• About
  • Subscribe
  • Contact
Thursday, June 5, 2025
    Login
FutureCISO
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
No Result
View All Result
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
No Result
View All Result
FutureCISO
No Result
View All Result
Home Process Incident Response

AI, security fundamentals touted as key to combat advanced threats from AI

Eileen Yu by Eileen Yu
March 14, 2025
Photo by Tima Miroshnichenko: https://www.pexels.com/photo/close-up-view-of-system-hacking-in-a-monitor-5380664/

Photo by Tima Miroshnichenko: https://www.pexels.com/photo/close-up-view-of-system-hacking-in-a-monitor-5380664/

Share on FacebookShare on Twitter

Artificial intelligence (AI) is not only changing how businesses operate, but also how they should be running their cybersecurity processes, including the need to never overlook the basics.

Recent security incidents highlight a fundamental truth that, the approach to cybersecurity must evolve as AI reshapes the industry, said Edward Chen, deputy chief executive of national cyber resilience for Cyber Security Agency of Singapore, who was speaking at Palo Alto Networks’ Ignite on Tour conference in Singapore this week.

Chen noted that whitehat hacker Gal Nagli had identified the first publicly known critical vulnerability in ChatGPT in March 2023. Nagli’s team at Wiz Research this January also uncovered a vulnerability in China’s GenAI (generative AI) platform DeepSeek.

Pointing to the DeepSeek vulnerability, Chen noted that the fault stemmed from unsecured open ports in the Chinese GenAI platform’s database that could have provided unauthorised access.

“This wasn’t some complex flaw hidden deep within an advanced AI model. Instead, it was a basic security misstep,” he said. “The kind we often overlook in our rush to innovate.”

It underscores the need to focus on the technologies needed to combat threats and safeguard systems, according to the Singapore government official.

While large-scale AI-powered autonomous attacks had yet to occur, he said recent developments in phishing and malware were “troubling”.

For instance, more than 10% of phishing email in Singapore last year contained AI-generated content, he noted, adding that these often were highly personalised and contextually relevant messages that were difficult to distinguish from legitimate ones.

He cited further research from Unit 42, which revealed that LLMs could be used to generate malware variants capable of evading detection 88% of the time.

With new AI threats comes need for AI as defence

Increasing AI adoption also would create a larger and more complex attack surface to secure. “Every AI-powered system, or device, is now a potential attack target,” Chen said.

He added that AI also was creating new classes of attacks, including prompt injection attacks, which manipulate AI models with deceptive inputs so they would leak sensitive data or execute harmful commands.

Related:  Use AI-driven security to navigate risks and workforce challenges

While efforts are made to update tools, such as with input sanitisation and adversarial training, the industry still is in the early stages of understanding and fully addressing such threats, he said.

“At the same time, we cannot ignore traditional attack vectors -- misconfigurations, unpatched systems, and weak credentials. These remain the easiest ways for attackers to break in,” Chen said, noting that DeekSeek’s vulnerability was the result of a simple security misconfiguration, rather than an AI-specific attack. “This tells us two things: First, we must secure AI. Second, we must not forget the basics, too.”

Chen said: “We must fight AI with AI. After all, you don’t bring a knife to a gunfight. If cybercriminals are adopting AI-driven tactics, we must do the same.”

AI, he said, already was transforming malware analysis, with a November 2023 report from VirusTotal stating AI-driven detection could identify complex malicious scripts with up to 70% greater accuracy than traditional methods.

Agentic AI also could support key functions, including threat analysis and real-time decision making, and take defensive actions, he added. “While human oversight remains essential, AI-driven autonomous response systems will be game-changers,” he said.

Need for data to combat cyber threats

So, too, will data, which plays an important role in enhancing detection and defence capabilities,  according to Simon Green, Palo Alto Networks' Asia-Pacific Japan president.

He touted the company's 20-year history, during which it had been collecting data on cyber threats and activities. It continues to build on this database, adding eight to nine petabytes of data each day, Green said.

With 90,000 customers worldwide, the security vendor analyses 500 billion events each day, blocking 11.3 billion malicious transactions and detecting more than 2.5 million new threats.

Cybersecurity activities are growing at scale and the volume will further accelerate with AI, Green noted. It underscores the need for tools to evolve to have real-time and automation capabilities, powered by AI and data, so companies can manage and keep pace amid growing cyber threats, he added.

Related:  Drivers for the worldwide cybersecurity technology market growth

Palo Alto Networks' large database, for one, fuels its machine learning and AI models, feeding them with contextual data and enabling the delivery of the vendor’s Precision AI framework, he said.

The threat detection and prevention system uses deep learning and GenAI to analyse and learn from historical as well as real-time threat data. It predicts attack patterns based on nuanced indicators, creating predictive models that identify anomalies, and generates insights to enhance decision making, according to the security vendor.

AI now is used to orchestrate attacks, making to more difficult for businesses to detect legitimate transactions, and also have accelerated the scale of attacks, said Steven Scheurmann, Palo Alto Networks' Asean regional vice president, in an interview with FutureCISO on the sidelines of the event.

Echoing Green’s message about the role data plays, Scheurmann said context-based datasets also will be critical in detecting anomalies specific to verticals, such as financial services and healthcare.

It highlights the need for industry-specific LLMs (large language models) and AI models built on data that carry contextual information, he said. This will enable the systems to better detect unusual patterns and identify abnormal user behaviours, he added.

The added layers of context-based analytics will be critical in attacks using deepfakes, for instance, where requests for fund transfers from a particular company executive during that time of day are “normal” behaviour.

Amid the focus on AI and automation, though, organisations should not overlook the basics in cybersecurity, Scheurmann stressed. Misconfiguration, poorly managed credentials, and unpatched vulnerabilities remain common issues, he said.

These fundamentals are paramount even before companies begin adopting emerging technologies, such as GenAI, he added.

Tags: Artificial Intelligencecybersecuritydata analyticsgenerative AIthreat detection and response (TDR)
Eileen Yu

Eileen Yu

Eileen is currently an independent tech journalist and content specialist, providing analysis of key market developments across the Asian region and helping enterprises craft their communications plan. She also moderates panel discussions and roundtables, as well as provides media training to help senior executives better manage press interviews. Eileen has worked with corporate clients in markets, such as cybersecurity and enterprise software, and non-tech including financial services and logistics. She also has planned high-level panel and roundtable discussions and has been an invited speaker on online media. On CXOCIETY, she contributes articles across the four CXOCIETY brands -- FutureCIO, FutureCISO, FutureIoT, and FutureCFO -- covering key industry developments impacting the Asia-Pacific region, including cybersecurity, AI, data management, governance, workforce modernisation, and supply chain. Eileen has more than 25 years of industry experience at established media platforms, including ZDNET in Singapore, where she led the tech site's Asian editorial team and blogger network. Before her stint at ZDNET, she was assistant editor at Computer Times for Singapore Press Holdings and deputy editor of Computerworld Singapore. With her extensive industry experience, Eileen has navigated discussions on key trending topics including cybersecurity, artificial intelligence, quantum computing, edge/cloud computing, and regulatory policies. Eileen trained under the Journalism department at The University of Queensland, Australia. There, she earned a Bachelor of Arts (Honours) degree in Journalism, with a thesis titled, To Censor or Not: The Great Singapore Dilemma.

No Result
View All Result

Recent Posts

  • Platform to enhance software development security
  • Check Point launches enhanced branch office security gateways
  • BarracudaOne to offer a unified approach to cybersecurity
  • AI agents present new security challenges in Southeast Asia
  • Red Hat launches Enterprise Linux 10 for hybrid security

Categories

  • Blogs
  • Compliance and Governance
  • Culture and Behaviour
  • Cybersecurity careers
  • Data Protection
  • Endpoint Security
  • Incident Response
  • Network Security
  • People
  • Process
  • Resources
  • Risk Management
  • Technology
  • Training and awarenes
  • Videos
  • Webinars and PodChats
  • White Papers

Strategic Insights for Chief Information Officers

FutureCISO serves the interests of the Chief Information Security Officer (CISO) and the information security profession. Its purpose is to provide relevant and timely industry insights around all things important to security professionals and organisations that recognize and value the importance of protecting the organisation’s data and its customers’ privacy.

Cxociety Media Brands

  • FutureIoT
  • FutureCFO
  • FutureCIO

Categories

  • Privacy Policy
  • Terms of Use
  • Cookie Policy

Copyright © 2024 Cxociety Pte Ltd | Designed by Pixl

Login to your account below

or

Not a member yet? Register here

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
Login

Copyright © 2024 Cxociety Pte Ltd | Designed by Pixl