Close Menu
Pineapples Update –Pineapples Update –

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    I tried the first 360-degree camera of DJI, and its recording capabilities take out the competition.

    August 6, 2025

    Let the Revolt Falls Hackers bypass Windows Login on Dell Laptop

    August 6, 2025

    How are cyber security leaders AI Infrastructure

    August 6, 2025
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Pineapples Update –Pineapples Update –
    • Home
    • Gaming
    • Gadgets
    • Startups
    • Security
    • How-To
    • AI/ML
    • Apps
    • Web3
    Pineapples Update –Pineapples Update –
    Home»How-To»The Human Firewall: Even with AI, humans are still the last line of defense in cyber security
    How-To

    The Human Firewall: Even with AI, humans are still the last line of defense in cyber security

    PineapplesUpdateBy PineapplesUpdateJuly 2, 2025No Comments7 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    The Human Firewall: Even with AI, humans are still the last line of defense in cyber security
    Share
    Facebook Twitter LinkedIn Pinterest Email


    The Human Firewall: Even with AI, humans are still the last line of defense in cyber security

    Even with today’s huge arsenal cyber security equipment and A-Nhens Threw Detection, the attackers are becoming successful-so not that technology is failing, rather because human links in the defensive chain are revealed. Cyber ​​criminals almost always adopt the way of resistance to execute a violation, which often means to target people rather than a system.

    According to McKinse, 91% of cyber attacks have to reduce a staggering with technology, and more with taking advantage of human behavior and taking advantage. In other words, despite the techniques such as AI, despite moving on brake-transactions, cyber criminals are still more likely to hack people than machines.

    From the point of view of a cyber criminal, it makes sense. This is the least path of resistance. When there is an open window around the back, why spend a high-tech, AI-safe resources that hack your way through the front door? This is not the news for CISOS-2024 IBM survey, about three-fourths (74%) now recognize human vulnerability as their top security risk. They are aware of the open window, and now they are trying to secure it.

    You may like

    Sami Alshahar

    Social relation navigation

    Senior Manager, Engineering Engineering in an identity.

    easier said than done

    It is easy, although it has been done. Whether it is a well-time fishing email, a spufted call, a deepfech video, or a barrage of an authentic-proclaimed push notification designed to wear a user’s decision, is rapidly adapted to the attacker rescue.

    The reality is that when security vendors raced to beat the attackers with smart algorithms and strict controls, the strategy that leads to the most firm violations, is psychological, not technical. The actor of danger is exploiting belief, fatigue, social norms and behavior shortcuts-Danniti is far more subtle and effective than the Bruti-Force Code.

    This is not the lack of technology leaving sensitive organizations towards these techniques, it is a lack of alignment between devices and the way people actually think and operate. In a sharp-transport, high-pressure environment, employees do not have bandwidth for second estimate to check every request or every signal.

    They rely on instinct, familiarity and pattern that they have learned to trust. But they are very instincts that kidnap the attackers, convert the desk tickets into access explosions, or copy the CFO in a multi-mill-dollar list. Since generative AI intensifies the realism and access to these strategy, organizations have to face an important question: how not only bad actors to exclude, but also equip your people better. Because when hinges on human decisions, cyber security is not just a technology issue – it is a human.

    Psychology of Trust, BIS, and Safety Violations

    Human behavior is a vulnerability, but it is also an estimated pattern. Our brain is wired to efficiency, not for investigation, which makes us notable to manipulate the right conditions. The attackers know this and design their adventures accordingly. They play on the request to take precautions, apply authority data to dissect the doubt, and drip-feed small requests to trigger stability bias. These strategies are brutally calculated, and they do not work because people are careless, but because they are human.

    In early 2024, a finance worker of a Hong Kong firm was tricked to transfer $ 25 million after participating in the company’s CFO and other colleagues-a confident AI-renovated Deepfeek-every assured AI-renovated Deepfeek. The attackers used publicly available footage to clone the face and voices, causing a spontaneous confusion that exploited faith and familiarity with a devastating effect.

    The eye -opening part is that these deepfec tools are now easily available. Modern social engineering does not rely on clear red flag. Emails are not left with typos, and modeling does not robots. Thanks to access to generic AI, deepfech technology, and huge training data, the attackers can now create incredibly assured individuals who reflect voices, behavior and language of reliable colleagues. In this environment, even the best trained employees can fall prey without mistake.

    Heuristics – Mental shortcuts – are often exploited by the attackers who know what to see. The “authority bias” inspires people to follow the instructions of alleged leaders like a poor email from a CEO. The “deficiency theory” increases pressure by creating false urgency, making employees feel that they will have to work immediately.

    And “reciprocity prejudice” plays on the basic social tendency-once one appears to be a benign gesture, they are more likely to respond positively for a follow-up request, even if it is malicious. What often looks like a lapse in the decision, often has a required result of cognitive overload and the common, everyday use of hyuristics is used.

    Where policy meets psychology

    Traditional Identification and Access Management (IAM) strategies believe that the users will treat and rationally behave – that they will examine every signal, question every discrepancy, and follow the policy for the letter. But the reality inside most organizations is far away. People work quickly, continuously switch to contexts, and bombing with information, functions and requests.

    If safety controls feel very rigid or burden, users will find workarounds. If the signs are very often, they will be ignored. This is how good policy decreases – not out of negligence, but because the design of the system collides with the psychology of its users. Good security system should not add friction; They should basically guide users towards better options.

    Applying principles such as zero trust, minimal privileges, and bus-in-time access can dramatically reduce exposure, but only when they apply in those methods for cognitive load and reference. Automation can help here: Dynamic risk signal, daytime time, or providing access to the roll change and canceling users without the need to make constant decisions.

    Correct, identification management becomes an invisible security trap, which quietly optimize in the background, rather than demands frequent interactions. Humans should not be removed from the loop, but they should be freed from the burden that the system should already detect.

    Build a security culture

    Technology can apply access policies, but culture determines whether people follow them. A safe organization should be formed more than applying compliance only. It begins with safety training that goes beyond the fishing drill and password cleanliness so that people really think and react under pressure. Employees need to identify their own cognitive prejudices, understand how they are being targeted, and feel strong – not punished – not to slow down and ask questions.

    Removing equally important unnecessary friction. When access controls are spontaneous, reference-inconceivable and minimal disruptive, users are more likely to attach to them properly. Roll-based and characteristic-based access models, combined with just-in-time permissions, help reduce overprovining without creating disappointing bottlenecks in the form of pop-ups and interruptions. In other words, the modern IAM system needs to support and empower employees, rather than to jump through the Hops to get from one app or window to another.

    Human firewall is not going anywhere

    The biggest tech here is that cyber security is not just a system test, AI-run or not-this is the examination of people. Human firewall is definitely the greatest weakness of an outfit, but with the right tools and policies, it can become its greatest strength. Our goal should not be to eliminate human error or to change the congenital nature of humans, rather designing identity systems that make safe behavior default – easy, easy and friction free.

    We list the best employee recognition software,

    This article was created as part of Techradarpro’s expert Insights Channel, where we today facilitates the best and talented brains in the technology industry. The thoughts expressed here belong to the author and not necessarily techradarpro or future PLC. If you are interested in contributing then get more information here:

    Cyber defense Firewall human humans line Security
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleAnnouncement of Xbox Game Pass title for the first half of July: Tony Hawk’s Pro Skater 3 + 4, The Assent and More
    Next Article Mo Joma broke IPO Prep for founders in all stages TC
    PineapplesUpdate
    • Website

    Related Posts

    Security

    How are cyber security leaders AI Infrastructure

    August 6, 2025
    Security

    Cyber attack in summer 2025

    August 5, 2025
    Security

    5 hard truth of a career in cyber security – and how to navigate them

    August 5, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Microsoft’s new text editor is a VIM and Nano option

    May 19, 2025797 Views

    The best luxury car for buyers for the first time in 2025

    May 19, 2025724 Views

    Massives Datenleck in Cloud-Spichenn | CSO online

    May 19, 2025650 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    10,000 steps or Japanese walk? We ask experts if you should walk ahead or fast

    June 16, 20250 Views

    FIFA Club World Cup Soccer: Stream Palmirus vs. Porto lives from anywhere

    June 16, 20250 Views

    What do chatbott is careful about punctuation? I tested it with chat, Gemini and Cloud

    June 16, 20250 Views
    Our Picks

    I tried the first 360-degree camera of DJI, and its recording capabilities take out the competition.

    August 6, 2025

    Let the Revolt Falls Hackers bypass Windows Login on Dell Laptop

    August 6, 2025

    How are cyber security leaders AI Infrastructure

    August 6, 2025

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms And Conditions
    • Disclaimer
    © 2025 PineapplesUpdate. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.