Contact Us
SaaS Log InXRay Login

Cybersecurity pros are using artificial intelligence but still prefer the human touch

Nastel Technologies®
March 12, 2020

More than half of organizations have adopted AI for security efforts, but a majority are more confident in results verified by humans, according to WhiteHat Security.

Security professionals need a varied bag of tricks to keep up with savvy and sophisticated cybercriminals. Artificial intelligence is one valuable weapon in the arsenal as it can handle certain tasks faster and more efficiently than can human beings. But AI being AI, it’s far from perfect. That’s why many security pros still want the human element to play a significant role in their security defense, according to a survey from WhiteHat Security.

Based on a survey of 102 industry professionals conducted at the RSA Conference 2020, WhiteHat’s “AI and Human Element Security Sentiment Study” found that more than half of the respondents are using AI or machine learning (ML) in their security efforts. More than 20% said that AI-based tools have made their cybersecurity teams more efficient by eliminating a huge number of more mundane tasks.

Further, almost 40% of respondents said they feel their stress levels have dropped since adding AI tools to their security process. And among those, 65% said that AI tools let them focus more on migitating and preventing cyberattacks than they could previously.

However, incorporating AI doesn’t take human beings out of the security equation; just the opposite. A majority of those polled agreed that the human element offers skills that AI and ML can’t match.

Almost 60% of the respondents said they remain more confident in cyberthreat findings that are verified by human over AI. When asked why they prefer the human touch, 30% pointed to intuition as the most important human element, 21% mentioned the role of creativity, and almost 20% cited previous experience and frame of reference as the most critical advantage of humans over AI.

On its end, WhitePoint described three reasons it supplements its own AI and ML learning systems with human verification:

  • To ensure that vulnerabilities that can’t automatically be verified by the machine learning subsystem are verified by humans.
  • To add new human curated vulnerabilities to the 150+ terabyte pool of attack vector data for future machine learning endeavors.
  • To perform quality control on a sample of the automatically verified vulnerabilities and provide feedback to fine-tune machine learning models as needed.

This article originally appeared on To read the full article and see the images, click here.

Nastel Technologies uses machine learning to detect anomalies, behavior and sentiment, accelerate decisions, satisfy customers, innovate continuously.  To answer business-centric questions and provide actionable guidance for decision-makers, Nastel’s AutoPilot® for Analytics fuses:

  • Advanced predictive anomaly detection, Bayesian Classification and other machine learning algorithms
  • Raw information handling and analytics speed
  • End-to-end business transaction tracking that spans technologies, tiers, and organizations
  • Intuitive, easy-to-use data visualizations and dashboards

Nastel Technologies is the global leader in Integration Infrastructure Management (i2M). It helps companies achieve flawless delivery of digital services powered by integration infrastructure by delivering tools for Middleware Management, Monitoring, Tracking, and Analytics to detect anomalies, accelerate decisions, and enable customers to constantly innovate, to answer business-centric questions, and provide actionable guidance for decision-makers. It is particularly focused on IBM MQ, Apache Kafka, Solace, TIBCO EMS, ACE/IIB and also supports RabbitMQ, ActiveMQ, Blockchain, IOT, DataPower, MFT, IBM Cloud Pak for Integration and many more.


The Nastel i2M Platform provides:


Write a comment
Leave a Reply
Your email address will not be published. Required fields are marked *
Comment * This field is required!
First name * This field is required!
Email * Please, enter valid email address!

Schedule your Meeting


Schedule your Meeting


Schedule a Meeting to Learn More