the-automation-king
Thursday, May 15, 2025
  • Home
  • Artificial Intelligence
  • Business Marketing
  • E-Commerce
  • Project Management
  • Startups
  • More
    • Cutomer Relationship Management
    • Finance
    • Investment
Automation King
No Result
View All Result
Home Artificial Intelligence

Agentic AI in Cybersecurity: 10 Real-life Use Cases

Names Rexx by Names Rexx
December 16, 2024
in Artificial Intelligence
0 0
0
Agentic AI in Cybersecurity: 10 Real-life Use Cases
0
SHARES
0
VIEWS
Share on FacebookShare on Twitter


Organizations can improve their preparedness, response, and restoration by leveraging agentic AI for cybersecurity. AI brokers allow organizations to foretell and deal with vulnerabilities by:

  • monitoring the digital panorama 24/7
  • detecting anomalies
  • responding to threats faster than people

For instance, AppSec AI brokers like Aptori can combine into your IDE and CI/CD pipeline to run automated pentest to determine in case your APIs are free from vulnerabilities.

Examples of AI brokers in cybersecurity

  • Tier 1 brokers are answerable for the preliminary detection and triage of a possible safety menace.
  • Tier 2 brokers are answerable for taking actions like:
    • isolating affected programs 
    • eradicating malware
    • patching vulnerabilities
    • restoring compromised information
  • Tier 3 brokers are answerable for leveraging safety instruments for menace searching and in-depth evaluation. These brokers typically have capabilities like:
    • automated menace detection 
    • complicated vulnerability scanning
    • pentesting
    • malware evaluation

Agentic AI and safety operations (SecOps)

Safety operations (SecOps) is a collaborative strategy between IT safety and IT operations groups centered on proactively figuring out, detecting, and responding to cyber threats.

The issue: SecOps face critical fatigue since groups cope with huge information from numerous programs and quickly evolving threats whereas navigating complicated organizational constructions and compliance necessities.

How can agentic AI assist: AI is particularly efficient at “reasoning duties” similar to analyzing alerts, conducting predictive analysis, and synthesizing information from instruments.

Thus, AI brokers in SecOps might help automate duties that require real-time evaluation, and decision-making similar to phishing, malware, credential breaches, lateral motion, and incident response.

For instance, these instruments may be educated on MITRE ATT&CK information bases to imitate the experience of human analysts or use incident response playbooks to:

  • enrich alerts
  • detect impacted programs
  • isolate/triage contaminated programs
  • create incident stories

Supply:

Actual-life use circumstances: Agentic AI in SecOps

1. Triage and investigation

Agentic AI detects safety alerts earlier than they attain human analysts. It automates the triage and investigation processes, imitating human SOC workflows and decision-making. AI brokers in preliminary triage and investigation can leverage:

Alert deduplication: Figuring out duplicate occasions to scale back noise.

Alerts grouping: Clustering alerts associated to a selected asset (e.g., endpoint, server).

Alert enrichment: Including essential context for simpler investigations, together with:

  • IOC (indicator of compromise) enrichment:
    • Test if an IP deal with on a blacklist
    • Evaluate file hashes to malware databases
  • Machine enrichment: (e.g. gives information about affected programs)
  • Account enrichment: (e.g. gives information about person identities)

Actual-life case research: AI brokers leveraging triage and investigation

Challenges — A digital insurance coverage firm serving over 2 million prospects has confronted points dealing with massive volumes of claims and managing insurance policies effectively.

The corporate’s early safety configuration required guide alert administration, which was resource-intensive. This created a number of challenges, together with:

  • Excessive quantity of safety alerts: As the amount of safety alerts elevated, the SOC workforce was challenged to conduct guide investigations. 
  • Time-consuming processes: Manually investigating every alert required vital work from the SOC workforce. Analysts needed to filter by way of massive quantities of knowledge to detect potential dangers. 
  • Want for steady 24/7 monitoring: Sustaining 24/7 surveillance with a human-only workforce was difficult and expensive.

Options and final result: The corporate deployed a cybersecurity AI agent and built-in this agent with present programs like AWS, Google Workspace, and Okta. The next outcomes have been achieved:

  • Lowering the guide burden allowed SOC analysts to prioritize higher-value duties.
  • Steady monitoring ensured no missed alerts, leading to an improved stage of vigilance than human-only groups.
  • Detailed investigation stories supplied a granular stage of study, rising the visibility into IOC (indicator of compromise).
  • Discount in false positives improved accuracy in menace detection, permitting the workforce to give attention to main dangers.

2. Adaptive menace searching

Agentic AI can be utilized in cybersecurity programs to detect and reply to threats in real-time. For instance, these brokers can determine uncommon community conduct and isolate impacted gadgets autonomously to forestall a compromise with out human intervention.  

Whereas leveraging menace searching, AI brokers take a number of actions, together with: 

Decomposing the alert:

  • Indicator classification: Categorizing the alerts into varied forms of indicators:
    • Atomic Indicators: Fundamental components like IP addresses, domains, electronic mail addresses, and file hashes.
    • Computed Indicators: Info derived from information evaluation, similar to malware file sizes or encoded strings.
    • Behavioral indicators: Patterns of conduct, together with ways, strategies, and procedures (TTPs) employed by menace actors.

Trying to find atomic (e.g. IP deal with) and computed indicators ( e.g. behavioral anomalies):

  • Creating queries to go looking historic information throughout SIEMs, or different related instruments for the recognized IOCs.
  • Accessing quite a few programs and requesting all related platforms concurrently to gather information from many sources.

Analyzing behavioral indicators:

  • Mapping pc community protocol for management programs by connecting behavioral indicators and utilizing frameworks like MITRE ATT&CK. 
  • Looking out historic alerts and information throughout linked programs.

Actual-life case research: AI brokers leveraging menace searching

The College of Kansas Well being System, one of many Midwest’s largest medical suppliers, serves virtually 2.5 million sufferers throughout three hospitals. 

Challenges — The College of Kansas Well being System had difficulties in coordinating incident response, among the key challenges embrace:

  • Lack of visibility: Distributed programs and instruments made it difficult to mitigate threats throughout the whole assault floor.
  • Restricted incident response: No centralized or standardized course of for response precipitated poor coordination between groups.
  • Worker useful resource constraints: A small workforce of staff managed the whole incident response workload, resulting in overextension and burnout.

Options and final result: The College of Kansas Well being System applied a safety platform with Agentic AI capabilities to enhance visibility and automate incident response threat-hunting. The next outcomes have been achieved:

  • Visibility throughout programs elevated by over 98%
  • Detection protection has improved by 110% inside six months.
  • Automated incident response processes filtered and resolved 74,826 out of 75,000 alerts, escalating solely 174 for guide overview.
  • True positives amongst escalated alerts totaled 38, lowering noise and enabling centered responses.

3. Response actions

Producing infrastructure as code: Utilizing code to handle and provision computing assets as an alternative of guide processes, examples embrace:

  • Producing OpenTofu and Pulumi templates for remediation, prepared for DevOps overview. 
  • Configuring elements like working programs, middleware, and purposes.

Performs endpoint actions: Getting into a response motion command within the console’s enter space.

Safety controls: Updating blocklists or firewall guidelines as new safety incidents emerge.

Actual-life case research: AI brokers leveraging response actions

Challenges — APi Group, a contracting and distribution group, faces as a part of their progress technique and managing IT safety throughout acquisitions after buying smaller corporations:

  • Various know-how stacks: Acquired corporations got here with different and infrequently incompatible IT safety know-how stacks (Microsoft E5 safety suite).
  • Visibility throughout the ecosystem: The corporate’s increasing assault floor from acquisitions creates blind spots.

Options and final result: To handle the above challenges, APi Group applied ReliaQuest’s agentic AI platform to boost menace detection for its Microsoft environments. The next outcomes have been achieved:

  • Lowered response occasions by 52% By automation and built-in playbooks.
  • Achieved a 47% enhance in visibility throughout Microsoft 365, Cisco, and Palo Alto stacks.
  • Expanded MITRE ATT&CK protection by 275%, enabling higher prioritization of assets.

Agentic AI and software safety (AppSec) 

Utility safety entails defending apps throughout their full lifecycle, which covers design, improvement, deployment, and steady upkeep. 

The issue: As hosted apps turned more and more vital as key income drivers for public-scale enterprises, so did their safety—this created current tendencies similar to: 

  • Large utilization of Cloud, SaaS purposes has moved safety earlier within the SDLC to reduce dangers earlier than they attain manufacturing.
  • With the rise in cloud-native programming, extra migration to third-party platforms similar to AWS has occurred, thus the assault floor for apps turns into extra uncovered to vulnerabilities.

Because of rising assault floor and potential, attackers developed new and creative strategies of compromising apps. 

How can agentic AI assist: Agentic AI might help improve AppSec by integrating and automating varied phases of the appliance lifecycle to boost safety, together with monitoring your CI/CD pipelines or automating your pent testing. 

Actual-life use circumstances: Agentic AI in AppSec

5. Threat identification

Agentic AI serves as a vigilant sentinel, constantly analyzing your atmosphere for threats and potential vulnerabilities in purposes and code bases. AI brokers can execute, exterior and inner discovery to determine threats:

Exterior discovery:

  • Storing and classifying information about your apps, and APIs.
  • scanning for uncovered net servers.
  • discovering open ports on internet-facing IP addresses.

Inner discovery:

  • Evaluating runtime configurations, figuring out points, and prioritizing.
  • API accessibility & performance visualization
  • App-API visualization and utilization
  • Agentless AWS & Azure API workload monitoring
  • App visitors quantity & sample evaluation

Actual-life device instance: Instruments like Ghost combine into CI/CD pipelines to supply steady visibility and danger evaluation throughout software improvement.

6. Utility check creation and adaptation

AI brokers generate assessments robotically relying on person interactions with the appliance. As testers or builders use the device to seize check circumstances, the AI displays and creates check scripts.

If the appliance’s UI modifications (for instance, a component’s ID modifications or the format modifications), the AI agent might determine these modifications and customise the check scripts to keep away from failure.

7. Dynamic software check execution

Agentic AI constantly executes assessments in different contexts (e.g., throughout a number of browsers and gadgets) with out human interplay. The AI brokers can schedule assessments and analyze software conduct autonomously to make sure full testing protection.

They’ll additionally dynamically customise check parameters, similar to copying totally different person information inputs or altering community circumstances, to permit for a extra thorough software evaluation.

8. Autonomous reporting and predictive ideas

AI Brokers can study software testing information autonomously, discovering failure patterns and figuring out core causes. 

For instance, if quite a few assessments fail because of the identical drawback, the AI Agent will mix the findings and spotlight the underlying problem to the event workforce.

Based mostly on earlier check information, the AI brokers can predict potential future failures and suggest software testing methodologies to deal with these points.

9. Autonomous remediation

Agentic AI  automates the remediation course of, for instance, if the AI agent detects that sure assessments are redundant or don’t adequately cowl particular dangers, it might optimize the check suite by deleting unrelated assessments and prioritizing these that target extra related areas.

The AI agent may detect when a check fails because of minor errors (similar to a minor UI change) and “remediate” the check script to adjust to the revised software, eliminating false positives and requiring much less guide involvement.

10. Automated pentesting

Agentic AI automates the penetration testing course of, together with the identification of vulnerabilities, technology of assault plans, and execution. Some key practices of AI brokers in pentesting initiatives embrace:

Actual-time adversary simulation:

  • Conducting simulations like community, software, and social engineering assaults.
  • Executing penetration assessments similar to DAST (dynamic software safety testing).

Reconnaissance:

  • Scanning the web, together with the deep, darkish, and floor net, to detect uncovered IT belongings (e.g., open ports, misconfigured cloud buckets).
  • Integrating OSINT (open-source intelligence) and menace intelligence to map assault surfaces.

Actual-life device instance: Instruments like FireCompass present semantic testing for APIs, creating tailor-made assault eventualities that automate pentesting efforts.

4 advantages of Agentic AI for safety groups

By implementing an agentic AI technique, SOCs might acquire super advantages by way of operational effectivity and workforce morale. Listed here are 4 main advantages of this know-how:

  1. Discovering extra assaults: Agentic AI evaluates every alert, connects information from a number of sources, and conducts in depth investigations. This enables SOCs to determine detection alerts that point out actual assaults, exposing risks that might in any other case go undetected.
  1. Lowering imply time to response (MTTR): By minimizing the guide bottleneck of triage and investigation, Agentic AI accelerates remediation, lowering MTTR.
  1. Rising productiveness: Agentic AI permits for the overview of every safety alert, which might be tough for human analysts to carry out on a big scale. This relieves analysts of repetitive jobs, permitting them to give attention to extra difficult safety initiatives and strategic work.
  1. Enhancing analyst retention: Agentic AI improves analyst morale and retention by performing routine triage and investigation work, remodeling the operate of SOC analysts. As an alternative of performing tedious, repetitive duties, analysts can give attention to evaluating stories and specializing in high-value initiatives. This transfer will increase job satisfaction, which helps to retain expert analysts and improves total productiveness.

Challenges of agentic AI in cybersecurity

1. Lack of transparency and interpretability

  • Opaque decision-making: AI-driven safety operations and programs may be tough to interpret, particularly once they modify safety insurance policies or choices on their very own. Take a look at engineers and builders might battle to understand why sure actions have been made or to verify the AI’s choices.
  • Belief and reliability: With out express explanations, it is likely to be tough for groups to belief the AI’s suggestions or revisions, resulting in resistance to implementing agentic AI options.

2. Knowledge high quality considerations

  • Knowledge reliance:  AI brokers want numerous information to learn to carry out actions successfully. Inadequate or biased information may end up in false actions or incorrect forecasts.
  • Edge circumstances in system configurations: If a company’s IT infrastructure contains bespoke configurations or uncommon software program combos, an AI agent might misread regular behaviors as anomalies or fail to detect real threats.

3. Sustaining reliability

  • False positives and negatives: Agentic AI can incorrectly classify information associated to SecOps or AppSec, leading to false positives (reporting bugs when none exist) or false negatives (failing to detect precise points). These errors might compromise belief within the system and require guide intervention to validate outcomes.
  • Adaptability issues: Though agentic AI is designed to adapt to modifications, sure complicated or sudden modifications within the software (for instance, main UI redesigns or backend structure modifications) should still trigger safety operations to fail, necessitating human intervention to replace the AI’s fashions.

4.  Complexity of implementation

  • Problem in safe API integration: AI brokers ceaselessly interface with exterior programs, subsequently defending APIs is essential. API tokenization and validation are all measures that assist to make sure a dependable interplay.
  • Coaching and deployment: Agentic AI fashions needs to be educated on massive datasets and numerous eventualities to be efficient, which may be resource-intensive and time-consuming.

5. Human oversight necessities

  • Steady monitoring: Whereas agentic AI goals to scale back human involvement, it nonetheless requires monitoring and upkeep to make sure that it capabilities correctly. Safety groups must confirm the AI’s outcomes, modify fashions as wanted, and become involved when the AI encounters complicated or sudden eventualities.
  • Extremely expert personnel necessities: Managing agentic AI necessitates experience in AI, machine studying, or software safety. Organizations might have issue discovering or coaching employees with the required abilities.

What’s Agentic AI: The trail from LLMs

Agentic AI, also referred to as autonomous AI or self-directed AI, refers to synthetic intelligence programs that may function autonomously to carry out particular objectives.

Not like conventional AI programs, which require human enter and steering, agentic AI programs could make choices, conduct actions, and study from their experiences with out ongoing human interplay.

This is a crucial shift from the present most common software of AI, which ceaselessly includes LLMs and people interacting with AI by way of prompts.

  • LLMs concentrate on processing and producing language or concepts based mostly on person prompts. It makes use of strategies like
    • immediate engineering to course of writing directions to information AI fashions to supply particular responses.
    • Retrieval-augmented generation (RAG) to enhance the accuracy of generative AI fashions with info fetched from exterior sources.
  • AI agents, in contrast, are action-oriented programs. They autonomously carry out duties similar to scanning networks to seek out uncommon exercise or managing workflows with minimal human oversight. 

For extra: Agentic AI: 5 steps from chatbots to secure enterprise AI agents.

Agentic AI for cybersecurity

In cybersecurity, agentic AI capabilities as an autonomous decision-maker able to monitoring networks, and analyzing information, to take proactive safety approaches towards threats.

Not like conventional safety programs that rely on pre-defined guidelines and guide interventions—typically too gradual or slender to deal with fashionable threats—agentic AI leverages its capacity to study dynamically from its atmosphere. It may take responsive actions, automate software program improvement processes, or automate pentesting.

This autonomy permits agentic AI to answer assaults extra successfully than human-controlled programs, offering enhanced agility.

Additional studying

Exterior Hyperlinks



Source link

READ ALSO

Google’s Advanced Protection for Vulnerable Users Comes to Android

Audible is giving publishers AI tools to quickly make more audiobooks

Tags: AgenticCasescybersecurityreallife

Related Posts

Google’s Advanced Protection for Vulnerable Users Comes to Android
Artificial Intelligence

Google’s Advanced Protection for Vulnerable Users Comes to Android

May 14, 2025
Audible is giving publishers AI tools to quickly make more audiobooks
Artificial Intelligence

Audible is giving publishers AI tools to quickly make more audiobooks

May 13, 2025
How a new type of AI is helping police skirt facial recognition bans
Artificial Intelligence

How a new type of AI is helping police skirt facial recognition bans

May 13, 2025
Fellow, Otter, and TL;DV [’25]
Artificial Intelligence

Fellow, Otter, and TL;DV [’25]

May 12, 2025
Why Do We Seek Virtual Companionship?
Artificial Intelligence

Why Do We Seek Virtual Companionship?

May 12, 2025
Coding, web apps with Gemini
Artificial Intelligence

Coding, web apps with Gemini

May 11, 2025
Next Post
How to Monitor Competitors’ Email Marketing

How to Monitor Competitors' Email Marketing

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

POPULAR NEWS

How AI Can Restore Old Videos

How AI Can Restore Old Videos

July 27, 2023
Ecommerce Bookkeeping 101 for Small Business: A Step-by-Step Guide (2023)

Ecommerce Bookkeeping 101 for Small Business: A Step-by-Step Guide (2023)

July 13, 2023
ChatGPT lies about scientific results, needs open-source alternatives, say researchers

ChatGPT lies about scientific results, needs open-source alternatives, say researchers

July 12, 2023
PayPal Chime New Checking Accounts Bank of America Wells Fargo

PayPal Chime New Checking Accounts Bank of America Wells Fargo

July 5, 2023
Why Succeed When You Can Struggle? Skip These Brand Monitoring Tools!

Why Succeed When You Can Struggle? Skip These Brand Monitoring Tools!

July 8, 2023

EDITOR'S PICK

Why is Sales Performance Important For My Business?

Why is Sales Performance Important For My Business?

December 2, 2023
What to Sell on TikTok Shop:  11 Surefire Bestsellers

What to Sell on TikTok Shop: 11 Surefire Bestsellers

August 21, 2024
The Startup Magazine Career Decisions: Key Factors to Consider When Choosing a Job

The Startup Magazine Career Decisions: Key Factors to Consider When Choosing a Job

July 22, 2024
How SMBs Can Navigate the Trend of Rising Marketing Costs

How SMBs Can Navigate the Trend of Rising Marketing Costs

October 30, 2023

Recent Posts

How women in Canada can start investing

How women in Canada can start investing

May 15, 2025
Is eBay Good for Print-on-Demand?

How to Dynamically Change Pricing in Shopify: A Step-by-Step Guide

May 14, 2025

Categories

  • Artificial Intelligence
  • Business Marketing
  • Cutomer Relationship Management
  • E-Commerce
  • Finance
  • Investment
  • Project Management
  • Startups

Follow Us

Recommended

  • How women in Canada can start investing
  • How to Dynamically Change Pricing in Shopify: A Step-by-Step Guide
  • How to Import LinkedIn Contacts to Your CRM (Detailed Guide)
  • When will companies start spending on climate adaptation?

© 2023 TheAutomationKing

No Result
View All Result
  • Home
  • Artificial Intelligence
  • Business Marketing
  • E-Commerce
  • Project Management
  • Startups
  • More
    • Cutomer Relationship Management
    • Finance
    • Investment

© 2023 TheAutomationKing

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In