cxo voice
  • Home
  • Technology
    • AI
    • Cloud
    • Telecom
    • Data Center
    • BPM
    • Blockchain
  • Finance
    • Banking
  • Cyber Security
  • View Points
  • Leaders Talk
  • News
  • Press Release
    • Submit Press Release
No Result
View All Result
  • Home
  • Technology
    • AI
    • Cloud
    • Telecom
    • Data Center
    • BPM
    • Blockchain
  • Finance
    • Banking
  • Cyber Security
  • View Points
  • Leaders Talk
  • News
  • Press Release
    • Submit Press Release
No Result
View All Result
Leaders Talk and Latest Tech News | CXO VOICE
No Result
View All Result
Home News Cyber Security

How effective is GenAI in cybersecurity? The role of LLMs and AI in security solutions. [Interview with Steve Wilson]

Steve Wilson is the Chief Product Officer at Exabeam. He is a leader and innovator in AI, cybersecurity, and cloud computing. Author of "The Developer's Playbook for Large Language Model Security".

Arshi Khan by Arshi Khan
October 3, 2024
Steve Wilson, GenAI Cybersecurity LLMs

Image Credit: CXOVoice

Cybersecurity is often an afterthought when it comes to the adoption of Large language models (LLMs). The rapid deployment of LLMs is bringing new security challenges with it. In an exclusive interview with Steve Wilson, Chief Product Officer of Exabeam, we discuss growing cybersecurity challenges, the use of GenAI and LLM in cybersecurity, and how businesses can defend their IT infrastructure while balancing the need for digital transformation.

Tell us about Exabeam’s AI-led cloud-native security products and their usefulness in TDIR.

At Exabeam, we’ve been using machine learning-based artificial intelligence (AI) for over ten years to enable faster and more accurate threat detection, investigation, and response (TDIR). Today, AI is a core part of our cloud-native portfolio and can be described in two parts.

One part of this portfolio is our cloud-native Exabeam Security Operations Platform, which provides advanced security information and event management (SIEM) capabilities. The Exabeam Security Operations Platform applies AI and automation to help analysts ingest, parse, store, and search data with maximized efficiency.

The second part of our portfolio is our AI analytics. Our real-time, high-performance machine learning algorithms are designed to streamline the TDIR workflow to drive greater analyst efficiency. They empower security teams with insights into what’s normal in their organization and what’s abnormal and help reduce false positives.

The goal of our AI innovation is to allow security teams to easily detect hard-to-spot threats, investigate faster, and respond with greater speed. In turn, this strengthens the overall cybersecurity posture of their organization.

How effective is GenAI in cybersecurity-related solutions?

When we look at the industry, almost every cybersecurity player is exploring use cases for generative AI (GenAI) and how its features can enhance their products.

ADVERTISEMENT

Despite this, the feedback given on some of these GenAI-powered cybersecurity solutions is they are very general purpose and do not add meaningful value to security operations center (SOC) activities. Their answers are vague, they tend to hallucinate, and they can be slow and sometimes confusing.

From the start, our approach at Exabeam was to build our GenAI models based on real-time AI capabilities. Our advanced machine learning algorithms can rapidly analyze terabytes and petabytes of data, providing laser-focused output that delivers context to our GenAI-powered assistant, Exabeam Copilot.  

In turn, our copilot is providing value by filling knowledge gaps for a large variety of organizations and users. The response since its launch this year has been positive, with customers reporting that analysts are two to three times faster at completing investigation tasks when using Exabeam Copilot. It is also our fastest adopted product release to date.

How do you see the balance between automated response and the need for human expertise in AI-led cybersecurity solutions?

AI algorithms are not just a useful tool to have in cybersecurity. In today’s digital landscape, analyzing the vast amounts of data collected by security platforms is an impossible task for analysts to perform without some kind of AI and machine learning in place.

This is where real-time machine learning algorithms can help. GenAI tools are designed to summarize complicated facts and analyze certain kinds of data. Ultimately, they generate data-driven insights, such as risk scores, to which human analysts can apply their judgment.  

Whilst GenAI seems to exhibit some decision-making qualities, it is nowhere near the human level of judgment. When using these tools in a mission-critical environment, the right model is a copilot.

Deploying a copilot allows organizations to strike the right balance between AI innovation and human expertise to augment the analyst experience. This approach combines AI’s ability to analyze massive amounts of data with human insight and judgment to provide a comprehensive response to the risk.

How can developers secure LLMs and mitigate the risks associated with it?

There’s a whole list of new vulnerabilities that come up when you look at the risks associated with LLMs, such as prompt injection and data poisoning. What’s interesting is that a lot of the defenses for these vulnerabilities are not the typical cybersecurity defenses that you’d put in place for traditional automated systems.

While firewalls and identity systems are important, security teams need to remember that this is a human-like entity. Attacks from these entities can trick users into giving out sensitive information. In this case, the defenses need to be more aligned with those used within phishing attacks and should be treated more like a user rather than a traditional software component.

As LLM vulnerabilities become more sophisticated, chief information security officers (CISOs) need to consider how to arm users with knowledge and teach them about defense rather than the binary teachings of firewalls, identity systems, and passwords. 

How crucial is it to address security challenges associated with LLMs? How do you see GenAI‘s future in cybersecurity?

Cybersecurity is often an afterthought when it comes to the adoption of LLMs. The rapid deployment of LLMs occurs in two main ways and is bringing new security challenges with it.

The first way is adoption from users within an organization through bring-your-own-AI or shadow IT. It’s so easy to access ChatGPT or Google Gemini that users do it without thinking about the possible security implications around this.  

The second way comes from cybersecurity vendors adding LLMs to their products. A year ago, the uses for GenAI were mostly novel. It could be used to help write an essay or draft a report, but it didn’t have access to large amounts of mission-critical data.

Today, cybersecurity vendors are giving these models more and more access to highly sensitive mission-critical data. This provides them with context around the status of an organization’s networks and vulnerabilities that could be used against them.

What we’re seeing moving to the top of every CISO’s list is how to get a real strategy in place to address this challenge. Our mission-critical data is now in the hands of AI and learning to effectively manage the security of this data is critical. 

Tell us about the Exabeam Copilot feature on the cybersecurity platform.

Exabeam Copilot is a collection of GenAI capabilities aimed at different use cases for accelerating the TDIR workflow. Currently, there are a number of use cases for Exabeam Copilot.

One use case is helping analysts search using their native language. Traditionally in SIEM tools, you have to learn a query language that’s usually based on something that looks like SQL. This is one of the things that prevents new analysts from getting up to speed quickly. With Exabeam Copilot, analysts can type in their native language, ask questions about the data that they’re storing, and automatically have the system search it.

Another of these use cases is threat explaining. For years, security teams have been able to get a timeline view of why a threat had been prioritized and see some of the input from low-level AI algorithms. While experienced analysts like this capability, more junior analysts take quite a while to learn the nuance of this. Exabeam Copilot solves this challenge by instantly summarizing its findings and explaining why a threat has been prioritized in plain English. Analysts can then ask follow-up questions and have an open dialogue with the system.

What role do you see LLMs playing in the future of cybersecurity, both at Exabeam and in the industry?

We are currently at the beginning of the phase where LLMs are becoming useful. 

From an Exabeam perspective, Exabeam Copilot demonstrates an effective model that leverages an organization’s network data to optimize analyst efficiency. Our copilot can automate tasks, translate queries, and deliver actionable insights. This is an area we will continue to develop and add new use cases to as we focus on enabling faster, more precise TDIR.

Across the wider industry, I anticipate future LLM trends will be geared towards agent-based systems. Defenders will need to react with the same speed and agility as attackers as they adopt AI tools at an unprecedented rate. This is where automated agent-based tools come in.  

I believe we’re going to see a shift where security teams find the use cases to really prove that we can trust the machines to make security-based decisions and put those decisions in the hands of the tools. For example, this could lead to agent-based systems being trusted to shut down a user account, inform the humans that it happened, and explain why this action was taken.

This shift to agent-based technologies will come over the next few years, but there’s still a lot of fundamental research to be done to enable this at scale. 

What future advancements in LLM technology do you predict, and how do you see them shaping the era of AI and machine learning?

Looking at the history of digital computing, all the way back to World War Two, computers were invented to break German codes and compute artillery trajectories. We’ve been using them in a similar way ever since.

Historically, algorithms were really good at math, providing strong value within spreadsheets, data, analytics and databases. What they were not so good at was processing language.

The dramatic shift we’re now seeing is algorithms that can interact using human language, as witnessed with LLMs such as ChatGPT.

Within this field, the latest focus area for LLMs is around reasoning and decision-making abilities. We’re seeing a lot of development in this area to generate new types of training, data and algorithms to analyze responses from LLMs and find out if they’re hallucinating.

The aim is for LLMs to reason in multi-step capabilities rather than just simply predicting the next set of words in a flow. I see this being the next big research area for the technology as it evolves over the next few years.

Cyberattacks are continuously growing; how can organizations defend against cyber threats while balancing the need for digital transformation?

Cyberattacks are becoming more sophisticated, and modern cybersecurity tools are evolving quickly to keep pace. In response, CISOs ensure their security operations match the speed at which tools and attacks are advancing. 

The key here is for security leaders to step away from deploying more cybersecurity tools and blindly following the latest trends. Instead, every security team should be looking at what data they have access to and how they can most effectively utilize that.

Balancing the ever-evolving threat landscape against the need for digital transformation will depend on the SOC team’s ability to make better use of its network data to make faster and more efficient security decisions.

Also Read: 67% of healthcare companies experienced ransomware attacks in 2024: Sophos

Arshi Khan

Arshi Khan

Arshi Khan is an editor at CXOVoice.com and has over three years of experience in tech business writing. In her role, Arshi covers significant developments in the tech industry. She has contributed numerous articles covering key IT, technology, banking, finance, and cybersecurity sectors. She provides valuable insights into the latest industry trends and developments, establishing herself as a knowledgeable and dedicated editor in the field. She can be reached at [email protected]

Related Posts

Secure Browsers
Cyber Security

The Rise of Secure Enterprise Browsers (SEBs): A Game Changer for Remote Work and Endpoint Security by 2028

April 29, 2025
Palo Alto Protect AI
Cyber Security

Palo Alto Networks to Acquire Protect AI, Amplifying AI Security Solutions

April 29, 2025
F-Secure and Orange
Cyber Security

F-Secure teams up with Orange to help protect consumers from online threats and scams

April 24, 2025
Attackers
Cyber Security

Most Attackers Logged In Instead of Breaking In: Sophos Report

April 3, 2025
Vodafone IBM
Cyber Security

Vodafone and IBM Collaborate to Strengthen Smartphone Security with Quantum-Safe Cryptography

March 3, 2025
Verizon Accenture
Cyber Security

Verizon and Accenture Forge Strategic Alliance to Develop Advance Cybersecurity Solutions for Businesses

March 3, 2025
NTT DATA Palo Alto
Cyber Security

NTT DATA and Palo Alto Networks Strengthen Security for Private 5G in Industrial Deployments

February 27, 2025
Digital Freedom
Cyber Security

Your Data, Their Gold: The Silent Battle for Digital Freedom

February 25, 2025
Load More
ADVERTISEMENT

Latest Updates

Ant International and Barclays

Ant International and Barclays Partner to Revolutionize Global Treasury Management with Advanced AI Technology

by News Desk
2 days ago

Microsoft Farmbeats

Microsoft and National FFA Expand FarmBeats for Students Program to Enhance Agricultural Education Across the U.S.

by News Desk
2 days ago

CEOs on AI

CEOs Bet Big on AI: Navigating the Hurdles to Unlock Its Power

by Deepa Sharma
2 days ago

Oracle Oracle APSSDC

Oracle Partners with APSSDC to Empower 400,000 Students in Andhra Pradesh with Cutting-Edge Digital Skills Training

by News Desk
2 days ago

Asus TUF 500

Unleash Your Gaming Potential with the ASUS TUF Gaming Compact Desktop

by News Desk
2 days ago

IBM Lumen

Revolutionizing AI: Lumen Technologies and IBM Partner to Unlock Scalable AI for Businesses

by News Desk
2 days ago

Expert Views

Molly Sands AI
AI

AI RIP: 5 Things Knowledge Workers Will Say ‘Sayonara’ to in the Next Decade

March 8, 2025
multi cloud
Cloud

Multi-Cloud Made Simple: Strategies for Smart Business Management

March 5, 2025
Soft Skills
Opinion

Soft Skills and Technical Know-How: A Winning Combination in the Tech Industry

March 4, 2025
Digital Freedom
Cyber Security

Your Data, Their Gold: The Silent Battle for Digital Freedom

February 25, 2025
LLM in India
AI

Why A Homegrown LLM Is the Next Big Leap for India

February 22, 2025

Get Latest Update

Subscribe to our mailing list to receives newsletter direct to your inbox!

ADVERTISEMENT

Leaders Interviews

Steve Wilson, GenAI Cybersecurity LLMs
Cyber Security

How effective is GenAI in cybersecurity? The role of LLMs and AI in security solutions. [Interview with Steve Wilson]

-
Interview on Counterfeit products with Nikhil Narayan
Leaders Talk

Advancements in ML & AI made it possible to detect counterfeit products in real-time, says Nikhil Narayan

-
Newgenone bridges the gap between business users and IT teams with its low code capability: Varun Goswami
Leaders Talk

Newgenone bridges the gap between business users and IT teams with its low code capability: Varun Goswami

-
AI chatbots, Prasanna-Kumar
Leaders Talk

Can AI chatbots enhance customer experience and reduce the cost of serving customers?

-

Entrepreneur

Samsung Electronics appoints its first female president

Inspiring Women Entrepreneurs in India (2022)

Technology Adoption For Entrepreneurs

Volunteering management is the need of the Hour

CXOVoice.com is a leading online publication for CXOs, entrepreneurs, senior leaders, developers, and industry professionals. Our coverage spans key sectors, including IT, technology, banking, finance, cybersecurity, engineering, and automobiles.

Connect with us

Easy Links

  • Cryptocurrency
  • Event
  • Blockchain
  • Press Release
  • Resources & Downloads

Write Us

[email protected]
  • Home
  • About Us
  • Contact Us
  • Advertise
  • Privacy & Policy
  • Feedback

Copyright © 2025 CXOVoice - All Right Reserved

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

Our Spring Sale Has Started

You can see how this popup was set up in our step-by-step guide: https://wppopupmaker.com/guides/auto-opening-announcement-popups/

No Result
View All Result
  • Home
  • Technology
    • AI
    • Cloud
    • Telecom
    • Data Center
    • BPM
    • Blockchain
  • Finance
    • Banking
  • Cyber Security
  • View Points
  • Leaders Talk
  • News
  • Press Release
    • Submit Press Release

Copyright © 2025 CXOVoice - All Right Reserved