Recently, Information Risk Management (IRM) published its 2019 Risky Business Report. This report shows the results of polling decision-makers in the cybersecurity and risk management sectors to get their expert opinions on things like the changing threat landscape, corporate decision-making about cybersecurity and other relevant topics.
Two important things covered in the report were cybersecurity experts believe the upcoming 5G network could pose new cybersecurity risks, and that Artificial Intelligence (AI) could introduce new cybersecurity concerns as well. So, cybersecurity experts are concerned about the growing risks this duo will bring along with it. Here's a look at how the report outlines 5G and AI in cybersecurity.
The 5G Network Expected to Increase Cybersecurity Risks
The IRM (Information Risk Management) report found that 83% of respondents believe that developments in 5G wireless technology will create cybersecurity challenges for their organizations. More specifically, Their top three 5G-related concerns are a greater risk of attacks on the Internet of Things (IoT) networks, a wider attack surface and a lack of security by design in 5G hardware and firmware.
Shamik Mishra of Altran Group specifically mentioned how the increased deployment of distributed network data centers would increase the size of the attack surface associated with the 5G network. Moreover, the presence of new and third-party applications once 5G arrives will increase the possibility of threats.
The vulnerabilities in 5G appear to go beyond wireless, introducing risks around virtualized and cloud-native infrastructure. So, 5G's arrival requires different techniques used to handle cybersecurity risks.
Most Respondents Think AI Will Impact Their Cybersecurity Strategies
Another highlight of the Information Risk Management (IRM) report is that 86% of respondents think Artificial Intelligence (AI) will impact their cybersecurity strategies over the next five years, as AI systems are integrated into core enterprise security functions. It also concluded that the top three AI applications that respondents said they would consider implementing as part of their cybersecurity strategy are Network intrusion detection and prevention, Fraud detection and Secure user authentication.
However, The report points out that AI in cybersecurity can be "a double-edged sword." It recognizes the worthiness of using AI for some cybersecurity requirements such as to detect fraudulent bank account activity. Also, the report brings up how cybercriminals will use AI to carry out more sophisticated attacks and clarifies that at least one such incident has occurred already.
Companies should not overlook how AI could enhance their cybersecurity plans, particularly if they struggle with not having enough cybersecurity team members to assess and categorize all the threats a company faces. Enterprises must simultaneously stay informed of known or suspected ways that cybercriminals may utilize AI for more successful, widespread attacks.
Using 5G and AI in Cybersecurity Requires Careful Planning
As the Information Risk Management (IRM) study shows, 5G and AI requires thinking about cybersecurity differently than before and planning for the challenges they'll bring. Also, Organizations unaware of the potential impact of 5G and AI technologies on cybersecurity open themselves up to far reaching consequences.
So, now is the time for enterprises to work closely with their cybersecurity teams to develop and design 5G and AI products that place cybersecurity front and center. Waiting could leave enterprises scrambling to catch up and make them exceptionally vulnerable to preventable risks.
The report also shows that executives increasingly recognize the challenges facing enterprise security teams. 91% of respondents say that increased cybersecurity awareness at the C-level has translated into their decision-making. But most cybersecurity decisions are still based on cost, according to respondents, indicating a lack of understanding of the financial and reputational impact of cyberattacks.
I hope you find worthful information in this article. If you have any questions then please mention in the comments section and I will get back to you and stay tuned with my blog to learn interesting things related to cybersecurity and hacking.
Comments
Post a Comment