The arrival of artificial intelligence (AI) in many cybersecurity products can’t come too soon, according to a co-founder of prominent cybersecurity vendor Palo Alto Networks, who sees the spiraling threat landscape as too complex to be managed by human efforts alone.
“They are going to try a million ways to get in,” Palo Alto Networks co-founder and CTO Nir Zuk said, regarding malicious actors. As for the threat hunters, he said: “You can’t be correct a million out of a million times — that doesn’t scale.”
That’s where AI comes in. Zuk and Palo Alto CPO Lee Klarich sat down with ZDNET to discuss how AI is changing cybersecurity.
Also: The best VPN services (and how to choose the right one for you)
Palo Alto began almost 18 years ago as a network security vendor competing with numerous firewall specialists and intrusion detection and prevention companies, and eventually moved into cloud security and managed services.
Zuk, a mathematician by training, has a long history running technology for cybersecurity outfits, having previously served as CTO at Juniper Networks, and before that founding cybersecurity startup OneSecure (later sold to NetScreen Technologies, which was sold to Juniper).
Also: Generative AI is new attack vector endangering enterprises, says CrowdStrike CTO
Klarich was previously director of product management for Juniper, and head of firewall technology at NetScreen before that.
The flash point for AI and security, Zuk said, is the security operations center, or SOC, which watches what happens on the network and tries to detect and stop malicious behavior.
The chief information society officer (CISO) and their team are outgunned. “If you look at the numbers for respond, recover, remediate,” the main things a CISO does following a breach — those numbers are horrible,” Zuk said.
“When the SEC [US Securities and Exchange Commission] announced that it expects public companies to report within four days about a major breach, everybody had an ‘Oh, crap’ moment,” he said. He noted the security team can’t even close routine IT tickets from that day: “They’re looking for a needle in a haystack.”
Because there aren’t enough engineers, or hours in the day, “the idea of AI in the SOC is to do the things that humans do,” but in “the most scalable way and faster,” Zuk said, to reduce the “mean time to detect” a breach to minutes.
Also: Intel sees AI in enterprise on a ‘three to five-year path’
“I think that there’s an opportunity where AI effectively automates a majority of how cybersecurity is deployed, configured, and operationalized,” Zuk said, because, “it’s become so complex for people to do.”
Automation is a broad, general term that is widely used. The aim of using emerging technology in the SOC is for the AI model to discover what “normal” means. The CISO and their teams spend their time hunting for traces of suspicious behavior, Zuk said. This effort takes hours, days and, weeks.
It would be better if the machine could find what normal looks like in the enterprise, Zuk said, so that anything malicious stands out.