Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Operational Security

08:00 PM
Curtis Franklin
Curtis Franklin
Curt Franklin

Gartner Analysts See AI Augmenting Security

Gartner analysts don't think AI will replace humans in security; instead it will be a critical piece of a better security infrastructure.

ORLANDO -- Gartner Symposium ITXpo -- For many years, the honor of first keynote at Gartner Symposium ITXpo has gone to Peter Sondergaard, VP of research at the consulting giant. On Monday morning, he stood on stage and introduced the concepts that will be driving conversations here for the next four days -- and away from Orlando, for at least the next year.

Sondergaard touched on a number of topics during his address, and my colleague Scott Ferguson has a roundup of the cloud side of the speech in an article on Enterprise Cloud News. I want to focus on one part of his speech -- the part dealing with security and professional skills.

Let's start with some bad news: You probably don't have as many skilled security professionals as you'd like to have. Experienced security pros are in short supply across the IT industry. Now we'll continue with some news that's even worse: The odds seem pretty good that you'll never catch up with your security skills shortage. The rate of growth and change in the security industry are such that the supply is unlikely to ever catch up to demand.

According to Sondergaard, it's not all bad news, though. In his opinion, enterprise IT shops are going to be saved -- by artificial intelligence.

Before you roll your eyes too hard, take a moment to consider what Sondergaard means when he talks about AI in this context. While he admits that AI will almost certainly take some jobs from humans, Sondergaard says that he believes AI will be a net job creator. And part of that job creation function will be the extent to which AI augmenting human capabilities allows humans to do more for more organizations.

There are a lot of people working on AI-augmented security and some who believe that AI will become a requirement as a front-line technology just to keep up with the increasingly powerful and sophisticated threats from hackers. The question, really, is whether AI will become the basis of security, or a tool to help human analysts in the fight for more secure systems.

You're invited to attend Light Reading's 11th annual Future of Cable Business Services event. Join us in New York on November 30 for the premier independent conference focusing on the cable industry's continuing efforts in the commercial services market – all cable operators and other communications service providers get in free. 

In the view of Gartner analysts, AI is most effective when it's used to augment human intelligence, not replace human effort. Whether that augmentation takes the form of rapidly sorting through vast volumes of data that's only mildly interesting, making correlations that involve more variables than humans could consider in real time, suggesting courses of actions to human engineers when presenting threat data or a combination of all three, using AI as a tool is the course of action that makes the most sense to Gartner.

The skills shortage (and AI's role in alleviating the pain) is far from the only thing that Gartner analysts have to say about security. There's more to come from Gartner Symposium ITXpo. In the meantime, what do you think about AI and security? Should we turn our defenses over to artificial intelligence or is AI best seen as a tool to help make human security specialists better? The comment section awaits -- let us know!

Related posts:

— Curtis Franklin is the editor of SecurityNow.com. Follow him on Twitter @kg4gwa.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Manchester United Suffers Cyberattack
Dark Reading Staff 11/23/2020
As 'Anywhere Work' Evolves, Security Will Be Key Challenge
Robert Lemos, Contributing Writer,  11/23/2020
Cloud Security Startup Lightspin Emerges From Stealth
Kelly Sheridan, Staff Editor, Dark Reading,  11/24/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-11-28
An issue was discovered in the Linux kernel before 5.2.6. On NUMA systems, the Linux fair scheduler has a use-after-free in show_numa_stats() because NUMA fault statistics are inappropriately freed, aka CID-16d51a590a8c.
PUBLISHED: 2020-11-28
An issue was discovered in __split_huge_pmd in mm/huge_memory.c in the Linux kernel before 5.7.5. The copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check, aka CID-c444eb564fb1.
PUBLISHED: 2020-11-28
An issue was discovered in mm/mmap.c in the Linux kernel before 5.7.11. There is a race condition between certain expand functions (expand_downwards and expand_upwards) and page-table free operations from an munmap call, aka CID-246c320a8cfe.
PUBLISHED: 2020-11-28
An issue was discovered in kmem_cache_alloc_bulk in mm/slub.c in the Linux kernel before 5.5.11. The slowpath lacks the required TID increment, aka CID-fd4d9c7d0c71.
PUBLISHED: 2020-11-28
An issue was discovered in romfs_dev_read in fs/romfs/storage.c in the Linux kernel before 5.8.4. Uninitialized memory leaks to userspace, aka CID-bcf85fcedfdd.