IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

Why being human still matters in the world of cyber security

When the adversary is a wily and creative human, only man and machine working together can defeat them

carton pop art style handshake between human and robot

Disciplines such as artificial intelligence and machine learning are playing increasingly important role in cyber security, but not at the expense of human intellect.

This is one of the key messages from the first day of McAfee MPOWER, the company's annual security conference in Las Vegas.

Indeed, one of the company's two new product launches, Investigator, has this complementary approach of human and machine at its very heart.

Speaking during a press panel on "human machine teaming", McAfee CTO Steve Grobman explained why in cyber security the human element remains so vital, whereas advanced analytics and AI is replacing humans in other disciplines.

"I think cyber security is a fundamentally different field to many other areas where artificial intelligence, machine learning is being used, Grobman said. "The example I like to give is weather forecasting [because] as we get better at forecasting weather, the laws of physics don't get upset and decide to change the way water evaporates. As we get better over time at forecasting where hurricanes are going to land, we make continuous progress.

"What makes cyber security such a different field than almost everything else in natural science that's using these same technologies is there's an adversary applying game theory on the other side of the table that's going to change the game. What machines are not good at is recognising human intellect you really need humans to understand human intellect."

Celeste Fralick, chief data scientist at McAfee, said the important thing is to use both AI and human resources rationally and where they can be of greatest value.

"We're dealing with humans and we have to act like humans back," she explained. "But at scale, you don't have an opportunity to do that logically with that amount of data [coming in] so you're going to have to do something different."

Machines, she said, should be used for tasks like summarising data, identifying patterns and making predictions, while humans should do more creative thinking at a human level, such as what the adversary may be doing. Based on that and the information provided by the data science capabilities, humans should then be the ones to decide what level of intervention is required and plan out next steps.

"Cyber security far outweighs [other disciplines in] the variety of data and the amount of data that's coming in because [cyber-attacks are] human driven [and] machine driven," Fralick explained. That pairing, she said, has to be reflected in how cyber security vendors respond to the threat.

Main image credit: Bigstock

Featured Resources

Activation playbook: Deliver data that powers impactful, game-changing campaigns

Bringing together data and technology to drive better business outcomes

Free Download

In unpredictable times, a data strategy is key

Data processes are crucial to guide decisions and drive business growth

Free Download

Achieving resiliency with Everything-as-a-Service (XAAS)

Transforming the enterprise IT landscape

Free Download

What is contextual analytics?

Creating more customer value in HR software applications

Free Download

Recommended

McAfee Total Protection review: Expensive at full price
antivirus

McAfee Total Protection review: Expensive at full price

2 Nov 2021
McAfee’s zero trust solution strengthens private applications’ security
cyber security

McAfee’s zero trust solution strengthens private applications’ security

3 Aug 2021

Most Popular

16 ways to speed up your laptop
Laptops

16 ways to speed up your laptop

13 May 2022
(ISC)2 launches free scheme to get 100,000 UK citizens into cyber security
Careers & training

(ISC)2 launches free scheme to get 100,000 UK citizens into cyber security

17 May 2022
Preparing for the 3G sunset
Network & Internet

Preparing for the 3G sunset

18 May 2022