself-from-cybercrime.html\" target=\"_blank\" rel=\"noopener noreferrer\"> Norton by Symantec<\/a>.<\/li>\n\n<li class=\"mb-4\"><sup>11<\/sup> Yogesh, B. (Dec, 2018). \u2018Cybersecurity trends 2018: Year of regulations and breaches\u2019. Retrieved from <a href=\"https:\/\/investingnews.com\/daily\/tech-investing\/cybersecurity-investing\/cybersecurity-trends\/\" target=\"_blank\" rel=\"noopener noreferrer\"> Cybersecurity Investing News<\/a>.<\/li>\n\n<li class=\"mb-4\"><sup>12<\/sup> Morgan, S. (Dec, 2018). \u2018Cybercrime damages $6 trillion by 2021\u2019. Retrieved from <a href=\"https:\/\/cybersecurityventures.com\/cybercrime-damages-6-trillion-by-2021\/\" target=\"_blank\" rel=\"noopener noreferrer\"> Cybersecurity Ventures<\/a>.<\/li>\n\n<li class=\"mb-4\"><sup>13<\/sup> Morgan, S. (Dec, 2018). \u2018Cybercrime damages $6 trillion by 2021\u2019. Retrieved from <a href=\"https:\/\/cybersecurityventures.com\/cybercrime-damages-6-trillion-by-2021\/\" target=\"_blank\" rel=\"noopener noreferrer\"> Cybersecurity Ventures<\/a>.<\/li>\n\n<li class=\"mb-4\"><sup>14<\/sup> Norton, S. (Nov, 2017). \u2018Era of AI-powered cyberattacks has started\u2019. Retrieved from <a href=\"https:\/\/blogs.wsj.com\/cio\/2017\/11\/15\/artificial-intelligence-transforms-hacker-arsenal\/\" target=\"_blank\" rel=\"noopener noreferrer\"> The Wall Street Journal<\/a>.<\/li>\n\n<li class=\"mb-4\"><sup>15<\/sup> Norton, S. (Nov, 2017). \u2018Era of AI-powered cyberattacks has started\u2019. Retrieved from <a href=\"https:\/\/blogs.wsj.com\/cio\/2017\/11\/15\/artificial-intelligence-transforms-hacker-arsenal\/\" target=\"_blank\" rel=\"noopener noreferrer\"> The Wall Street Journal<\/a>.<\/li>\n\n<li class=\"mb-4\"><sup>16<\/sup> Yogesh, B. (Dec, 2018). \u2018Cybersecurity trends 2018: Year of regulations and breaches\u2019. Retrieved from <a href=\"https:\/\/investingnews.com\/daily\/tech-investing\/cybersecurity-investing\/cybersecurity-trends\/\" target=\"_blank\" rel=\"noopener noreferrer\"> Cybersecurity Investing News<\/a>.<\/li>\n\n<li class=\"mb-4\"><sup>17<\/sup> Morgan, S. (Dec, 2018). \u2018Cybercrime damages $6 trillion by 2021\u2019. Retrieved from <a href=\"https:\/\/cybersecurityventures.com\/cybercrime-damages-6-trillion-by-2021\/\" target=\"_blank\" rel=\"noopener noreferrer\"> Cybersecurity Ventures<\/a>.<\/li>\n\n<li class=\"mb-4\"><sup>18<\/sup> Guccione, D. (Jan, 2019). \u2018What is the dark web? How to access it and what you&#8217;ll find\u2019. Retrieved from <a href=\"https:\/\/www.csoonline.com\/article\/3249765\/data-breach\/what-is-the-dark-web-how-to-access-it-and-what-youll-find.html\" target=\"_blank\" rel=\"noopener noreferrer\"> CSO<\/a>.<\/li>\n\n<li class=\"mb-4\"><sup>19<\/sup> (February, 2018). \u2018AI will underpin cybersecurity\u2019. Retrieved from <a href=\"https:\/\/www.cybersecurityintelligence.com\/blog\/ai-will-underpin-cybersecurity--3153.html\" target=\"_blank\" rel=\"noopener noreferrer\"> Cybersecurity Intelligence<\/a>.<\/li>\n\n<li class=\"mb-4\"><sup>20<\/sup> (February, 2018). \u2018AI will underpin cybersecurity\u2019. Retrieved from <a href=\"https:\/\/www.cybersecurityintelligence.com\/blog\/ai-will-underpin-cybersecurity--3153.html\" target=\"_blank\" rel=\"noopener noreferrer\"> Cybersecurity Intelligence<\/a>.<\/li>\n\n<li class=\"mb-4\"><sup>21<\/sup> (2019). \u2018Products\u2019. Retrieved from <a href=\"https:\/\/www.sparkcognition.com\/products\/\" target=\"_blank\" rel=\"noopener noreferrer\"> SparkCognition<\/a>.<\/li>\n\n<li class=\"mb-4\"><sup>22<\/sup> SE Labs. (Mar, 2018). \u2018Predictive malware response test\u2019. Retrieved from <a href=\"https:\/\/www.cylance.com\/content\/dam\/cylance-web\/en-us\/resources\/knowledge-center\/resource-library\/reports\/SELabsPredictiveMalwareResponseTestMarch2018Report.pdf\" target=\"_blank\" rel=\"noopener noreferrer\"> Cylance<\/a>.<\/li>\n\n<li class=\"mb-4\"><sup>23<\/sup> (2019). \u2018Mobile Threat Center\u2019. Retrieved from <a href=\"https:\/\/www.appthority.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"> Appthority<\/a>.<\/li>\n\n<li class=\"mb-4\"><sup>24<\/sup> (2019). \u2018Solutions\u2019. Retrieved from <a href=\"https:\/\/www.behaviosec.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"> BehavioSec<\/a>.<\/li>\n\n<li class=\"mb-4\"><sup>25<\/sup> (2017). \u20182017 Global Information Security Workforce Study\u2019. Retrieved from <a href=\"https:\/\/www.iamcybersafe.org\/wp-content\/uploads\/2017\/06\/Europe-GISWS-Report.pdf\" target=\"_blank\" rel=\"noopener noreferrer\"> Centre for Cybersafety and Education (ISC)2<\/a>.<\/li>\n\n<li class=\"mb-4\"><sup>26<\/sup> Khoja, R. (Dec, 2017). \u2018How AI is the future of cybersecurity\u2019. Retrieved from <a href=\"https:\/\/www.infosecurity-magazine.com\/next-gen-infosec\/ai-future-cybersecurity\/\" target=\"_blank\" rel=\"noopener noreferrer\"> Info Security Group<\/a>.<\/li>\n\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>There has been a lot of fuss about big data, and on how the data streams have been increasing exponentially. In order to fully understand this massive digital growth, Cybersecurity Ventures has framed this by predicting, \u201cthe total amount of data stored in the cloud\u2026 will be 100 times greater in 2021 than it\u2019s today\u201d. [&hellip;]<\/p>\n","protected":false},"author":74,"featured_media":40289,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[1],"tags":[120],"article-format":[],"class_list":["post-26912","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-career-advice","tag-systems-technology"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Opportunities and Risks of AI in Cybersecurity | GetSmarter Blog<\/title>\n<meta name=\"description\" content=\"AI is becoming a powerful force, causing an overlap of privacy and security. Learn the risks AI can present in cybersecurity as well as the opportunities.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.getsmarter.com\/blog\/opportunities-and-risks-of-ai-in-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Big Data: the Risks and Opportunities of AI in Cybersecurity\" \/>\n<meta property=\"og:description\" content=\"AI is becoming a powerful force, causing an overlap of privacy and security. Learn the risks AI can present in cybersecurity as well as the opportunities.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.getsmarter.com\/blog\/opportunities-and-risks-of-ai-in-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"GetSmarter Blog\" \/>\n<meta property=\"article:published_time\" content=\"2019-04-03T13:20:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-23T12:09:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2019\/04\/Getsmarter_Big-Data-the-Risks-and-Opportunities-of-AI-in-Cybersecurity_Blog_1500X844.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1500\" \/>\n\t<meta property=\"og:image:height\" content=\"844\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Shameel Mohanlal\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"GetSmarter Staff\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.getsmarter.com\\\/blog\\\/opportunities-and-risks-of-ai-in-cybersecurity\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.getsmarter.com\\\/blog\\\/opportunities-and-risks-of-ai-in-cybersecurity\\\/\"},\"author\":{\"name\":\"Shameel Mohanlal\",\"@id\":\"https:\\\/\\\/www.getsmarter.com\\\/blog\\\/#\\\/schema\\\/person\\\/527df7e5676f2bfa7c943e1653764bff\"},\"headline\":\"Big Data: the Risks and Opportunities of AI in Cybersecurity\",\"datePublished\":\"2019-04-03T13:20:25+00:00\",\"dateModified\":\"2025-09-23T12:09:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.getsmarter.com\\\/blog\\\/opportunities-and-risks-of-ai-in-cybersecurity\\\/\"},\"wordCount\":1859,\"image\":{\"@id\":\"https:\\\/\\\/www.getsmarter.com\\\/blog\\\/opportunities-and-risks-of-ai-in-cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.getsmarter.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/Getsmarter_Big-Data-the-Risks-and-Opportunities-of-AI-in-Cybersecurity_Blog_1500X844.jpg\",\"keywords\":[\"Systems &amp; technology\"],\"articleSection\":[\"Career Advice\"],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.getsmarter.com\\\/blog\\\/opportunities-and-risks-of-ai-in-cybersecurity\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.getsmarter.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/Getsmarter_Big-Data-the-Risks-and-Opportunities-of-AI-in-Cybersecurity_Blog_1500X844.jpg\",\"contentUrl\":\"https:\\\/\\\/www.getsmarter.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/Getsmarter_Big-Data-the-Risks-and-Opportunities-of-AI-in-Cybersecurity_Blog_1500X844.jpg\",\"width\":1500,\"height\":844},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.getsmarter.com\\\/blog\\\/opportunities-and-risks-of-ai-in-cybersecurity\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.getsmarter.com\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/www.getsmarter.com\\\/blog\"}]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Opportunities and Risks of AI in Cybersecurity | GetSmarter Blog","description":"AI is becoming a powerful force, causing an overlap of privacy and security. Learn the risks AI can present in cybersecurity as well as the opportunities.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.getsmarter.com\/blog\/opportunities-and-risks-of-ai-in-cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"Big Data: the Risks and Opportunities of AI in Cybersecurity","og_description":"AI is becoming a powerful force, causing an overlap of privacy and security. Learn the risks AI can present in cybersecurity as well as the opportunities.","og_url":"https:\/\/www.getsmarter.com\/blog\/opportunities-and-risks-of-ai-in-cybersecurity\/","og_site_name":"GetSmarter Blog","article_published_time":"2019-04-03T13:20:25+00:00","article_modified_time":"2025-09-23T12:09:23+00:00","og_image":[{"width":1500,"height":844,"url":"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2019\/04\/Getsmarter_Big-Data-the-Risks-and-Opportunities-of-AI-in-Cybersecurity_Blog_1500X844.jpg","type":"image\/jpeg"}],"author":"Shameel Mohanlal","twitter_card":"summary_large_image","twitter_misc":{"Written by":"GetSmarter Staff","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.getsmarter.com\/blog\/opportunities-and-risks-of-ai-in-cybersecurity\/#article","isPartOf":{"@id":"https:\/\/www.getsmarter.com\/blog\/opportunities-and-risks-of-ai-in-cybersecurity\/"},"author":{"name":"Shameel Mohanlal","@id":"https:\/\/www.getsmarter.com\/blog\/#\/schema\/person\/527df7e5676f2bfa7c943e1653764bff"},"headline":"Big Data: the Risks and Opportunities of AI in Cybersecurity","datePublished":"2019-04-03T13:20:25+00:00","dateModified":"2025-09-23T12:09:23+00:00","mainEntityOfPage":{"@id":"https:\/\/www.getsmarter.com\/blog\/opportunities-and-risks-of-ai-in-cybersecurity\/"},"wordCount":1859,"image":{"@id":"https:\/\/www.getsmarter.com\/blog\/opportunities-and-risks-of-ai-in-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2019\/04\/Getsmarter_Big-Data-the-Risks-and-Opportunities-of-AI-in-Cybersecurity_Blog_1500X844.jpg","keywords":["Systems &amp; technology"],"articleSection":["Career Advice"],"inLanguage":"en-US"},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.getsmarter.com\/blog\/opportunities-and-risks-of-ai-in-cybersecurity\/#primaryimage","url":"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2019\/04\/Getsmarter_Big-Data-the-Risks-and-Opportunities-of-AI-in-Cybersecurity_Blog_1500X844.jpg","contentUrl":"https:\/\/www.getsmarter.com\/blog\/wp-content\/uploads\/2019\/04\/Getsmarter_Big-Data-the-Risks-and-Opportunities-of-AI-in-Cybersecurity_Blog_1500X844.jpg","width":1500,"height":844},{"@type":"BreadcrumbList","@id":"https:\/\/www.getsmarter.com\/blog\/opportunities-and-risks-of-ai-in-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.getsmarter.com"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/www.getsmarter.com\/blog"}]}]}},"_links":{"self":[{"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/posts\/26912","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/users\/74"}],"replies":[{"embeddable":true,"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/comments?post=26912"}],"version-history":[{"count":58,"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/posts\/26912\/revisions"}],"predecessor-version":[{"id":52138,"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/posts\/26912\/revisions\/52138"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/media\/40289"}],"wp:attachment":[{"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/media?parent=26912"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/categories?post=26912"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/tags?post=26912"},{"taxonomy":"article-format","embeddable":true,"href":"https:\/\/www.getsmarter.com\/blog\/wp-json\/wp\/v2\/article-format?post=26912"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}