Combating AI-Driven Attacks with Predictive Breach Technology
Posted: Wednesday, Jul 03
  • KBI.Media
  • $
  • Combating AI-Driven Attacks with Predictive Breach Technology
Karissa Breen, crowned a LinkedIn โ€˜Top Voice in Technologyโ€™, is more commonly known as KB. A serial Entrepreneur that Co-Founded the TMFE Group, a holding company and consortium of several businesses all relating to cybersecurity including, an industry-leading media platform, a marketing agency, a content production studio, and the executive headhunting firm, MercSec. KBI.Media is an independent and agnostic global cyber security media company led by KB at the helm of the journalism division. As a Cybersecurity Investigative Journalist, KB hosts her flagship podcast, KBKast, interviewing cybersecurity practitioners around the globe on security and the problems business executives face. It has been downloaded in 65 countries with more than 300K downloads globally, influencing billions in cyber budgets. KB asks hard questions and gets real answers from her guests, providing a unique, uncoloured position on the always evolving landscape of cybersecurity. As a Producer and Host of the streaming show, 2Fa.tv, she sits down with experts to demystify the world of cybersecurity and provide genuine insight to businesses executives on the downstream impacts cybersecurity advancement and events have on our wider world.

i 3 Table of Contents

Combating AI-Driven Attacks with Predictive Breach Technology

Zscaler’s CSO and Head of Security Research, Deepen Desai, recently discussed the latest advancements in AI, cybersecurity, and zero trust strategies during his talk at Zenith Live.

One of the key focal points of Desai’s presentation was the intersection of AI and cybersecurity. The Researcher explained the landscape of AI-driven attacks and how cybercriminals are leveraging AI to target enterprises. Stress has entered the equation around โ€˜can we keep up with criminals attacking us with AI vs the cyber community defending with AI?โ€™

The answer is somewhere in the middle.

Desai made it clear on the defences in countering such threats, stating that companies should approach and harness the power of generative AI to detect and prevent potential breaches before they escalate.

Desai commented,

โ€œAnd the goal over here is to harness the power of generative AI to prevent a breach before it progresses further.โ€

Desai explained Zscaler’s new product โ€˜Breach Predictorโ€™, which combines generative AI with multidimensional predictive models to identify potential breach scenarios. Desai explained that this technology aims to preemptively predict and flag stages of breach scenarios within a company, allowing for proactive intervention.

Desai went on to say,

โ€œWeโ€™re trying to combine generative AI with multidimensional predictive models to flag potential breach like scenarios before they progress further.โ€

My question was. But how does that work?

So many vendors are coming out saying weโ€™ve integrated Gen AI or we can predict this or that. Iโ€™m always skeptical – but itโ€™s worth asking the question.

Desai continued,

โ€œBased on the intelligence that the team has compiled over the last 10 years, up here about 10,000 plus potential breach like scenarios, use that to train this AI breach prediction recommendation engine.โ€

The Researched explained that with all the real time traffic that they’re seeing in the organisation they take those transactions, feed it into their engine, and it’s able to point out where there may be a potential breach. For example: there is a high probability of threat actors or an attack campaign moving from stage A to stage B of a previously seen attack. Desai made it clear that this is not one a to one match, but these are variations of things that we have seen in the past which gives an indicator to predict a breach.

Another critical element discussed by Desai was Zscaler’s focus on zero trust architecture, aligning with the NSA’s zero trust security definition of “always verify, never trust.”

โ€œYou should explicitly verify with least privilege access, and you should assume breach scenarios. What would happen if this device that you’re using were to get breached? What’s the blast radius?โ€

Desai reiterated the need for a fundamental shift in the cybersecurity mindset, away from traditional VPN and firewall-based approaches to a zero trust model that prioritises user-to-app segmentation and proactive security layers such as cloud browser isolation and inline sandboxing.

Moreover, Desai touched upon the growing threat of ransomware attacks, highlighting the evolving tactics of cybercriminals who are now not only encrypting files but also exfiltrating valuable data from targeted environments.

Desai concluded with an exploration of the challenges and opportunities in the transition from traditional VPN-based approaches to a zero trust architecture. Desai enforced the need for a cultural and mindset shift within organisations to embrace proactive and more effective cybersecurity measures and to move away from outdated networking frameworks.

Why are people still using VPNs? Because people donโ€™t like change and itโ€™s easier said than done.

Share This