ServicesAI security
AI and cybersecurity: How AI can help us defend ourselves
Quick links
Cybersecurity using AI. A collage consisting of a hacker, a laptop with a ton of code visible on the screen, a single smartphone with a social media scroll, a computer screen that is blank. Art deco aesthetic. Mostly grayscale with a small amount of blue and gold. No text. Data streams and circuitry connecting everything and making up the background.

AI and cybersecurity: How AI can help us defend ourselves

By Jacob Andra / Published December 3, 2024 
Last Updated: December 3, 2024

Executive summary:

Cybersecurity teams face an inflection point as artificial intelligence reshapes the threat landscape. Adversaries increasingly leverage AI to automate attacks, evade detection, and exploit vulnerabilities at unprecedented scale.

While AI promises to strengthen cyber defenses, AI products lack the flexibility and transparency needed for high-stakes security operations. Organizations need AI frameworks that adapt to evolving threats while maintaining clear accountability. Cognitive Hive AI (CHAI) enables security teams to deploy specialized AI modules that work together like analysts in a security operations center—each bringing unique capabilities while contributing to comprehensive threat detection and response.

To explore how CHAI can further your objectives in today’s threat landscape, reach out to Talbot West, and we’ll have an introductory discovery call.

BOOK YOUR FREE CONSULTATION
Main takeaways
State and criminal actors use AI to increase the sophistication and scale of cyber attacks.
Current AI security products cannot adapt quickly enough to emerging threats.
Security teams need explainable AI they can trust in critical operations.
Modular AI frameworks allow rapid deployment of new capabilities.
CHAI enables precise configurations for specific security requirements.

The AI arms race in cybersecurity

Government agencies, the defense community, and corporate security teams face a stark reality: cyber threats are more sophisticated and ruthless than ever before.

  • The 2023 breach of multiple U.S. government agencies through Microsoft's cloud infrastructure took 98 days to detect, even with traditional monitoring tools in place.
  • Chinese state actors exfiltrated over 60 terabytes of data from defense contractors in 2023 by using AI to mimic normal network behavior.
  • Russian groups used AI-enhanced social engineering to compromise credentials at over 17 federal agencies last year.
  • Iranian hackers deployed AI-driven network mapping tools that reduced typical reconnaissance time from weeks to hours.

Rather than targeting individual vulnerabilities, adversaries use AI to identify patterns of weakness across entire organizations. Instead of crafting single phishing emails, they generate thousands of contextually-aware messages. Where human operators might take days to map a network, AI-powered tools accomplish it in hours.

We face three fundamental challenges in the current cyber landscape. First, the volume of potential threats has grown beyond human analytical capacity. A typical enterprise now faces millions of daily security events that could signal an intrusion. Second, attacks move faster than the speed of detection capabilities. By the time teams detect one attack vector, adversaries have already shifted to new techniques. Third, attacks have become more subtle as adversaries disguise malicious activity as normal behavior.

Traditional security approaches—whether manual analysis or legacy tools—cannot keep pace with this new reality. Organizations need defensive capabilities that can process massive data volumes in real time, adapt swiftly to new threats, and detect subtle patterns of malicious activity. They also need these capabilities in frameworks they can trust for security operations.

To detect and attribute cyber threats rapidly, we need new capabilities.

How AI can enhance cyber defense

When we talk about AI for cyber defense, we’re talking about a range of technologies, not just generative AI. This ecosystem encompasses neural networks, machine learning algorithms, large language models (LLMs), natural language processing (NLP) systems, geospatial analysis, and more. Let’s look at some of the ways these technologies can play a role in cyber defense.

Threat detection and prevention

Machine learning models have the potential to detect anomalies in network traffic, flag suspicious patterns, and identify behaviors indicative of attacks.

  • Anomaly detection: Algorithms ,such as isolation forests and autoencoders, can model normal network behavior and flag deviations that might signal attacks.
  • Malware detection: Deep learning models, including convolutional and recurrent neural networks, may identify malware by analyzing code patterns, API call sequences, or binary structure, often detecting zero-day threats.
  • Phishing detection: Natural language processing (NLP) models can analyze email content, sender information, and embedded images to detect phishing and social engineering attempts.

Incident response and remediation

AI-powered tools streamline and optimize incident response processes, reducing human workload and improving speed and precision.

  • Security orchestration, automation, and response (SOAR): These platforms automate responses to security incidents, such as isolating compromised systems or updating firewall rules.
  • Adaptive response systems: Reinforcement learning models enhance decision-making in incident response, learning from past events to improve accuracy over time.

Threat attribution and intelligence correlation

AI can connect disparate data points, offering insights into the origin and nature of attacks.

  • Open-source intelligence (OSINT): AI can correlate data from public records, social media, geospatial imagery, and sensor networks to provide actionable insights.
  • Cross-domain fusion: AI systems can integrate signals from different domains—cyber, physical, and informational—to identify patterns and uncover coordinated attacks.
  • Hacker forum analysis: NLP and sentiment analysis models can scan underground forums for mentions of vulnerabilities, tools, or tactics, potentially linking discussions to known threat actors.

Behavioral analytics and identity security

AI can help secure systems by monitoring and analyzing user and entity behavior, flagging deviations from established patterns.

  • User and entity behavior analytics (UEBA): AI systems may use clustering and time-series analysis to detect insider threats or compromised accounts by profiling normal behavior over time.
  • Behavioral biometrics: AI can analyze keystrokes, mouse movements, and navigation patterns to detect anomalies, adding an extra layer of identity verification.

Vulnerability management and assessment

AI tools can identify and prioritize vulnerabilities, predict potential exploits, and guide remediation efforts.

  • Automated vulnerability scanners: These tools use machine learning to analyze code and configurations, highlighting weaknesses and suggesting fixes.
  • Predictive analytics: AI models can forecast vulnerabilities based on historical trends and current system configurations for proactive patching.

Strategic awareness and forecasting

AI can enhance situational awareness by offering predictive insights and supporting long-term threat forecasting.

  • Geospatial analysis: AI can process satellite imagery, environmental data, and sensor inputs to identify physical risks to critical infrastructure.
  • Threat forecasting: Time-series models can predict emerging threats by analyzing historical attack patterns and real-time intelligence streams.
  • Hybrid intelligence: Human-in-the-loop AI can facilitate collaboration between machine intelligence and human experts so that strategic decisions are informed by computational precision and domain expertise.

Enhanced cyber deception and defense-in-depth

AI can fortify security through dynamic deception tactics and layered defenses.

  • Honeypots and traps: Certain types of neural networks (for example, generative adversarial networks) could create realistic decoy systems to mislead attackers while gathering intelligence on their methods.
  • Dynamic defenses: AI can adjust defensive configurations in real time, responding to evolving attack vectors to maintain robust security.

Operational efficiency and automation

AI can optimize cybersecurity operations by automating repetitive tasks and streamlining fragmented workflows.

  • Security information and event management (SIEM) augmentation: SIEM systems use AI to analyze logs, correlate events, and generate actionable alerts to enhance security monitoring and response.
  • Automated malware analysis: AI systems disassemble and analyze malware, potentially identifying its functionality and mitigating its impact without requiring human intervention.
  • Ticket resolution: AI-powered tools handle routine tasks such as resetting passwords or managing access requests, freeing analysts to focus on higher-priority threats.

The fallacy of the "perfect AI product"

A monolith that represents an AI product, covered with circuitry and signals. Art deco aesthetic. Mostly grayscale with a small amount of blue and gold. No text. Data streams and circuitry connecting everything and making up the background.

From automated threat detection and behavior analysis to predictive analytics and incident response, AI technologies are powerful tools for strengthening security operations. This potential drives many organizations to search for the "right AI product."

However, this search for a perfect product reflects a fundamental misunderstanding of the technology and the challenge. Every complex security operation requires a unique set of capabilities.

For example:

  • One use case might require threat detection modules analyzing network traffic, machine learning algorithms processing threat intelligence, computer vision systems monitoring infrastructure, and pattern recognition correlating user behaviors.
  • Another use case might require social media listening capabilities combined with natural language processing for disinformation detection, geospatial analysis of infrastructure threats, blockchain analytics for cryptocurrency tracking, and signals intelligence processing to identify coordinated campaigns.

No single product delivers the specific ensemble of capabilities for your use case. And if it did, your use case would shift and demand new capabilities in the future; any static product would not adapt in time.

AI products force organizations to choose between incomplete capabilities or multiple overlapping tools. A product might excel at network monitoring but lack the ability to process threat intelligence. Another might offer strong endpoint protection but prove impossible to deploy in classified environments. When organizations attempt to bridge these gaps by layering multiple products, they often create new vulnerabilities between systems.

Beyond the limitations of current AI tools

Even when organizations adjust their expectations and attempt to combine multiple AI security tools, they encounter deeper structural limitations.

Traditional AI security products operate as "black boxes," making decisions through opaque processes that resist scrutiny. When these systems flag potential threats or sophisticated attacks, security teams cannot examine their logic or adjust their parameters. This opacity creates serious risks in environments where each decision must be explainable and every action must leave a clear audit trail.

The static nature of these tools poses an equally serious challenge. While vendors periodically release updates, the core capabilities of each product remain largely fixed. This rigidity creates a fundamental mismatch with modern cyber threats, where attackers constantly refine their techniques and develop new evasion methods. By the time vendors push new detection capabilities, adversaries have often moved on to different attack patterns.

Integration challenges compound these limitations. Different AI tools often use incompatible data formats, conflicting APIs, and isolated processing frameworks. Even when organizations manage to connect multiple tools, the resulting systems often operate more like a collection of independent sentries than a coordinated defense force. This fragmentation creates seams between systems that attackers can exploit.

Security teams also face practical deployment constraints. Many AI products demand specific infrastructure configurations or cloud connectivity that are impossible in classified environments. Others require extensive retraining to handle new data sources or threat types, making rapid adaptation impractical. These operational limitations force teams to compromise between security requirements and technological capabilities.

These structural issues reflect a deeper problem: traditional AI products embody an outdated model of security technology. Modern cyber defense requires systems that can evolve continuously, operate transparently, and coordinate seamlessly across multiple defensive domains. Meeting this need demands a fundamentally different approach to AI architecture.

CHAI: A new paradigm for AI in cyber defense

Cognitive Hive AI (CHAI) represents a fundamentally different approach to implementing AI in cybersecurity operations. Rather than deploying monolithic products, CHAI assembles precise combinations of AI capabilities through a modular architecture.

A modular approach to AI implementation. A cybernetic beehive with satellite beehives that are smaller. The central one is larger and controls the others. NO TEXT. Each beehive is covered in circuitry and code and data. Art deco aesthetic. Mostly grayscale with a small amount of blue and gold. No text. Data streams and circuitry connecting everything and making up the background.

Think of CHAI like a security operations center where specialized AI modules work together as a coordinated team. Each module brings distinct capabilities—whether analyzing network traffic, processing threat intelligence, or correlating user behaviors. These modules share insights through standardized interfaces while maintaining operational independence. When new threats emerge, security teams can deploy additional modules or update existing ones without disrupting ongoing operations.

CHAI advantages

CHAI offers precise configuration for specific needs. Organizations can assemble exactly the capabilities they require, from air-gapped deployment modules for classified environments to specialized analytics for unique threat vectors.

  • Detection modules that analyze network traffic, system logs, and user behaviors.
  • Processing modules that handle specific data types such as satellite imagery or signals intelligence.
  • Analytics modules employing various AI models from neural networks to quantitative analysis.
  • Integration modules that enable air-gapped operation or cloud deployment.
  • Specialized modules for industry-specific requirements, such as SCADA system monitoring.
  • Response modules that automate containment actions and threat mitigation.
  • Etc.

CHAI delivers transparent operations with clear accountability. Unlike black-box systems, CHAI maintains visible decision paths and detailed audit trails. This explainability enables trust in the system’s recommendations.

  • Security teams can examine how modules reach conclusions.
  • Analysts can validate findings and adjust parameters in real time.
  • Decision chains remain traceable for compliance and review.
  • Module interactions are documented for comprehensive oversight.
  • Teams can understand and trust system recommendations.

CHAI's standardized, MOSA-compliant interfaces enable modules to share insights while avoiding the fragmentation of multiple isolated tools. This coordination helps security teams spot attacks that might otherwise slip between system boundaries.

  • Coordinated insights across security domains.
  • Integration with existing security infrastructure.
  • Interoperability between different module types.
  • Clear protocols for module communication.
  • Future compatibility through open standards.

With CHAI, security teams can rapidly adapt to emerging threats. When new attack patterns emerge, organizations can deploy targeted countermeasures without waiting for vendor updates. This agility keeps you ahead of evolving threats rather than constantly playing catch-up.

  • Swift deployment of new defensive capabilities.
  • Targeted updates to specific modules.
  • Continuous evolution without system-wide disruption.
  • Integration of emerging technologies as they mature.
  • Quick response to novel attack patterns.

2-way natural language interaction with CHAI

Unlike other security tools that simply broadcast alerts, CHAI enables true two-way interaction between analysts and AI modules. Security teams can query the system in natural language to probe specific findings, explore potential patterns, or investigate emerging threats.

For example, an analyst noticing unusual authentication patterns might ask CHAI to explain what specific behaviors triggered the alert, compare this activity to historical baselines, or search for similar patterns across other systems. The system can pull relevant data from multiple modules, correlate findings, and present clear explanations in natural language.

This interactivity extends beyond simple queries. When CHAI's modules detect ambiguous patterns or face decisions with significant operational impact, they can pause to consult human experts. The system clearly presents its analysis, explains its uncertainty, and incorporates analyst feedback to improve future decisions. This creates a genuine partnership between human expertise and AI capabilities.

Analysts can also guide CHAI's focus in real time as situations evolve. During incident response, teams might direct the system to hunt for specific indicators, analyze particular time periods, or investigate potential impact across different network segments. The system's modules coordinate to execute these requests via recursive asynchronous function calls, while maintaining ongoing monitoring.

CHAI is a system of systems framework for AI implementation

CHAI can nest capabilities from granular technical functions to comprehensive strategic operations. Like a set of Russian dolls, CHAI ensembles can operate independently or become components within larger systems.

Here’s an example: A targeted CHAI ensemble might focus on supply chain integrity by correlating vendor network activities, software update patterns, code signing certificates, and development environment access. This specialized ensemble operates as a complete unit for supply chain security.

This supply chain ensemble could then integrate into a broader cyber defense framework that incorporates network surveillance, endpoint protection, and threat intelligence processing. The broader framework coordinates these various security functions while maintaining the independence of each component ensemble.

The cyber defense framework could, in turn, connect to a theater-wide security architecture that combines cyber operations with physical security monitoring, signals intelligence, and infrastructure protection. Each level operates independently while contributing to more comprehensive capabilities. Updates or changes at one level don't disrupt operations at other levels.

This system of systems paradigm enables organizations to start with focused solutions for specific challenges and expand systematically as needs evolve. A team might begin with a narrowly targeted ensemble for network monitoring, later incorporating it into a comprehensive security operations center. The initial investment remains valuable even as the broader system grows.

Rather than deploying complete solutions immediately, U.S. organizations can build capabilities incrementally while maintaining clear paths for future expansion. This flexibility is especially valuable in complex security environments where requirements constantly evolve.

Implementing CHAI in your security operations

While CHAI's capabilities are powerful, achieving operational benefits requires systematic implementation. Most organizations find success by starting with a focused deployment that addresses a specific security challenge.

For example, a defense contractor might begin with CHAI modules focused on detecting sophisticated supply chain compromise attempts. A government agency could start with modules that analyze authentication patterns to spot credential theft. This targeted approach lets teams validate capabilities and build expertise before expanding to broader use cases.

Successful deployment depends on several factors. Organizations need clean, reliable data sources. CHAI modules analyze data from your existing security tools, network monitoring, authentication systems, and other sources. Understanding what data you have, where it lives, and how to access it securely forms the foundation for effective implementation.

Infrastructure readiness also shapes deployment success. While CHAI modules can operate in air-gapped environments, they need appropriate compute resources and secure environments for data processing. Organizations should evaluate their infrastructure early to identify gaps that could impact implementation.

Team preparation plays an equally important role. Security analysts need to understand how to work effectively with AI systems—not just using the technology but interpreting its insights and knowing when to apply human judgment. This typically involves updating workflows and establishing clear procedures for handling AI recommendations.

The path forward

As cyber threats grow more sophisticated, the strategic advantage will increasingly belong to organizations that effectively harness AI for defense. Those who master modular, adaptive AI will detect threats faster, respond more effectively, and maintain more resilient security postures than those relying on traditional approaches or monolithic AI products.

However, implementing AI for cybersecurity requires more than just selecting the right technology. Organizations need:

  • Clear governance frameworks for AI operations.
  • Defined processes for validating AI insights.
  • Training programs to help analysts work effectively with AI systems.
  • Methods for measuring AI system effectiveness.
  • Procedures for continuously refining AI capabilities.

The future of cybersecurity lies not in finding perfect AI products, but in building adaptive, explainable AI deployments. Cognitive Hive AI is the framework for this evolution.

To explore how CHAI can strengthen your cyber defenses, contact Talbot West for a detailed capability assessment. Our experts can help you develop an implementation strategy that aligns with your specific security requirements and operational constraints.

FAQ on AI and cybersecurity

APTs are sophisticated cyber actors, typically state-sponsored, who maintain long-term unauthorized access to networks while evading detection. Unlike common cybercriminals seeking quick financial gain, APTs focus on espionage, intellectual property theft, and strategic advantage. Their campaigns often last months or years, utilizing custom malware and living-off-the-land techniques that make them especially dangerous to critical infrastructure and national security.

Key indicators include phishing attempts targeting specific employees, unusual network traffic patterns, anomalous data transfers during off-hours, and subtle attempts to escalate privileges across systems. However, definitive attribution is challenging since state actors excel at disguising their activities as normal behavior or misdirecting blame to other groups.

Gray zone warfare describes actions that stay below the threshold of conventional military conflict while advancing strategic objectives. Cyber operations are a key component: state actors conduct espionage, sabotage infrastructure, or influence operations while maintaining plausible deniability. These activities often combine multiple vectors including supply chain compromise, social engineering, and network intrusion.

AI-enhanced malware can dynamically adapt to evade detection, learn from defense responses, and automatically identify optimal paths for lateral movement through networks. It can also generate polymorphic code variations and customize its behavior based on the target environment, making it significantly harder to detect and contain than traditional malware.

While quantum computers could eventually break current encryption methods, they also offer potential advantages for cybersecurity including quantum-resistant cryptography and enhanced pattern detection. Organizations should prepare for quantum impacts by implementing crypto-agile architectures that adapt to post-quantum algorithms.

Zero trust principles require AI components to continuously verify their authority to access resources. This helps prevent compromised AI modules from being used as attack vectors and enables proper segmentation of AI system components.

Supply chain compromises introduce vulnerabilities into AI systems through tainted training data, compromised model updates, or manipulated dependencies. Organizations must maintain rigorous supply chain security practices including vendor assessment, component verification, and continuous monitoring of AI system dependencies.

Adversaries increasingly use techniques to fool AI systems through poisoned training data or carefully crafted inputs. Defensive measures include robust model validation, continuous monitoring for effectiveness degradation, and implementing ensemble approaches that cross-validate decisions across multiple AI models.

While automated tools follow pre-defined rules and procedures, AI security systems learn from experience, adapt to new threats, and identify subtle patterns that rules-based systems miss. AI systems also understand context, correlate seemingly unrelated events, and make nuanced decisions based on multiple factors.

AI systems can establish baseline behavior patterns for users and systems, then identify subtle deviations that might indicate insider activity. They correlate physical access patterns, network activity, and data access behaviors to spot potential insider threats before significant damage occurs.

Beyond traditional security expertise, analysts need an understanding of AI capabilities and limitations, data analysis skills, and the ability to validate AI findings. They should understand basic machine learning concepts, know how to interpret AI outputs, how to query AI systems for deeper levels of insight, and how to audit AI recommendations to achieve trustworthiness.

Organizations must secure AI systems through proper access controls, regular security testing, and continuous monitoring for signs of compromise. This includes protecting training data, securing model updates, and implementing proper segmentation of AI components.

Effective cyber defense requires collaboration between government agencies and private sector organizations in sharing threat intelligence, developing new capabilities, and coordinating responses to threats. AI systems facilitate this collaboration while maintaining appropriate security boundaries.

Resources

  • Cybersecurity and Infrastructure Security Agency, Federal Bureau of Investigation, & National Security Agency. (2024, September 5). Russian Military Cyber Actors Target US and Global Critical Infrastructure. https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-249a
  • Industrial Cyber. (2024, October 15). Trend Micro reveals Earth Simnavaz APT targets Gulf organizations using Microsoft Exchange server backdoor. https://industrialcyber.co/ransomware/trend-micro-reveals-earth-simnavaz-apt-targets-gulf-organizations-using-microsoft-exchange-server-backdoor/
  • Industrial Cyber. (2024, November 17). Chinese APT group Earth Estries targets critical infrastructure sectors with advanced cyber attacks. https://industrialcyber.co/ransomware/chinese-apt-group-earth-estries-targets-critical-infrastructure-sectors-with-advanced-cyber-attacks/
  • Google Cloud. (2024). APT Groups. https://cloud.google.com/security/resources/insights/apt-groups
  • Security.com. (2017). Dragonfly: Energy Sector Cyber Attacks. https://www.security.com/threat-intelligence/dragonfly-energy-sector-cyber-attacks
  • Andra, J. (2024, November 14). System of systems in AI. Talbot West. https://talbotwest.com/ai-insights/system-of-systems-in-ai
  • Andra, J. (2024, October 28). What is MOSA in defense systems? Talbot West. https://talbotwest.com/industries/defense/what-is-mosa-in-defense-systems
  • Andra, J. (2024, October 30). Cognitive hive AI, CHAI, and modular open system approach (MOSA). Talbot West. https://talbotwest.com/industries/defense/cognitive-hive-ai-chai-and-modular-open-system-approach-mosa
  • Andra, J. (2024, November 29). Open source intelligence (OSINT) with AI for better insights. Talbot West. https://talbotwest.com/ai-insights/open-source-intelligence-osint-with-ai-for-better-insights

About the author

Jacob Andra is the founder of Talbot West and a co-founder of The Institute for Cognitive Hive AI, a not-for-profit organization dedicated to promoting Cognitive Hive AI (CHAI) as a superior architecture to monolithic AI models. Jacob serves on the board of 47G, a Utah-based public-private aerospace and defense consortium. He spends his time pushing the limits of what AI can accomplish, especially in high-stakes use cases. Jacob also writes and publishes extensively on the intersection of AI, enterprise, economics, and policy, covering topics such as explainability, responsible AI, gray zone warfare, and more.
Jacob Andra

Industry insights

We stay up to speed in the world of AI so you don’t have to.
View All

Subscribe to our newsletter

Cutting-edge insights from in-the-trenches AI practicioners
Subscription Form

About us

Talbot West bridges the gap between AI developers and the average executive who's swamped by the rapidity of change. You don't need to be up to speed with RAG, know how to write an AI corporate governance framework, or be able to explain transformer architecture. That's what Talbot West is for. 

magnifiercrosschevron-downchevron-leftchevron-rightarrow-right linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram