Radio interview on WWJ-AM
I’ll be speaking on WWJ-AM (Detroit, MI) today at 12:30 PM ET. Looking forward to discussing cyber security with Brian Larsen.
“If the end user logs on from Seattle, where their mobile phone and laptop is, a connection from New York would be unusual,” McGladrey explained. “It is also possible to note the typing style and speed of a user and use that biometric signature to determine if the user is legitimate. These data [points] make it more difficult for a threat actor to operate silently in the environment.”
“Realistically, the use of AI in cybersecurity will help to reduce the punishing cognitive load on tier one analysts in the security operation center,” said IEEE Senior Member Kayne McGladrey. “Rather than having to comb through a needlestack looking for a needle, AI promises to automate much of the correlation across vast amounts of data that humans struggle with.”
“IoT security remains one of the most challenging security vulnerabilities to businesses and consumers,” says Kayne McGladrey (@kaynemcgladrey), Director of Information Security Services at Integral Partners. “The Mirai and Reaper botnets are results of threat actors leveraging poor security controls on IoT devices, building attack infrastructure out of those devices, and using that stolen infrastructure to attack organizations. Organizations purchasing IoT/IIoT devices should treat them the same as any other endpoint device connecting to the corporate network.”
“Cybersecurity remains a clear path to a middle-class salary for people with a two-year degree, a relevant certification to overcome gatekeeping by HR departments, a desire to help protect one’s friends and community, and a willingness to continuously learn as part of a team,” he tells Fortune.
How did you get to become an expert in your key topics?
My first professional job was working as a programmer and systems administrator contracting with several government agencies. My view on information security at that time was informed by the startling lack of controls applied to people’s personal, medical, and financial information, and how the risk of abuse of those data could affect individuals and communities. I’ve had the opportunity since to work on cybersecurity technology and policy programs with small businesses, government agencies, the Fortune 500, and Global 1000 companies across three continents. Throughout that time, I’ve had the privilege of serving disabled veterans, minorities, and the LGBTQ community as a mentor, consultant, CISO, and public speaker. My current role requires I have a comprehensive knowledge of regulatory and statutory challenges aligned to current cybersecurity threats so that I can provide Clients with actionable strategies to manage their unique cyber risks.
The big picture: AI model operators don’t have a good way of reigning in these malicious use cases, Kayne McGladrey, a senior member of the Institute of Electrical and Electronics Engineers (IEEE), told Axios. Allowing LLMs to digest and train on CVE data can help defenders synthesize the wave of threat alerts coming their way each day. Operators have only two real choices in this type of situation: allow the models to train on security vulnerability data or completely block them from accessing vulnerability lists, he added. “It’s going to be a feature of the landscape because it is a dual-use technology at the end of the day,” McGladrey said.