{"id":20344,"date":"2024-03-06T04:51:05","date_gmt":"2024-03-06T04:51:05","guid":{"rendered":"https:\/\/interface.media\/?p=20344"},"modified":"2024-03-06T04:54:21","modified_gmt":"2024-03-06T04:54:21","slug":"man-not-machine-why-humans-might-be-the-best-cybersecurity-tool-in-the-fight-against-genai","status":"publish","type":"post","link":"https:\/\/interface.media\/blog\/2024\/03\/06\/man-not-machine-why-humans-might-be-the-best-cybersecurity-tool-in-the-fight-against-genai\/","title":{"rendered":"Man, not machine: why humans might be the best cybersecurity tool in the fight against GenAI"},"content":{"rendered":"\n<p>Over the past two decades, the pace of technological development has increased noticeably. One might argue that nowhere is this more true than in the cybersecurity field. The technologies and techniques used by attackers have grown increasingly sophisticated\u2014almost at the same rate as the importance of the systems and data they are trying to breach.\u00a0Now, generative AI poses quite possibly the biggest <a href=\"https:\/\/interface.media\/blog\/2024\/03\/06\/generative-ai-is-creating-hew-headaches-for-cybersecurity-teams\/\">cyber security threat<\/a> of the decade.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-generative-ai-throwing-gasoline-on-the-cybersecurity-fire-nbsp\">Generative AI: throwing gasoline on the cybersecurity fire&nbsp;<\/h3>\n\n\n\n<p>Locked in a desperate arms race, cybersecurity professionals now face a new challenge: the advent of publicly available generative artificial intelligence (AI). Generative AI tools like Chat-GPT have reached widespread adoption in recent years, with OpenAI\u2019s chatbot racking up <a href=\"https:\/\/explodingtopics.com\/blog\/chatgpt-users\">1.8 billion monthly users in December 2023<\/a>. According to <a href=\"https:\/\/www.salesforce.com\/news\/stories\/generative-ai-statistics\/\">data gathered by Salesforce<\/a>, three out of five workers (61%) already use or plan to use generative AI, even though almost three-quarters of the same workers (73%) believe generative AI introduces new security risks.<\/p>\n\n\n\n<p>Generative AI is also already proving to be a useful tool for hackers. In a recent test, hacking experts at IBM\u2019s X-Force pitted human-crafted phishing emails against those written by generative AI. The results? Humans are <a href=\"https:\/\/securityintelligence.com\/x-force\/ai-vs-human-deceit-unravelling-new-age-phishing-tactics\/\">still better at writing phishing emails<\/a>, with a higher click through rate of 14% compared to AI\u2019s 11%. However, for just a few years into publicly available <a href=\"https:\/\/interface.media\/blog\/2024\/03\/06\/small-language-models-could-make-generative-ai-more-ethical-and-better\/\">generative AI<\/a>, the results were \u201cnail-bitingly close\u201d.\u00a0<\/p>\n\n\n\n<p>Nevertheless, the report clearly demonstrated the potential for generative AI to be used in creating phishing campaigns. The report\u2019s authors also highlighted not only the vulnerability of restricted AIs to being \u201ctricked into phishing via simple prompts\u201d, but also the fact that unrestricted AIs, like WormGPT, \u201cmay offer more efficient ways for attackers to scale sophisticated phishing emails in the future.\u201d&nbsp;<\/p>\n\n\n\n<p>As noted in a <a href=\"https:\/\/www.darkreading.com\/vulnerabilities-threats\/pivotal-moment-ai-and-cybersecurity\">recent op-ed<\/a> by Elastic CISO, Mandy Andress, \u201cWith this type of highly targeted, AI-honed phishing attack, bad actors increase their odds of stealing an employee&#8217;s login credentials so they can access highly sensitive information, such as a company&#8217;s financial details.\u201d&nbsp;<\/p>\n\n\n\n<p>What\u2019s particularly interesting is that generative AI as a tool in the hands of malicious entities outside the organisation is only the beginning.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-ai-is-undermining-cybersecurity-from-both-sides\">AI is undermining cybersecurity from both sides<\/h3>\n\n\n\n<p>Not only is GenerativeAI acting as a potential new tool in the hands of bad actors, but some cybersecurity experts believe that irresponsible use, mixed with an overreliance on the technology <em>inside <\/em>the organisation can be just as dangerous.&nbsp;<\/p>\n\n\n\n<p>John Licata, the chief innovation foresight specialist at SAP, <a href=\"https:\/\/www.forbes.com\/sites\/sap\/2024\/01\/29\/the-future-of-cybersecurity-is-more-human-than-you-think\/?sh=701cb69b3cf9\">believes<\/a> that, while \u201ccybersecurity best practices and trainings can certainly demonstrate expertise and raise awareness around a variety of threats \u2026 there is an existing skills gap that is worsening with the rising popularity and reliance on AI.\u201d&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-humans-remain-the-best-defence\">Humans remain the best defence<\/h3>\n\n\n\n<p>While generative AI is unquestionably going to be put to use fighting the very security risks the technology creates, cybersecurity leaders still believe that training and culture will play the biggest role in what IBM\u2019s X-Force report calls \u201ca pivotal moment in social engineering attacks.\u201d&nbsp;<\/p>\n\n\n\n<p>\u201cA holistic cybersecurity strategy, and the roles humans play in it in an age of AI, must begin with a stronger security culture laser focused on best practices, transparency, compliance by design, and creating a zero-trust security model,\u201d adds Licata.<\/p>\n\n\n\n<p>According to X-Force, key methods for improving humans\u2019 abilities to identify AI-driven phishing campaigns include:&nbsp;<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>When unsure, call the sender directly. Verify the legitimacy of suspicious emails by phone. Establish a safe word with trusted contacts for vishing or AI phone scams.<\/li>\n\n\n\n<li>Forget the grammar myth. Modern phishing emails may have correct grammar. Focus on other indicators like email length and complexity. Train employees to spot AI-generated text, often found in lengthy emails.<\/li>\n\n\n\n<li>Update social engineering training. Include vishing techniques. They&#8217;re simple yet highly effective. According to X-Force, adding phone calls to phishing campaigns triples effectiveness.<\/li>\n\n\n\n<li>Enhance identity and access management. Use advanced systems to validate user identities and permissions.<\/li>\n\n\n\n<li>Stay ahead with constant adaptation. Cybercriminal tactics evolve rapidly. Update internal processes, detection systems, and employee training regularly to outsmart malicious actors.<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>Generative AI threatens to exacerbate cybersecurity risks. Human intuition might be our best form of defence. <\/p>\n","protected":false},"author":480,"featured_media":20345,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"apple_news_api_created_at":"2024-03-06T04:51:09Z","apple_news_api_id":"031f99b5-76df-46b7-8774-8d74e477575b","apple_news_api_modified_at":"2024-03-06T04:51:09Z","apple_news_api_revision":"AAAAAAAAAAD\/\/\/\/\/\/\/\/\/\/w==","apple_news_api_share_url":"https:\/\/apple.news\/AAx-ZtXbfRreHdI105HdXWw","apple_news_cover_media_provider":"image","apple_news_coverimage":0,"apple_news_coverimage_caption":"","apple_news_cover_video_id":0,"apple_news_cover_video_url":"","apple_news_cover_embedwebvideo_url":"","apple_news_is_hidden":"","apple_news_is_paid":"","apple_news_is_preview":"","apple_news_is_sponsored":"","apple_news_maturity_rating":"","apple_news_metadata":"\"\"","apple_news_pullquote":"","apple_news_pullquote_position":"","apple_news_slug":"","apple_news_sections":[],"apple_news_suppress_video_url":false,"apple_news_use_image_component":false,"footnotes":""},"categories":[3,1],"tags":[],"topic":[613,614],"class_list":["post-20344","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-interface","category-uncategorized","topic-cybersecurity","topic-data-ai"],"acf":[],"apple_news_notices":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.6 (Yoast SEO v26.6) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Man, not machine: why humans might be the best cybersecurity tool in the fight against GenAI - Interface<\/title>\n<meta name=\"description\" content=\"Generative AI threatens to exacerbate cybersecurity risks. Human intuition might be our best form of defence.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Man, not machine: why humans might be the best cybersecurity tool in the fight against GenAI\" \/>\n<meta property=\"og:description\" content=\"Generative AI threatens to exacerbate cybersecurity risks. Human intuition might be our best form of defence.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/interface.media\/blog\/2024\/03\/06\/man-not-machine-why-humans-might-be-the-best-cybersecurity-tool-in-the-fight-against-genai\/\" \/>\n<meta property=\"og:site_name\" content=\"Interface\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-06T04:51:05+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-03-06T04:54:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/interface.media\/wp-content\/uploads\/sites\/3\/2024\/03\/iStock-1437635118.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1152\" \/>\n\t<meta property=\"og:image:height\" content=\"648\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Dan Brightmore\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Dan Brightmore\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/interface.media\/blog\/2024\/03\/06\/man-not-machine-why-humans-might-be-the-best-cybersecurity-tool-in-the-fight-against-genai\/\",\"url\":\"https:\/\/interface.media\/blog\/2024\/03\/06\/man-not-machine-why-humans-might-be-the-best-cybersecurity-tool-in-the-fight-against-genai\/\",\"name\":\"Man, not machine: why humans might be the best cybersecurity tool in the fight against GenAI - Interface\",\"isPartOf\":{\"@id\":\"https:\/\/interface.media\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/interface.media\/blog\/2024\/03\/06\/man-not-machine-why-humans-might-be-the-best-cybersecurity-tool-in-the-fight-against-genai\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/interface.media\/blog\/2024\/03\/06\/man-not-machine-why-humans-might-be-the-best-cybersecurity-tool-in-the-fight-against-genai\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/interface.media\/wp-content\/uploads\/sites\/3\/2024\/03\/iStock-1437635118.jpg\",\"datePublished\":\"2024-03-06T04:51:05+00:00\",\"dateModified\":\"2024-03-06T04:54:21+00:00\",\"author\":{\"@id\":\"https:\/\/interface.media\/#\/schema\/person\/7c33499ca8e42b097028109cccb22748\"},\"description\":\"Generative AI threatens to exacerbate cybersecurity risks. Human intuition might be our best form of defence.\",\"breadcrumb\":{\"@id\":\"https:\/\/interface.media\/blog\/2024\/03\/06\/man-not-machine-why-humans-might-be-the-best-cybersecurity-tool-in-the-fight-against-genai\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/interface.media\/blog\/2024\/03\/06\/man-not-machine-why-humans-might-be-the-best-cybersecurity-tool-in-the-fight-against-genai\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/interface.media\/blog\/2024\/03\/06\/man-not-machine-why-humans-might-be-the-best-cybersecurity-tool-in-the-fight-against-genai\/#primaryimage\",\"url\":\"https:\/\/interface.media\/wp-content\/uploads\/sites\/3\/2024\/03\/iStock-1437635118.jpg\",\"contentUrl\":\"https:\/\/interface.media\/wp-content\/uploads\/sites\/3\/2024\/03\/iStock-1437635118.jpg\",\"width\":1152,\"height\":648,\"caption\":\"Generative AI threatens to exacerbate cybersecurity risks. Human intuition might be our best form of defence.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/interface.media\/blog\/2024\/03\/06\/man-not-machine-why-humans-might-be-the-best-cybersecurity-tool-in-the-fight-against-genai\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/interface.media\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Man, not machine: why humans might be the best cybersecurity tool in the fight against GenAI\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/interface.media\/#website\",\"url\":\"https:\/\/interface.media\/\",\"name\":\"Interface\",\"description\":\"Delivering World Class Content \u201cFrom Executive, For Executive\u201c\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/interface.media\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/interface.media\/#\/schema\/person\/7c33499ca8e42b097028109cccb22748\",\"name\":\"Dan Brightmore\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/interface.media\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e9ca282f0ef431735a64685769ad57886e24b074c4c58314392755fb79164164?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e9ca282f0ef431735a64685769ad57886e24b074c4c58314392755fb79164164?s=96&d=mm&r=g\",\"caption\":\"Dan Brightmore\"},\"url\":\"https:\/\/interface.media\/blog\/author\/dbrightmore\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Man, not machine: why humans might be the best cybersecurity tool in the fight against GenAI - Interface","description":"Generative AI threatens to exacerbate cybersecurity risks. Human intuition might be our best form of defence.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_GB","og_type":"article","og_title":"Man, not machine: why humans might be the best cybersecurity tool in the fight against GenAI","og_description":"Generative AI threatens to exacerbate cybersecurity risks. Human intuition might be our best form of defence.","og_url":"https:\/\/interface.media\/blog\/2024\/03\/06\/man-not-machine-why-humans-might-be-the-best-cybersecurity-tool-in-the-fight-against-genai\/","og_site_name":"Interface","article_published_time":"2024-03-06T04:51:05+00:00","article_modified_time":"2024-03-06T04:54:21+00:00","og_image":[{"width":1152,"height":648,"url":"https:\/\/interface.media\/wp-content\/uploads\/sites\/3\/2024\/03\/iStock-1437635118.jpg","type":"image\/jpeg"}],"author":"Dan Brightmore","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Dan Brightmore","Estimated reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/interface.media\/blog\/2024\/03\/06\/man-not-machine-why-humans-might-be-the-best-cybersecurity-tool-in-the-fight-against-genai\/","url":"https:\/\/interface.media\/blog\/2024\/03\/06\/man-not-machine-why-humans-might-be-the-best-cybersecurity-tool-in-the-fight-against-genai\/","name":"Man, not machine: why humans might be the best cybersecurity tool in the fight against GenAI - Interface","isPartOf":{"@id":"https:\/\/interface.media\/#website"},"primaryImageOfPage":{"@id":"https:\/\/interface.media\/blog\/2024\/03\/06\/man-not-machine-why-humans-might-be-the-best-cybersecurity-tool-in-the-fight-against-genai\/#primaryimage"},"image":{"@id":"https:\/\/interface.media\/blog\/2024\/03\/06\/man-not-machine-why-humans-might-be-the-best-cybersecurity-tool-in-the-fight-against-genai\/#primaryimage"},"thumbnailUrl":"https:\/\/interface.media\/wp-content\/uploads\/sites\/3\/2024\/03\/iStock-1437635118.jpg","datePublished":"2024-03-06T04:51:05+00:00","dateModified":"2024-03-06T04:54:21+00:00","author":{"@id":"https:\/\/interface.media\/#\/schema\/person\/7c33499ca8e42b097028109cccb22748"},"description":"Generative AI threatens to exacerbate cybersecurity risks. Human intuition might be our best form of defence.","breadcrumb":{"@id":"https:\/\/interface.media\/blog\/2024\/03\/06\/man-not-machine-why-humans-might-be-the-best-cybersecurity-tool-in-the-fight-against-genai\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/interface.media\/blog\/2024\/03\/06\/man-not-machine-why-humans-might-be-the-best-cybersecurity-tool-in-the-fight-against-genai\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/interface.media\/blog\/2024\/03\/06\/man-not-machine-why-humans-might-be-the-best-cybersecurity-tool-in-the-fight-against-genai\/#primaryimage","url":"https:\/\/interface.media\/wp-content\/uploads\/sites\/3\/2024\/03\/iStock-1437635118.jpg","contentUrl":"https:\/\/interface.media\/wp-content\/uploads\/sites\/3\/2024\/03\/iStock-1437635118.jpg","width":1152,"height":648,"caption":"Generative AI threatens to exacerbate cybersecurity risks. Human intuition might be our best form of defence."},{"@type":"BreadcrumbList","@id":"https:\/\/interface.media\/blog\/2024\/03\/06\/man-not-machine-why-humans-might-be-the-best-cybersecurity-tool-in-the-fight-against-genai\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/interface.media\/"},{"@type":"ListItem","position":2,"name":"Man, not machine: why humans might be the best cybersecurity tool in the fight against GenAI"}]},{"@type":"WebSite","@id":"https:\/\/interface.media\/#website","url":"https:\/\/interface.media\/","name":"Interface","description":"Delivering World Class Content \u201cFrom Executive, For Executive\u201c","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/interface.media\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/interface.media\/#\/schema\/person\/7c33499ca8e42b097028109cccb22748","name":"Dan Brightmore","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/interface.media\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e9ca282f0ef431735a64685769ad57886e24b074c4c58314392755fb79164164?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e9ca282f0ef431735a64685769ad57886e24b074c4c58314392755fb79164164?s=96&d=mm&r=g","caption":"Dan Brightmore"},"url":"https:\/\/interface.media\/blog\/author\/dbrightmore\/"}]}},"_links":{"self":[{"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/posts\/20344","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/users\/480"}],"replies":[{"embeddable":true,"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/comments?post=20344"}],"version-history":[{"count":1,"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/posts\/20344\/revisions"}],"predecessor-version":[{"id":20346,"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/posts\/20344\/revisions\/20346"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/media\/20345"}],"wp:attachment":[{"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/media?parent=20344"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/categories?post=20344"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/tags?post=20344"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/interface.media\/wp-json\/wp\/v2\/topic?post=20344"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}