Survey: More Than Half of IT Security Professionals Are Concerned About AI-Powered Threats

Pluralsight recently released results from a survey that polled over 200 technologists about cybersecurity and AI. The findings show that 56% of security professionals are concerned about AI-powered threats. Additionally, the survey explores the top cybersecurity skills in today’s tech landscape and emerging cybersecurity roles.

Over half of surveyed technologists are either extremely concerned or moderately concerned about AI-powered threats, with only 6% saying they are not worried.

As artificial intelligence continues to dominate the technology landscape, these concerns about potential threats in cybersecurity have rapidly surfaced. According to Pluralsight’s AI Skills Report, only 40% of organizations have formal structured training and instruction for AI, and 74% of IT professionals worry that AI tools will replace their roles.

“Organizations are seeing advanced threat actors target critical infrastructure and OT technology more often,” said Bri Frost, Pluralsight’s Director of Security and IT Ops Curriculum. “These systems are typically outdated, with older operating systems and an easier target for vulnerabilities with a higher risk of devastating effects.”

In response to the increasing prevalence of AI-driven threats, there is a growing urgency for professionals to upskill and acquire specialized knowledge in order to effectively safeguard against these evolving challenges.

Over 75% of respondents indicated that threat intelligence and reverse engineering are the most valuable advanced cybersecurity skills of today, while 24% noted threat hunting among these skills.

“The top advanced cybersecurity skills today are those required to proactively test defenses against current and future tactics and quickly take that information and implement detections, protections, and ways of hunting for this activity across the organization,” said Aaron Rosenmund, Pluralsight’s Senior Director of Security and GenAI Skills. “This combined with a solid foundation in networking, endpoint, server, and cloud concepts will allow an individual to provide immediate results and risk reduction for an organization.”

As both cybersecurity and digitized threats progress, lesser-known cybersecurity roles are gaining prominence, contributing crucial expertise to protecting digital environments and valuable data.

Over a third (34%) of respondents suggested that Cybersecurity Data Scientists will become more mainstream in the near term and 22% indicated that Exploit Developers will also grow in popularity. Other rising cybersecurity roles include DevSecOps (16%), Red Team Operators (12%), Threat Hunters (10%), and ICS/SCADA Security Engineers (4%).

Frost also highlighted the need for Cybersecurity Data Scientists, noting that “sifting through huge datasets from a security analysis standpoint is getting increasingly difficult. Managing and monitoring logs from every kind of endpoint, network data, and user behavior is a big task - seeing a need for data analysts will help the process to quickly identify and mitigate malicious traffic more efficiently.”

It is clear that developing upskilling programs and understanding the threats of AI are imperative for the future of cybersecurity. As AI technology continues to advance, so do the complexities of the potential threats it poses.

The main takeaway; investing in continuous learning and development of advanced skills allows cybersecurity professionals to effectively anticipate, mitigate, and respond to evolving challenges. Taking a proactive approach both enhances organizational resilience and further secures digital infrastructures.

Featured

  • Why Communication is Key in an Emergency

    During an emergency, communication with the outside world can be a critical component when it comes to response time and saving lives. Emergency communications typically consist of alerts and warnings; directives about evacuating the premises; information about response status, and other matters that can impact response and recovery. Read Now

  • Trust But Verify

    Today’s world is built on software—whether it is third-party applications, open-source libraries, in-house developed tools, operating systems, containers or firmware. Organizations worldwide depend on these diverse software components to power their operations, connect with customers, and drive innovation. However, this reliance on software comes with hidden dangers: the blind trust placed in these software products. Many companies assume that the software they purchase, and use is secure and free from vulnerabilities, but recent high-profile software supply chain breaches have proven otherwise. The reality is that every piece of software, no matter how reputable the source, increases the organization’s attack surface and poses new risks. Read Now

  • Impact on Digital Transformation

    A 2023 Statista report projects that by 2030 there will be 30 billion Internet of Things (IoT) devices in use. That is three times as many as there were in 2020. The numbers continue to grow because connecting sensors and systems, especially across a business, promises big efficiency gains and new insights. As such, the IoT and IIoT (Industrial Internet of Things) have become a launching pad for digital transformation -- not only for individual organizations but for entire industries. Read Now

  • Optimizing Security and Business Performance with Clarity and Control

    In recent years, the security sector has experienced a significant influx of innovative technologies that have fundamentally transformed how organizations design, implement, and oversee their security programs. The widespread adoption of cloud-based infrastructure, edge processing, and AI or machine learning (ML) driven analytics has brought about revolutionary changes in applications such as access control, video surveillance and emerging areas like threat detection and drone identification. Read Now

Featured Cybersecurity

Webinars

New Products

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file. 3