January 18, 2024 By Sue Poremba 3 min read

The hottest technology right now is AI — more specifically, generative AI. The trend is so popular that every conference and webinar speaker feels obligated to mention some form of AI, no matter their field.

The innovations and risks that AI offers are both exciting and frightening. However, the heavy focus on this technology overshadows an important component of artificial intelligence: machine learning (ML).

For a quick overview, ML is a subset of AI  based on patterns, predictions and optimization. Cybersecurity tools rely on ML to use predictions and patterns to find anomalies and sniff out potential threats. Instead of a human spending hours reading logs, ML can do the same tasks in seconds.

Like AI, ML has been around for a long time. The reason why we’re talking about AI so much now is because generative AI is a game changer in the way we communicate with technology. But ML is also changing, and we’ll see it used in new ways in 2024.

How we use machine learning

Machine learning is all about data. ML algorithms rely on historical data to detect patterns, from software codes to customer shopping behaviors. Social media networks rely on ML algorithms to keep relevant information at the top of your feed. Self-driving cars use ML algorithms to navigate city streets and traffic laws. In cybersecurity, ML is used in areas like behavioral analytics and sending alerts for unusual usage, task automation and providing more efficient real-time threat-hunting intelligence.

There are three common types of ML currently used. Supervised learning trains ML to perform a specific task based on the presented data. Unsupervised learning relies on relationships across the data. Reinforcement learning is most similar to human learning, where the ML model learns to solve problems through trial-and-error formats.

New trends in machine learning

As AI continues to advance, so does ML, and one of the most anticipated improvements to ML in 2024 will be no-code machine learning. No-code ML relies heavily on behavioral data and plain English to get results. Instead of complicated coding language, analysts will be able to ask a question or create a command to get a report. One of the biggest benefits of no-code ML is that it allows companies of all sizes to implement ML and AI into their networks without the need to hire data analysts and engineers. The downfall is that this type of ML technology is limited and won’t be able to do deep-dive predictive analysis.

Unsupervised and reinforcement ML are both expected to expand in the coming year, in part because of no-code ML.

As ML evolves, we will likely see growth in other technologies like augmented reality and quantum computing. “Machine learning models can generate 3D objects for apps and other uses in augmented reality,” Luís Fernando Torres wrote. In addition, ML will play a role in improved facial recognition technology and interactions with generative AI.

Machine learning and security — the good and bad

As mentioned earlier, ML benefits your overall cybersecurity program by automating what were once cumbersome manual tasks. It can find threats that are otherwise missed and can cut down on false positives.

But as with any technology, there are security risks involved. Threat actors use ML and AI to launch attacks by poisoning or misleading the data to trick the system into providing false reports. Threat actors use this to bypass security systems and hijack the network.

AI and its role in security is what everyone wants to talk about today, but the ways that AI can improve your company’s security systems depend on machine learning. The time has come to get back to the basics and recognize how ML fits into your security system and how to best train ML so that your AI is even more effective.

More from Artificial Intelligence

AI and cloud vulnerabilities aren’t the only threats facing CISOs today

6 min read - With cloud infrastructure and, more recently, artificial intelligence (AI) systems becoming prime targets for attackers, security leaders are laser-focused on defending these high-profile areas. They’re right to do so, too, as cyber criminals turn to new and emerging technologies to launch and scale ever more sophisticated attacks.However, this heightened attention to emerging threats makes it easy to overlook traditional attack vectors, such as human-driven social engineering and vulnerabilities in physical security.As adversaries exploit an ever-wider range of potential entry points…

Are successful deepfake scams more common than we realize?

4 min read - Many times a day worldwide, a boss asks one of their team members to perform a task during a video call. But is the person assigning tasks actually who they say they are? Or is it a deepfake? Instead of blindly following orders, employees must now ask themselves if they are becoming a victims of fraud.Earlier this year, a finance worker found themselves talking on a video meeting with someone who looked and sounded just like their CFO. After the…

How to calculate your AI-powered cybersecurity’s ROI

4 min read - Imagine this scenario: A sophisticated, malicious phishing campaign targets a large financial institution. The attackers use emails generated by artificial intelligence (AI) that closely mimic the company's internal communications. The emails contain malicious links designed to steal employee credentials, which the attackers could use to gain access to company assets and data for unknown purposes.The organization's AI-powered cybersecurity solution, which continuously monitors network traffic and user behavior, detects several anomalies associated with the attack, blocks access to the suspicious domains…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today