• About Us
  • Contact Us
  • Terms & Conditions
  • Privacy Policy
Technology Hive
  • Home
  • Technology
  • Artificial Intelligence (AI)
  • Cyber Security
  • Machine Learning
  • More
    • Deep Learning
    • AI in Healthcare
    • AI Regulations & Policies
    • Business
    • Cloud Computing
    • Ethics & Society
No Result
View All Result
  • Home
  • Technology
  • Artificial Intelligence (AI)
  • Cyber Security
  • Machine Learning
  • More
    • Deep Learning
    • AI in Healthcare
    • AI Regulations & Policies
    • Business
    • Cloud Computing
    • Ethics & Society
No Result
View All Result
Technology Hive
No Result
View All Result
Home Cyber Security

Predicting and Quantifying the Threat

Adam Smith – Tech Writer & Blogger by Adam Smith – Tech Writer & Blogger
March 6, 2025
in Cyber Security
0
Predicting and Quantifying the Threat
0
SHARES
3
VIEWS
Share on FacebookShare on Twitter

What if You Could Predict the Likelihood of a Hacker Breaching Your Organisation?

Turning (Non-Technical) Heads

Traditionally, one of the main problems with cyber security surrounds understanding, or a lack of. Those with non-technical backgrounds towards the top end of an organisation — typically, the CEO, CFO, and the board of the business — have trouble comprehending the "technical security stuff" and they need something that helps them understand it.

The emerging role of the CISO (Chief Information Security Officer) has gone some way to solve this. These individuals communicate the reality of an organisation’s security situation in a digestible manner to the key stakeholders.

But, what if the process could be automated?

AI in Cyber Security: Predict and Quantify

AI can provide faster and more accurate benchmarking predictions and expected loss costs of cyber events to an individual and groups within companies — in plain English. The technology is a key part of this quantification process.

The Random Forest Model

As mentioned, AI can be used to predict the probability of a hack or a breach — it does this with what Pope calls a random forest model. The ‘random forest’ is made up of lots of decision-trees and each decision-tree has a branch — and the questions that are asked by the model at each of the junctions in that decision tree are based on the characteristics of companies that have had a breach previously.

IT Disruption from a Third Party

AI can also predict the probability than an IT disruption will be caused by a third party, using a "probabilistic graphical model," which is similar to Google’s PageRank algorithm.

Wildfire

This use of AI in cyber security can further help predict ‘wildfire’, cyber quake-type events.

Actions

So what should an organisation do once it’s told the likelihood of it experiencing a data breach?

Pope suggests that in an ideal world, the CFO of an organisation should pick up the phone to their insurance broker and say we’re pretty sure there will be an event; we want to make sure we’ve got adequate insurance coverage for this, and help for when it does happen — immediate response help or breach response.

Conclusion

The role of AI in cyber security will become increasingly critical to mitigating threats. Why? Because of the increasing volume of data relating to this issue. This increasing volume of data is coming from increasing technology being interconnected and exposed. The more technology and interconnection via the internet, the more data and the more difficulty making sense of that data. The only way organisations can do this effectively is with AI.

Frequently Asked Questions

  • What is the role of AI in cyber security?
    • AI can provide faster and more accurate benchmarking predictions and expected loss costs of cyber events to an individual and groups within companies — in plain English.
  • How does AI predict the probability of a hack or a breach?
    • AI uses a random forest model, made up of lots of decision-trees and each decision-tree has a branch — and the questions that are asked by the model at each of the junctions in that decision tree are based on the characteristics of companies that have had a breach previously.
  • What is the "probabilistic graphical model" used to predict IT disruption from a third party?
    • It’s similar to Google’s PageRank algorithm.
  • What is the purpose of AI in predicting ‘wildfire’, cyber quake-type events?
    • To help predict ‘wildfire’, cyber quake-type events and prevent them from happening.
  • What should an organisation do once it’s told the likelihood of it experiencing a data breach?
    • In an ideal world, the CFO of an organisation should pick up the phone to their insurance broker and say we’re pretty sure there will be an event; we want to make sure we’ve got adequate insurance coverage for this, and help for when it does happen — immediate response help or breach response.
Previous Post

Top Voice of Customer (VoC) Tools for 2025

Next Post

Sudan’s Crisis: Zain Restores Mobile Connectivity

Adam Smith – Tech Writer & Blogger

Adam Smith – Tech Writer & Blogger

Adam Smith is a passionate technology writer with a keen interest in emerging trends, gadgets, and software innovations. With over five years of experience in tech journalism, he has contributed insightful articles to leading tech blogs and online publications. His expertise covers a wide range of topics, including artificial intelligence, cybersecurity, mobile technology, and the latest advancements in consumer electronics. Adam excels in breaking down complex technical concepts into engaging and easy-to-understand content for a diverse audience. Beyond writing, he enjoys testing new gadgets, reviewing software, and staying up to date with the ever-evolving tech industry. His goal is to inform and inspire readers with in-depth analysis and practical insights into the digital world.

Related Posts

Exposing AI Shadow Tools
Cyber Security

Exposing AI Shadow Tools

by Adam Smith – Tech Writer & Blogger
September 10, 2025
Tech Nation’s Cyber Security Cohort
Cyber Security

Tech Nation’s Cyber Security Cohort

by Adam Smith – Tech Writer & Blogger
March 6, 2025
AI Companies Help Businesses Beat Competition
Cyber Security

AI Companies Help Businesses Beat Competition

by Adam Smith – Tech Writer & Blogger
March 5, 2025
DHS AI Roadmap Prioritizes Cybersecurity and National Safety
Cyber Security

DHS AI Roadmap Prioritizes Cybersecurity and National Safety

by Adam Smith – Tech Writer & Blogger
March 5, 2025
AI in Cyber Security: A Necessity or Too Early to Introduce?
Cyber Security

AI in Cyber Security: A Necessity or Too Early to Introduce?

by Adam Smith – Tech Writer & Blogger
March 4, 2025
Next Post
Sudan’s Crisis: Zain Restores Mobile Connectivity

Sudan's Crisis: Zain Restores Mobile Connectivity

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest Articles

Reigniting Europe’s €200bn AI Aspirations

Reigniting Europe’s €200bn AI Aspirations

April 24, 2025
Data Analyst: From Zero to First Report

Data Analyst: From Zero to First Report

August 27, 2025
3D modeling you can feel

3D modeling you can feel

April 22, 2025

Browse by Category

  • AI in Healthcare
  • AI Regulations & Policies
  • Artificial Intelligence (AI)
  • Business
  • Cloud Computing
  • Cyber Security
  • Deep Learning
  • Ethics & Society
  • Machine Learning
  • Technology
Technology Hive

Welcome to Technology Hive, your go-to source for the latest insights, trends, and innovations in technology and artificial intelligence. We are a dynamic digital magazine dedicated to exploring the ever-evolving landscape of AI, emerging technologies, and their impact on industries and everyday life.

Categories

  • AI in Healthcare
  • AI Regulations & Policies
  • Artificial Intelligence (AI)
  • Business
  • Cloud Computing
  • Cyber Security
  • Deep Learning
  • Ethics & Society
  • Machine Learning
  • Technology

Recent Posts

  • Pulling Real-Time Website Data into Google Sheets
  • AI-Powered Agents with LangChain
  • AI Hype vs Reality
  • XAI: Graph Neural Networks
  • REFRAG Delivers 30× Faster RAG Performance in Production

Our Newsletter

Subscribe Us To Receive Our Latest News Directly In Your Inbox!

We don’t spam! Read our privacy policy for more info.

Check your inbox or spam folder to confirm your subscription.

© Copyright 2025. All Right Reserved By Technology Hive.

No Result
View All Result
  • Home
  • Technology
  • Artificial Intelligence (AI)
  • Cyber Security
  • Machine Learning
  • AI in Healthcare
  • AI Regulations & Policies
  • Business
  • Cloud Computing
  • Ethics & Society
  • Deep Learning

© Copyright 2025. All Right Reserved By Technology Hive.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?