Artificial Intelligence will close the cybersecurity skills gap
As we begin to move beyond what GenAI can achieve, a host of real opportunities are emerging to help solve a range of long-term issues plaguing cybersecurity, particularly skills shortages and unsafe human behavior. This year's top predictions clearly lie outside of technology, as the human element continues to receive more attention. Any CISO looking to build an effective and sustainable cybersecurity program must make this effort a priority.
By 2028, GenAI adoption is expected to close the small skills gap and 50% of entry-level cybersecurity positions will no longer require specialized education. GenAI enhancements will change the way organizations recruit and train cybersecurity workers with the right competencies and education. Major platforms already offer conversational enhancements, but this will continue to evolve. Gartner recommends that cybersecurity teams focus on internal use cases that support user efforts; work with HR to coordinate and find the right talent for more critical cybersecurity roles.
In 2026, enterprises that combine GenAI with an integrated platform architecture in a Security Behavior and Culture Program (SBCP) will reduce employee-driven cybersecurity incidents by 40%. Organizations are increasingly focusing on personalized engagement as an important component of effective SBCP. GenAI has the potential to generate highly personalized content and training materials that take into account employees’ unique attributes. This will increase the likelihood that employees will adopt safer behaviors in their daily work, thereby reducing cybersecurity incidents.
Portfolios that are not yet using GenAI capabilities should evaluate their current external security awareness partners to understand how to include GenAI as part of their solution roadmap. This ensures that incorporating new technology into an organization does not compromise its existing security defenses.
In 2026, 75% of organizations will exclude unmanaged, traditional and cyber-physical systems from their zero trust strategy. Under a zero trust strategy, users and endpoints are given only the access they need to do their jobs and are monitored against changing rights restrictions. In production or mission-critical environments, these concepts do not apply to unmanaged devices, legacy applications, and cyber-physical systems (CPS). These systems perform specific tasks in unique safety- and reliability-focused environments.
Under the 2027 law, two-thirds of the world's top 100 companies will provide cybersecurity leaders with directors and officers (D&O) insurance to cover personal legal risks. New laws and regulations require cybersecurity leaders to take personal responsibility. The CISO's role and responsibilities need to be updated to allow for relevant reporting and disclosure. Businesses are advised to explore the benefits of purchasing D&O insurance for this role, as well as other insurance and indemnity, to reduce the burden of personal liability, professional risk and legal fees.
By 2028, companies will spend more than $500 billion on combating disinformation, accounting for 50% of marketing and cybersecurity budgets. The combination of artificial intelligence, analytics, behavioral science, social media, the Internet of Things, and other technologies makes creating and spreading highly effective mass-tailored disinformation an elusive challenge. However, with the proper use of these technologies, people can still create and spread efficient and large-scale disinformation.
By 2026, 40% of identity and access management (IAM) leaders will have primary responsibility for reviewing, measuring, and responding to IAM-related breaches. IAM leaders often struggle to articulate security and business value to drive accurate investments and are not involved in security asset and budget discussions. As IAM leaders grow in importance, they will evolve in different directions, each with increased responsibility, visibility, and influence. It is recommended that CISOs break down the traditional IT and security silos and let stakeholders understand the role of IAM by coordinating IAM plans and security plans.
By 2027, 70% of organizations will integrate data loss prevention and internal risk management principles with IAM context to more effectively identify suspicious behavior. Growing interest in integrated controls has led vendors to develop capabilities that represent the overlap of user behavior control and data loss prevention. This introduces a more comprehensive set of capabilities for security teams to create a single policy for a dual approach to data security and internal risk mitigation. Gartner recommends that organizations identify data risks and identity risks and combine them as primary directives for strategic data security.
By 2027, 30% of cybersecurity capabilities will be reimagined for application security, directly usable by non-cyber experts and owned by application owners. The volume, variety and context of applications created by business technical staff and distributed delivery teams means the potential risks are far beyond what a dedicated application security team can handle.
To close the gap, the cybersecurity function must build a minimum level of effective expertise within these teams, combining technology with training to create the autonomy needed to make informed decisions about cyber risk. required abilities.
The above is the detailed content of Artificial Intelligence will close the cybersecurity skills gap. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics

The steps to update a Docker image are as follows: Pull the latest image tag New image Delete the old image for a specific tag (optional) Restart the container (if needed)

To create an Oracle database, the common method is to use the dbca graphical tool. The steps are as follows: 1. Use the dbca tool to set the dbName to specify the database name; 2. Set sysPassword and systemPassword to strong passwords; 3. Set characterSet and nationalCharacterSet to AL32UTF8; 4. Set memorySize and tablespaceSize to adjust according to actual needs; 5. Specify the logFile path. Advanced methods are created manually using SQL commands, but are more complex and prone to errors. Pay attention to password strength, character set selection, tablespace size and memory

The key to PHPMyAdmin security defense strategy is: 1. Use the latest version of PHPMyAdmin and regularly update PHP and MySQL; 2. Strictly control access rights, use .htaccess or web server access control; 3. Enable strong password and two-factor authentication; 4. Back up the database regularly; 5. Carefully check the configuration files to avoid exposing sensitive information; 6. Use Web Application Firewall (WAF); 7. Carry out security audits. These measures can effectively reduce the security risks caused by PHPMyAdmin due to improper configuration, over-old version or environmental security risks, and ensure the security of the database.

Deleting all data in Oracle requires the following steps: 1. Establish a connection; 2. Disable foreign key constraints; 3. Delete table data; 4. Submit transactions; 5. Enable foreign key constraints (optional). Be sure to back up the database before execution to prevent data loss.

How to choose Oracle 11g migration tool? Determine the migration target and determine the tool requirements. Mainstream tool classification: Oracle's own tools (expdp/impdp) third-party tools (GoldenGate, DataStage) cloud platform services (such as AWS, Azure) to select tools that are suitable for project size and complexity. FAQs and Debugging: Network Problems Permissions Data Consistency Issues Insufficient Space Optimization and Best Practices: Parallel Processing Data Compression Incremental Migration Test

Common problems and solutions for Hadoop Distributed File System (HDFS) configuration under CentOS When building a HadoopHDFS cluster on CentOS, some common misconfigurations may lead to performance degradation, data loss and even the cluster cannot start. This article summarizes these common problems and their solutions to help you avoid these pitfalls and ensure the stability and efficient operation of your HDFS cluster. Rack-aware configuration error: Problem: Rack-aware information is not configured correctly, resulting in uneven distribution of data block replicas and increasing network load. Solution: Double check the rack-aware configuration in the hdfs-site.xml file and use hdfsdfsadmin-printTopo

Oracle database file structure includes: data file: storing actual data. Control file: Record database structure information. Redo log files: record transaction operations to ensure data consistency. Parameter file: Contains database running parameters to optimize performance. Archive log file: Backup redo log file for disaster recovery.

How to clean all Redis data: Redis 2.8 and later: The FLUSHALL command deletes all key-value pairs. Redis 2.6 and earlier: Use the DEL command to delete keys one by one or use the Redis client to delete methods. Alternative: Restart the Redis service (use with caution), or use the Redis client (such as flushall() or flushdb()).
