{"id":14972,"date":"2025-10-16T19:24:41","date_gmt":"2025-10-16T19:24:41","guid":{"rendered":"https:\/\/newestek.com\/?p=14972"},"modified":"2025-10-16T19:24:41","modified_gmt":"2025-10-16T19:24:41","slug":"cisos-brace-for-an-ai-vs-ai-fight","status":"publish","type":"post","link":"https:\/\/newestek.com\/?p=14972","title":{"rendered":"CISOs brace for an \u201cAI vs. AI\u201d fight"},"content":{"rendered":"<div>\n<div id=\"remove_no_follow\">\n<div class=\"grid grid--cols-10@md grid--cols-8@lg article-column\">\n<div class=\"col-12 col-10@md col-6@lg col-start-3@lg\">\n<div class=\"article-column__content\">\n<section class=\"wp-block-bigbite-multi-title\">\n<div class=\"container\"><\/div>\n<\/section>\n<p>Cybercriminals aren\u2019t just using AI \u2014 they\u2019re weaponizing it. Deepfakes, automated phishing, and AI-written malware are emerging as some of the fastest-growing threats on the enterprise radar. According to Foundry\u2019s 2025 Security Priorities Study, AI-enabled attacks now rank among the top concerns for security buyers, even as a majority of organizations are investing in or planning to invest in AI-driven defenses. The battle lines are clear: AI versus AI.<\/p>\n<p>Recent\u00a0<a href=\"https:\/\/www.csoonline.com\/article\/4069075\/autonomous-ai-hacking-and-the-future-of-cybersecurity.html\"><em>CSO<\/em>\u00a0reporting<\/a> paints an unsettling picture of what\u2019s already happening. Autonomous AI agents are learning to execute full attack chains \u2014 from reconnaissance and exploitation to evasion and data theft \u2014 without human direction. Researchers have documented AI models used to generate extortion emails, launch ransomware, and discover new vulnerabilities in minutes. As one expert put it, attackers are \u201coperating at computer speed and scale,\u201d threatening to tilt the balance of power decisively in their favor.<\/p>\n<p>For defenders, the answer isn\u2019t to match automation with automation blindly. Security leaders <a href=\"https:\/\/www.csoonline.com\/article\/4054301\/cisos-grapple-with-the-realities-of-applying-ai-to-security-functions.html\">interviewed by\u00a0<em>CSO<\/em><\/a><em> <\/em>describe a growing focus on treating AI as a \u201ccopilot, not an autopilot.\u201d Well-governed AI can accelerate detection, triage, and containment, but it still depends on strong human oversight to stay effective. \u201cThe real win isn\u2019t just speed,\u201d one CISO told\u00a0<em>CSO<\/em>. \u201cIt\u2019s handling the routine stuff so analysts can focus on the complex and strategic problems that machines can\u2019t.\u201d<\/p>\n<div class=\"extendedBlock-wrapper block-coreImage undefined\">\n<figure class=\"wp-block-image size-large\"><\/figure>\n<p class=\"imageCredit\">Foundry<\/p>\n<\/div>\n<p>That human element is also where attackers are focusing their innovation. As AI makes social engineering more convincing and scalable, traditional awareness programs are struggling to keep pace. Generative models can now produce synthetic audio and video that convincingly mimic executives, customers, or family members. What was once a fringe threat has become a mainstream security concern \u2014 one that blends technology and psychology in dangerous new ways.<\/p>\n<p>That\u2019s why leading CISOs are reframing \u201chuman risk\u201d as a top-tier security priority. The next phase of defense isn\u2019t just about smarter algorithms \u2014 it\u2019s about smarter, more situationally aware people. Training employees to recognize AI-driven deception, building rapid verification protocols, and maintaining a culture of healthy skepticism have become as important as technical controls.<\/p>\n<p>These intersecting challenges \u2014 technological and human \u2014 will take center stage at the\u00a0CSO Conference &amp; Awards, October 20\u201322 at the Grand Hyatt Indian Wells, where the CSO Security Priorities study for 2025 will also be presented.\u00a0Join leading security experts as they discuss how to fight back against AI-enabled attacks, strengthen security culture, and keep human trust at the heart of cyber defense.<\/p>\n<p>For more information about the agenda and speakers, please visit:\u00a0<a href=\"https:\/\/event.foundryco.com\/cso-conference-awards\/agenda\/\">https:\/\/event.foundryco.com\/cso-conference-awards\/agenda\/<\/a><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cybercriminals aren\u2019t just using AI \u2014 they\u2019re weaponizing it. Deepfakes, automated phishing, and AI-written malware are emerging as some of the fastest-growing threats on the enterprise radar. According to Foundry\u2019s 2025 Security Priorities Study, AI-enabled attacks now rank among the top concerns for security buyers, even as a majority of organizations are investing in or planning to invest in AI-driven defenses. The battle lines are&#8230; <\/p>\n<p class=\"more\"><a class=\"more-link\" href=\"https:\/\/newestek.com\/?p=14972\">Read More<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-14972","post","type-post","status-publish","format-standard","hentry","category-uncategorized","is-cat-link-borders-light is-cat-link-rounded"],"_links":{"self":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts\/14972","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=14972"}],"version-history":[{"count":0,"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts\/14972\/revisions"}],"wp:attachment":[{"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=14972"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=14972"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=14972"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}