Machine vs. machine

Greetings from Mav, trusted partner for your AI journey. This AI-generated moose has been on the hunt for threats and keeping security top of mind….

Sandy Ono profile picture
Sandy Ono

April 19, 20244 minute read

Greetings from Mav, trusted partner for your AI journey. This AI-generated moose has been on the hunt for threats and keeping security top of mind. Every technology has dual usage and Mav is here to keep us all informed.

You: How has AI evolved the landscape of security?

MAV: Unfortunately, the amount and frequency of fake information has skyrocketed. The same tools that help to generate images and ideas for an innocent brainstorm are being used to create impersonations and more ransomware attacks. Cybersecurity needs have heightened.

You: Should I trust AI?

MAV: Like any other technology, there is always dual usage. Malicious activities will happen, and it’s better as cybersecurity experts to be in-the-know than not.

You: What can we do to protect our businesses?

MAV: Don’t ignore the need to protect your employees, your data, your infrastructure. General awareness and education on the potential threats to your employee base is a must. Take a proactive stance to simplify your security stack to give your business the best visibility and protection.

Play video
Innovations in less than a minute: Machine vs. machine

New era of concern

In 2023, the world saw a 72% increase in data breaches from 2021, which held the previous record. Meeting risk and security standards are table stakes for companies of all sizes. In fact, cybersecurity risks are more prominent than ever. A whopping 95% of cybersecurity issues are traced to human error, and 93% of cyber leaders believe global geopolitical instability is likely to lead to a catastrophic cyber event in the next two years.

In this new era, AI powered cyber-threats are on the rise. New challenges include criminal AI-based social engineering, realistic content generation, a rise in attack scalability, and enriched adaptive evasion. In fact, there is a whole practice of “Dark AI” prevalent on hack forums. Popular LLMs are programmed not to respond to illegal and controversial prompts to remove ethical safeguards, but criminals are jailbreaking, and malicious actors are clearly using AI tools.

It’s time to embrace the new era of concerns.

Market dynamics –> Go-forward security priorities
Security fragmentation –> Integrated security and governance
Increasing frequency of cyber attacks –> Security posture management
Ransomware and data breaches –> Faster incident response
Get AI ready –> Secure information management
Security skill shortage –> Secure by design

New era of protection

The security posture for the future is thinking about all the elements:
X–Ingestion everything from device endpoints to networks to applications to web and email, embrace the challenge to protect it all through robust identity access management and data security.
D–Detection quickly and repeatedly perform tasks to find vulnerabilities (e.g., map to schema, telemetry enrichment, parsing, analytics, cross-correction, and alert prioritization)
R–Response ensure there are defined ways to triaging issues, automating workflows, hunt and investigate, providing surgical responses and performing schedule scans.

Chart about Security cloud

For enterprises of all sizes, billions of events are process daily. To be proactive versus reactive, we must let the machines do the work. Machines can help us take it to the next level:
Autonomous asset discovery–finding points of vulnerability across an IT estate
AI threat detection–anticipating malicious acts and protecting against them
Rule-driven and machine-learning responses–at scale, using machine learning and predictive analytics to predict deep fakes

Getting AI-ready means to lead your organization through understanding, accepting, and proactively protecting against new types of security concerns. Learn more about how you can get started with OpenText™ Cybersecurity. Our portfolio of solutions is unique in how we anchor on information security as our DNA, how we focus on real time threat intelligence, how we offer a high-efficacy end-to-end portfolio, and how we have a seamless platform experience.

Information management is a pre-requisite of AI. Help your organizations ensure cybersecurity protection is omnipresent along with AI. The future of machine vs. machine will heighten the need for cybersecurity across all domains.

Get more information about our Cybersecurity portfolio. View OpenText World Europe keynotes to learn more. Visit

Read additional blogs in our AI innovations series:

Share this post

Share this post to x. Share to linkedin. Mail to
Sandy Ono avatar image

Sandy Ono

Sandy Ono is the Executive Vice President and Chief Marketing Officer for OpenText. Sandy is responsible for driving marketing and communications worldwide from brand to demand to deliver growth for the company. With more than 20 years of experience as a business transformation leader in the high-tech industry, Sandy brings a passion for marketing, analytics, and leading world-class teams from strategy to execution.

See all posts

More from the author

Next-gen developer experience

Next-gen developer experience

Greetings from Goose, a trusted partner for your AI journey. This AI-generated goose has been the champion of seven-star experiences, and over the last few…

5 minute read

IoT: Living at the edge

IoT: Living at the edge

Greetings from Viper, trusted partner for your AI journey. This AI-generated hummingbird has been busy buzzing around in the clouds, figuring out how companies can…

4 minute read

Autonomous cloud operations

Autonomous cloud operations

Greetings from Skye, a trusted partner for your AI journey. This AI-generated llama has been living in the clouds, creating her own cloud trails to…

3 minute read

Stay in the loop!

Get our most popular content delivered monthly to your inbox.