Nima Baiati, Executive Director & GM, Commercial Cybersecurity Solutions, Lenovo

Perhaps not since the invention of the printing press has any technology been poised to revolutionize every aspect of life and business, at least from a promise standpoint. The potential for disruption and increased productivity in cybersecurity is immense, as enterprises continue to face rising pressures internally and externally.

Cybersecurity has always been a challenging game, and it won’t get any easier. One concerning aspect is the potential for Generative AI (GAI) to empower malicious individuals with advanced capabilities. This may lead to easier compromise of passwords, exploitation of vulnerabilities through deepfakes in social engineering, and greater ingenuity in malware creation, resulting in an acceleration of cyberattacks.

However, there is a silver lining. The same AI tools available to potential attackers can also be utilized by defenders. This means that an increasing number of cybersecurity activities can be automated, making them more efficient. AI is being leveraged for improved risk analysis, threat detection, and automating alerts and responses. It also plays a role in balancing security and user experience (UX) by analyzing behavioral data and simplifying verification processes, as an overly secure gate becomes impractical.

The efficiency gains from AI-enabled cybersecurity tools can help address the critical shortage of skilled labor in the field. Even smaller organizations, such as small to medium-sized businesses (SMBs) and educational institutions lacking the resources of larger enterprises, can automate more security solutions and become more resilient targets. While technology advances, the foundational infrastructure of every organization’s security system will remain constant.

Train the Humans, Not Just AI

Even the best security defenses can be foiled by simple human mistakes. We talk about training AI models, but we often forget that people are the most crucial components of a robust cybersecurity strategy, not technology alone. For hackers, a misappropriated key is always more potent than a brute force attack.

In today’s world, organizations must prioritize building robust security cultures, particularly since the greatest challenge in securing systems and companies lies with people. Equipping employees with the necessary training and support is essential to maintain constant awareness of threats and remain observant against attacks. For example, the sophistication of social engineering phishing attacks, fueled by deepfakes, can be countered when employees adhere to proper protocols.

Security by design is even more critical than end-user vigilance. It is not enough for software to undergo security reviews; it should be built with security embedded throughout. Both device manufacturers and purchasers must make informed decisions based on security outcomes, rather than purely considering form, function, and cost. Original equipment manufacturers (OEMs) should ensure device protection throughout its lifecycle, including a transparent and secure supply chain, defending against threats like BIOS attacks, and ensuring data protection from the operating system to the cloud. Buyers who overlook security by design and rely too heavily on after-market or bolted-on security solutions should be aware of the risks they assume.

AI for the Future

The potential impact of AI knows no bounds. The ability to process vast amounts of data and make informed decisions at an exponential rate will revolutionize everything for everyone, similar to how the invention of the internal combustion engine and electricity propelled us forward.

This development is positive because there are significantly more individuals striving for positive outcomes than there are malicious actors seeking to steal data or cause harm. However, safeguarding our organizations and harnessing the benefits of AI requires good decision-making and an attentive approach.

Incorporating security intrinsically at every stage of development and deployment is crucial. Each organization will have its unique security needs, frameworks and specific threats that require a tailored approach. When evaluating devices, it becomes vital to integrate security across all layers including the supply chain, below the operating system and above the operating system.

Not all data can be protected equally, and the goal of achieving zero cybersecurity breaches is an unrealistic aspiration given the vast threat landscape. Therefore, business leaders and security experts must make strategic decisions regarding their primary concerns and how best to protect their assets. Ultimately, AI tools that support security-focused cultures and prioritize the right aspects will lead to more robust defenses.

The post The Evolution of AI in Cybersecurity appeared first on Cybersecurity Insiders.

The Navy Exchange Service‘s sale of Lenovo laptops at steep discounts and duty-free rates has raised concerns among U.S. lawmakers due to the manufacturer’s ties to the People’s Republic of China. There are apprehensions that these laptops could potentially contain pre-installed malware aimed at spying on users in Western countries. While currently, this is only an alert generating media attention, it has the potential to gain momentum rapidly, as any connection to China and data security tends to trend on Google within days.

Microsoft recently conducted a study that led to the conclusion that the trend of BYOD (Bring Your Own Device) should be renamed “bring your own disaster.” The study found that a significant percentage of these devices were responsible for causing issues within corporate computer networks. Microsoft’s research revealed that 80-90% of ransomware attacks in the past year originated from unmanaged devices. These findings were detailed in Microsoft’s Digital Defense Report for 2023, and it anticipates a global increase of such attacks by 200%.

According to a threat report released by SecureWorks, ransomware groups have become more efficient in deploying file-encrypting malware within just 24 hours of hacking their targets. This marks a significant reduction from the previously estimated period of 6-7 days, and it’s attributed to the increased sophistication of malware developed by cybercriminals.

BlackBaud, a South Carolina-based cloud computing company, has agreed to pay $49.6 million to approximately 13,000 customers across 49 states and the District of Columbia to settle litigation stemming from a 2020 ransomware attack. During this breach, hackers managed to access customer data, including social security numbers and bank account information. Notably, this settlement includes a $3 million payment to the Security Exchange Services (SEC) and $900,000 to Massachusetts.

In an alarming revelation, the United States Department of State has admitted to being unaware of the extent of its in-house cybersecurity risks. The federal agency attributes this lack of awareness to outdated hardware and software systems. It also raises concerns about Chinese vendors supplying equipment through cross-linked trade treaties with countries like Malaysia and Singapore. This means that Chinese products could enter the American market with different labels, linking them to companies in Singapore and Malaysia but ultimately part of China’s trade consortium.

According to a report by internet security company WatchGuard Technologies, there has been a decline in malware infections despite an increase in campaigns aimed at spreading malware. The report emphasizes that while malware distribution has decreased, the sophistication of attacks has risen to new heights.

The post Cybersecurity news headlines trending on Google appeared first on Cybersecurity Insiders.

PC manufacturer Lenovo has been forced to push out a security update to more than two dozen of its laptop models, following the discovery of high severity vulnerabilities that could be exploited by malicious hackers. Security researchers at ESET discovered flaws in 25 of its laptop models - including IdeaPads, Slims, and ThinkBooks - that could be used to disable the UEFI Secure Boot process. Read more in my article on the Tripwire State of Security blog.