Close Menu
Pineapples Update –Pineapples Update –

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Are open-ear headphones viable in 2025? Listen for the first time, this pair gave a bold statement

    November 10, 2025

    I saw the future of TV in Samsung’s South Korea lab — and I’m excited for these 3 things

    November 9, 2025

    Very few people are talking about this budget laptop from Lenovo that over-delivers

    November 9, 2025
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Pineapples Update –Pineapples Update –
    • Home
    • Gaming
    • Gadgets
    • Startups
    • Security
    • How-To
    • AI/ML
    • Apps
    • Web3
    Pineapples Update –Pineapples Update –
    Home»Security»6 novel methods to use AI in cyber security
    Security

    6 novel methods to use AI in cyber security

    PineapplesUpdateBy PineapplesUpdateSeptember 23, 2025No Comments7 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    6 novel methods to use AI in cyber security
    Share
    Facebook Twitter LinkedIn Pinterest Email


    6 novel methods to use AI in cyber security

    AI is already widely recognized as a powerful cyber security protection tool. AI-operated systems can detect dangers in real time, allowing rapid response and mitigation. AI can also learn and develop from new data, can continuously learn from new data, which can improve the ability to identify and address emerging hazards.

    Has your cybercity team consider using AI to stay one step ahead of rapidly sophisticated dangers? If yes, there are six innovative methods here that AI can help in the safety of your organization.

    1. Fear of attacks before happening

    Predictive AI gives defenders the ability to take defensive decision before an incident, even reactions, Andre PiazaSecurity Strategist at Predictive Technology Developer Bforei. “Running at high accuracy rates, this technique can increase productivity for security teams challenged by the number of alerts, the inherent false positivity and the burden of processing it all.”

    Predictive AI depends on large amounts of data from the Internet and the ingestion of metadata. To make predictions, a set of machine learning techniques dedicated to both scoring and predictions, which is known as Random forestAnalyze data. “This algorithm depends on the database of valid and poor infrastructure, which is known as Ground truthIt acts as a gold standard to create predictions, “Pijaza says. The future AI can also use a database of known sets of behavior that includes malicious intentions.

    Piaza says that predictions require high levels of accuracy. For the surface dynamics of the attack, such as changes in IP or DNS records, as well as novel attack techniques developed by criminals, algorithms constantly update the ground truth. “This is what makes the predictions accurate for a long time and, therefore, if desired, took automatic action, removing the human-in-loop.”

    2. Machine-learning generative adverse network

    Michel SahiThe main solution with cyber security technology firm Nopalasiber recommends using generic adverse networks to create, as well as, as well as, protects against the highly sophisticated previous unseen cyber attacks. “This technique enables cyber security systems to learn and adapt by training against a large number of fake hazards,” they say.

    Sahhyoun states that the GANS allows the system to learn from the scenarios of millions of novel attacks and develop effective defense. “By imitating the attacks not yet, adverse AI helps to prepare for frequent emerging hazards, reduces the difference between aggressive innovation and defensive readiness.”

    A GAN consists of two main components: a generator and a discrimination. “The generator produces realistic cybarantac scenarios-as the novel malware variants, fishing emails, or network infiltration pattern-imitating the attacker strategy of the pattern-world world,” Sahian explains. The discrimination evaluates these scenarios, which learns to separate malicious activity from legitimate behavior. Together, they create a dynamic reaction loop. “The generator refines its attack simulation based on the assessment of the discrimination, while the discriminatory constantly improves his ability to detect refined hazards.”

    3. AI analyst assistant

    By automating the labor-intensive process of the dangers, Hughes Network Systems is taking advantage of General AI to increase the role of entry-level analyst.

    “Our AI engine actively monitors safety alerts, corresponds data from several sources, and generates relevant narratives that will require otherwise important manual efforts,” Ajit EdkandiLeading cyber security product in Hughes Enterprise. “This approach does not place AI as a replacement for human analysts, but as an intelligent accessory that performs most of the initial search base.”

    Edkandi says that the approach improves the efficiency of the safety operation centers (SOC) by allowing analysts to process alerts rapidly and with greater accuracy. “A single alert often triggers a waterfall of follow-up action-checking the danger intelligence, assessing business effects, and assessing more,” he says. “Our AI strengthens this (procedure), performing these steps in parallel and machine speed, eventually allows human analysts to focus on validation and responding rather than spending in terms of gathering valuable time.”

    The AI ​​engine is trained on the analyst playbook and runbook installed, learning the specific steps taken during a variety of investigations, is called Edkandi. “When an alert is received, the AI ​​starts the same investigative actions (as humans), draws data from reliable sources, corresponds conclusions, and synthesizes the story of danger.” The final output is an analyzer-taiyar summary, which effectively reduces the time of examination to about one hour to only minutes. “It also enables analysts to handle the high amounts of alerts,” he notes.

    4. AI model

    The AI ​​model can be used for baseline system behavior, detecting micro-devices who will remember man or traditional laws-or threshold-based systems, say, says, says, says Steve tachchianXYPRO Technology, CEO of security services and products. “Instead of pursuing known bad behaviors, AI constantly learns what the ‘good’ looks at the level of the system, user, network and process,” they explain. “It then gives some flags that come out of that criteria, even if it has not been seen before.”

    Fed real-time data, process log, authentication patterns and network flows, AI models are constantly trained on general behavior, which is a means to detect anomalous activity. “When something is distracted – a user log in from a new location in a strange hour – a risk signal is triggered,” Tchchian says. “Over time, the model becomes smarter and becomes rapidly accurate because more of these signs are identified.”

    5. Automatic Alert Triage Investigation and Reaction

    A 1,000-individual company can easily receive 200 alerts a day, observations Kumar SaurabhCEO of managed identification and reaction firm AIRMDR. “To check an alert well, it takes a human analyst in the best 20 minutes,” they say. This means that you will need at least nine analysts to check each alert. “Therefore, most alerts are ignored or not well examined.”

    The AI ​​analyst technique examines each alert and then determines whether to make accurate decisions whether other pieces of data need to be collected to make accurate decisions. The AI ​​analyst talks to other equipment within the safety stack of the enterprise to collect the data required to reach the decision whether the warnings require action or can be safely rejected. “If this is malicious, technology reveals what action is needed to take action and/or to take action immediately and informs the security team immediately,” Saurabh says.

    6. Active liberal deception

    A novel approach to AI in cyber security is using the active liberal deception within a dynamic danger scenario. Gyan ChavadhariCEO of Cyber ​​Safety Training firm Contera.

    “Instead of detecting the dangers only, we can train AI to constantly, and to make and deploy highly realistic, yet fake, network segments, data and user behavior,” they explain. “Think of it as the construction of a ever -developing digital fanhouse for the attackers.”

    Chavadhari says that this approach goes beyond traditional honeypot by making deception more wider, intelligent and adaptive, which aims to eliminate and confuse the attackers before reaching a legitimate property.

    This approach is incredibly useful as it completely moves power dynamic, called Chavadhari. “Instead of continuously reacting to new threats, we force the attackers to react to their AI-related confusion,” they say. “It greatly increases the cost and time for the attackers, as they waste resources, which discovered the decoy system, exfilate fake data, and analyze the fabricated network traffic.” The technology not only purchases valuable time for defenders, but also provides a rich source of danger information about the attackers’ strategy, techniques and procedures (TTPs) as they interact with misleading environment.

    On the negative side, several domains require significant resources for several domains to develop an active liberal deception environment. “You will need a strong cloud-based infrastructure to host the dynamic decoy environment, powerful GPU resources for training and run generic AI models and host highly skilled AI/ML engineers, cyber security architects and a team of network experts,” Fluding Warnings. “Additionally, it is important to train AI access to various and wide datasets of both benign and malicious network traffic to actually understand deception.”

    Cyber methods Security
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleYour Google TV can get its biggest update over the years – Mithun provides without any cost
    Next Article Even Rogers and Max Hot included in the space phase in 2025
    PineapplesUpdate
    • Website

    Related Posts

    AI/ML

    Do you log into X with a security key? Renominate it by November 10th – otherwise

    October 27, 2025
    AI/ML

    When Your AI Browser Becomes Your Enemy: The Comet Security Disaster

    October 26, 2025
    Startups

    Your phishing detection skills are no match for the biggest security threats of 2025

    October 24, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Microsoft’s new text editor is a VIM and Nano option

    May 19, 2025797 Views

    The best luxury car for buyers for the first time in 2025

    May 19, 2025724 Views

    Massives Datenleck in Cloud-Spichenn | CSO online

    May 19, 2025650 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    10,000 steps or Japanese walk? We ask experts if you should walk ahead or fast

    June 16, 20250 Views

    FIFA Club World Cup Soccer: Stream Palmirus vs. Porto lives from anywhere

    June 16, 20250 Views

    What do chatbott is careful about punctuation? I tested it with chat, Gemini and Cloud

    June 16, 20250 Views
    Our Picks

    Are open-ear headphones viable in 2025? Listen for the first time, this pair gave a bold statement

    November 10, 2025

    I saw the future of TV in Samsung’s South Korea lab — and I’m excited for these 3 things

    November 9, 2025

    Very few people are talking about this budget laptop from Lenovo that over-delivers

    November 9, 2025

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms And Conditions
    • Disclaimer
    © 2025 PineapplesUpdate. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.