AI-Driven Security Overhaul Planned by 68% of Saudi Organizations

Published:

spot_img

Study Reveals Organizations’ Plans to Harness Generative AI for Security Enhancement

Tenable’s latest study on the adoption of generative AI (GenAI) in organisations has unveiled both a surge in interest and a concerning lack of confidence in effectively implementing these technologies. With 68% of organisations planning to incorporate GenAI within the next year, there is a clear shift towards leveraging AI to enhance security measures and align IT goals with broader business objectives.

The global study, conducted by Forrester Consulting on behalf of Tenable, surveyed 826 IT and cybersecurity professionals across ten countries. It highlights the optimistic outlook of security leaders towards the potential of GenAI to bolster security measures. However, only 17% of organisations express high confidence in successfully integrating GenAI technologies, pointing to the challenges ahead.

One of the key findings of the study is the perception of GenAI as a security threat rather than an opportunity by 41% of organisations. Concerns around cybersecurity risks and potential internal misuse of GenAI are prevalent among respondents, underscoring the need for robust governance and data management practices.

David Cummins, Senior VP of EMEA at Tenable, emphasises the importance of data quality in GenAI initiatives, stating that reliable data is essential for deriving meaningful insights. He also highlights the expanding attack surface of organisations due to the proliferation of cloud services and applications, making it crucial for security teams to leverage GenAI for identifying vulnerabilities and prioritising actions effectively.

As organisations navigate the complexities of AI integration, the study serves as a timely reminder of the critical role data governance plays in ensuring the success of GenAI applications. With the right approach, GenAI has the potential to revolutionise security practices and empower organisations to proactively address threats across their entire attack surface.

spot_img

Related articles

Recent articles

Empowering Women: ECOWAS Retreat Celebrates Purpose and Power for International Women’s Day 2025

Celebrating 50 Years of ECOWAS: Committing to Gender Empowerment As the Economic Community of West African States (ECOWAS) marks its 50th anniversary, a significant retreat...

PumaBot: New Botnet Aims at Linux IoT Devices to Hijack SSH Credentials and Mine Cryptocurrency

New PumaBot Botnet Targets Embedded Linux IoT Devices Overview of PumaBot A new botnet named PumaBot is specifically targeting embedded Linux-based Internet of Things (IoT) devices,...

Is Your IRS Refund Check on the Dark Web? Discover What 7 On Your Side Investigates

Surge in Check Theft: How California Residents Are Being Targeted The sun might shine brightly in California, but it casts dark shadows when it comes...

Microsoft OneDrive Flaw Allows Apps Full Cloud Access with Single File Upload

Security Flaw Discovered in Microsoft OneDrive File Picker Published on May 28, 2025 by Ravie Lakshmanan Tags: Data Privacy, Vulnerability A Serious Security Vulnerability Recent findings from cybersecurity...