Monday, 12 Jan 2026
Subscribe
logo
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Font ResizerAa
Data Center NewsData Center News
Search
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Data Center News > Blog > Cloud Computing > Why AI-powered threats are forcing a rethink of cloud security strategies
Cloud Computing

Why AI-powered threats are forcing a rethink of cloud security strategies

Last updated: March 31, 2025 9:04 am
Published March 31, 2025
Share
Why AI-powered threats are forcing a rethink of cloud security strategies
SHARE

Rob Vann, chief options officer at Cyberfort, explains how AI is basically altering the menace panorama for cloud environments.

How is AI basically altering the menace panorama for cloud environments?

That is an attention-grabbing query as, in fact, AI is a software that’s helpful to each good and unhealthy actors. For now, let’s assume we’re focussing on the unhealthy.

Focused threats have at all times been extra profitable (and costlier) than mass assaults. AI contributes to combining the size and price of a mass assault with success extra aligned to the focused method. Particularly within the cloud world, there are a number of strategies the place AI can ‘add worth, complexity, and in the end a extra profitable final result to an assault. 

These embody easy strategies (equivalent to AI used to populate brute pressure assaults, or Generative AI used to help focused entry requests) by way of adaptive malware, with AI requested to rewrite code to bypass any or different detections, the extra direct use of AI to detect and leverage weak methods, or determine and exploit organisation stage misconfigurations by way of scanning, probing and researching at velocity (although maybe extra concerningly it may well additionally apply the identical velocity and strategies to shared cloud or multi use APIs for instance, compromising giant scale one to many methods. 

AI may also be used to help extra focused approaches, its velocity and talent to course of information compressing assaults, and their outcomes, for instance automating lateral motion, persistence and privilege escalation strategies, enabling attackers to rapidly determine and purchase excessive worth information in giant cloud storage environments, or modifying log recordsdata/manipulating different information to cover the breach and hinder its investigation.     

To what extent do you suppose conventional cloud safety approaches have gotten out of date within the face of AI-powered assaults?

The earlier reply goes some option to help this, Cyber Safety has at all times been a enjoying area biased within the attacker’s favour, with the attacker solely needing to succeed as soon as, and the defender needing to succeed each time.

A lot of the standard cloud safety approaches should not aligned to the size, velocity of execution, and complexity of AI pushed or supported assaults. Maybe extra importantly a lot of the profit that individuals achieve from Cloud environments is supported by “adequate” safety measures, with time limit safety coming after deployments – and a excessive dependence nonetheless maintained on human components.

See also  Keysight network packet brokers gain AI-powered features

Conventional approaches usually rely closely on static defences, equivalent to perimeter-based edge safety, fastened rule units, and predefined entry controls. These approaches are designed to protect in opposition to recognized assault vectors and assume a comparatively predictable menace panorama. Coupled with reactive specialist assets that want the timeframe of a human interplay to reply to the threats, our AI compatriots’ eyes are beginning to ‘gentle up’ on the potentialities for inflicting mayhem.

Assaults that beforehand took days of cautious construction and planning are actually executed in seconds. Whereas legacy defences “might” in concept deal with this – if the whole lot was patched and configured appropriately on a regular basis, and all assets acted completely on a regular basis, and nothing was depending on a 3rd celebration or provide chain ever, then there may be an opportunity for instance. The true world of safety may be very totally different to this nirvana.

To replace a legacy piece of recommendation “you don’t should be the quickest to get away from the bear, you simply should not be the slowest” in an AI attacker fuelled world, doubtlessly there are 1000 sooner, stronger, extra aggressive cockroach sized bears chasing each buyer on the identical time. You in all probability received’t even see them earlier than they take you down.

What sensible methods do firms must undertake to remain forward of rising threats within the cloud?

Similar to the unhealthy guys, you may increase your defences with AI energy as effectively.

However let’s begin by doing the fundamentals effectively, transfer what you may to automation (for instance utilising infrastructure as code, and pipelines with automated testing to take away human configuration errors or complexities, automating the execution, validation and segregation of backups, and constantly testing for exploitability of core methods). Then let’s transfer to a give attention to the encompassing components (equivalent to id) which are usually required to breach your methods and grow to be extra aggressive in containing and isolating suspect engagements. Work to the precept of “assume breach” segregate and aggressively monitor and reply to core methods, eradicating suspect entry to allow time to analyze after which restoring it if benign. Plan and consider how you retain important methods working throughout these durations, so your companies proceed even when a key individual or methods entry is briefly revoked.

See also  Magic Vision Launches AI-Powered Platform for Digital Creators

With all this AI speak it’s vital to not completely discard the human issue right here. A key emphasis must be establishing complete, steady studying packages to equip your safety groups with the data and experience wanted to know and fight AI-powered threats.  By fostering a tradition of ongoing schooling, organisations can guarantee their groups keep forward of the evolving menace panorama and are ready to counter refined assaults that exploit AI and machine studying applied sciences.

Then let’s begin to add in a few of these AI stage defences

Firstly, use AI to construct proactive defences, constructing a generative AI (please don’t use public methods, you’d be coaching them on how one can assault you) or discover an evidenced safe associate who can practice and align a non-public generative AI to help you and easily ask it how it could assault you, and plan your defences accordingly. Bear in mind to proof the elimination of your information and studying from the companions system and validate their safety earlier than sharing information. This may ship worth in aligning your defences and validating your controls in a digital twin setting.

Secondly, implement steady cloud posture administration to flag any errors or misconfigurations in close to actual time drive reap the benefits of AI to drive your detections. Machine studying to generate anomaly info offers a wealthy supply of ‘issues that could possibly be unhealthy however are positively totally different” to type by way of the noise of thousands and thousands of occasions to search out the ten which are helpful.

Thirdly, use AI to drive response actions, that is the ultimate state, and must be deliberate and approached with care, as energetic automated response can impression enterprise and continuity, nonetheless assuming breach, eradicating misconfigurations, containing (and releasing) belongings to supply time to analyze, validate and launch benign actions.

See also  Cirrascale Adds NVIDIA HGX B200 to Boost AI Cloud Performance

As at all times safety is a double-edged sword, the way in which to make issues most safe is to modify them off and decommission them, nonetheless this clearly means you may’t realise any enterprise worth from the asset. A lot of these assault require a special method of implementing zero belief and steady CSPM with automated responses, if accomplished correctly, it gives you the very best of each worlds, response to AI pushed assaults at AI scale and velocity, but when accomplished with out thought, planning and knowledgeable, skilled help and data it can doubtlessly create important enterprise points.

Are there any real-world examples you may share of how organisations are efficiently adapting?

Just lately I labored with a buyer who had undergone an incident. After the DFIR engagement, they requested us to take a look at maturing their defences, we helped them to securely take the next actions:

(1) Migrate id controls for cloud platforms to their company IAM system by way of the usage of a PAM answer. This meant that the insurance policies, monitoring and (after planning and testing) had been constant throughout the organisation) automated responses had been constant throughout all environments

(2) Combine testing and remediation into their construct pipelines (mitigating the chance of deploying exploitable code).

(3) The combination of their manufacturing setting, aside from some important methods that served prospects, into the SOAR (safety orchestration automation and response) and the constructing of acceptable playbooks to include (and launch) suspect belongings and assets.

(4) The deployment of steady CSPM (cloud safety posture administration) which was later automated to remediate >90% of points routinely in actual time

(5) The extension of their EDR tooling into the manufacturing setting

(6) Additional coaching for his or her assets, together with periods particularly focussed on builders, architects and actual life deep faux video examples for the whole enterprise.

Picture by Growtika on Unsplash

Wish to be taught extra about cybersecurity and the cloud from trade leaders? Take a look at Cyber Security & Cloud Expo going down in Amsterdam, California, and London.

Discover different upcoming enterprise know-how occasions and webinars powered by TechForge here.

Source link

TAGGED: AIpowered, cloud, forcing, rethink, security, Strategies, threats
Share This Article
Twitter Email Copy Link Print
Previous Article Aster Emerges: Astherus Rebrands to Lead Decentralized Perpetual Trading Aster Emerges: Astherus Rebrands to Lead Decentralized Perpetual Trading
Next Article Humans as hardware: Computing with biological tissue Humans as hardware: Computing with biological tissue
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Your Trusted Source for Accurate and Timely Updates!

Our commitment to accuracy, impartiality, and delivering breaking news as it happens has earned us the trust of a vast audience. Stay ahead with real-time updates on the latest events, trends.
FacebookLike
TwitterFollow
InstagramFollow
YoutubeSubscribe
LinkedInFollow
MediumFollow
- Advertisement -
Ad image

Popular Posts

Zoho announces plans for UK data centre

To offer the most effective experiences, we use applied sciences like cookies to retailer and/or…

September 12, 2025

Equinix acquires three sites in the Philippines

Equinix has acquired three information centres within the Philippines from know-how options supplier Complete Info…

July 24, 2024

Quantum Computer Launched for Generative AI

Orca Computing has launched its newest photonic quantum pc, PT-2, designed to sort out sensible functions…

November 7, 2024

The increasing demand for AI has caused data center power consumption to skyrocket, creating a bottleneck in AI development

Apr 19, 2024 07:00:00 Lately, main know-how firms have been investing closely within the improvement…

April 22, 2024

Endor Labs Receives Strategic Investment From Citi Ventures

Endor Labs, a Palo Alto, CA-based chief in software program provide chain safety, obtained a…

July 15, 2024

You Might Also Like

Engineer
Global Market

AI, edge, and security: Shaping the need for modern infrastructure management

By saad
Best 5 AI semantic reasoning tools for databases
Cloud Computing

Best 5 AI semantic reasoning tools for databases

By saad
Aumovio turns to cloud computing to scale autonomous vehicle testing
Cloud Computing

Aumovio turns to the cloud to scale autonomous vehicle testing

By saad
From cloud to factory – humanoid robots coming to workplaces
AI

From cloud to factory – humanoid robots coming to workplaces

By saad
Data Center News
Facebook Twitter Youtube Instagram Linkedin

About US

Data Center News: Stay informed on the pulse of data centers. Latest updates, tech trends, and industry insights—all in one place. Elevate your data infrastructure knowledge.

Top Categories
  • Global Market
  • Infrastructure
  • Innovations
  • Investments
Usefull Links
  • Home
  • Contact
  • Privacy Policy
  • Terms & Conditions

© 2024 – datacenternews.tech – All rights reserved

Welcome Back!

Sign in to your account

Lost your password?
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
You can revoke your consent any time using the Revoke consent button.