May 25, 2018 By David Bisson 2 min read

Fraud and malicious attacks are the prime growth drivers for artificial intelligence (AI) in the cybersecurity market. According to a November 2017 report from P&S Market Research, Artificial Intelligence (AI) in Cyber Security Market, threat detection and response time reduction are reasons why companies are increasingly using this technology to defend against digital threats.

Growth Rates for AI

The report also found the growth of AI is, in part, a response to enterprises’ ongoing digital transformations. “Organizations expanding their horizon to different geographies are generating voluminous data to gain insights and are also using analysis techniques to enhance their product offerings,” the report stressed.

However, more data means more bait for cybercriminals — who can get through security and access important organizational information. The P&S Market Research report put it simply: “The growing need to protect this data from outside threat is leading to the adoption of this solution.”

These digital security risks — along with the growing popularity of enterprise bring-your-own-device (BYOD) strategies — are likely to grow AI’s presence in the cybersecurity market going forward. In 2016, global AI was worth $1.2 billion. This amount is expected to increase at a compound annual growth rate (CAGR) of 36 percent between 2017 and 2023.

Machine learning will also likely play a role in growing artificial intelligence in the cybersecurity market, as this technology can help combat types of digital threats like distributed denial-of-service (DDoS) attacks.

Important Trends in AI

There are a few trends that will likely continue to shape AI in the cybersecurity market, according to the report. At the top of the list is cloud-based cybersecurity solutions due to their use in data gathering and threat modeling, among other applications.

These cloud-hosted tools can also help cut down on personnel costs. Chatbots will also fuel the growth of AI in the coming years. They are already being used in industries like retail and banking. The ability of these technologies to understand users’ needs and provide specific responses will work well with AI in combating computer crime.

More from

AI decision-making: Where do businesses draw the line?

4 min read - "A computer can never be held accountable, therefore a computer must never make a management decision."- IBM Training Manual, 1979Artificial intelligence (AI) adoption is on the rise. According to the IBM Global AI Adoption Index 2023, 42% of enterprises have actively deployed AI, and 40% are experimenting with the technology. Of those using or exploring AI, 59% have accelerated their investments and rollouts over the past two years. The result is an uptick in AI decision-making that leverages intelligent tools…

When ransomware kills: Attacks on healthcare facilities

4 min read - As ransomware attacks continue to escalate, their toll is often measured in data loss and financial strain. But what about the loss of human life? Nowhere is the ransomware threat more acute than in the healthcare sector, where patients’ lives are literally on the line.Since 2015, there has been a staggering increase in ransomware attacks on healthcare facilities. And the impacts are severe: Diverted emergency services, delayed critical treatments and even fatalities. Meanwhile, the pledge some ransomware groups made during…

AI and cloud vulnerabilities aren’t the only threats facing CISOs today

6 min read - With cloud infrastructure and, more recently, artificial intelligence (AI) systems becoming prime targets for attackers, security leaders are laser-focused on defending these high-profile areas. They’re right to do so, too, as cyber criminals turn to new and emerging technologies to launch and scale ever more sophisticated attacks.However, this heightened attention to emerging threats makes it easy to overlook traditional attack vectors, such as human-driven social engineering and vulnerabilities in physical security.As adversaries exploit an ever-wider range of potential entry points…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today