AI

Aviad Hasnis, CTO of Cynet – Interview Series

Aviad Hasnis, CTO in CyNET Security, lead the company’s cybersecurity technology, including the development of the extended detection and response platform (XDR), threat research, detection and managed response services (MDR). Before Cynet, he occupied the roles of the upper cybersecurity in the Israeli defense forces and holds advanced certificates in engineering and physics from technology.

Cynet Security provides a platform for automatic cybersecurity for a comprehensive designer to simplify protection for small and medium -sized institutions. Its solution is the end point, the network, the user, e -mail, cloud safety with compact automation, XDR capabilities, and 24/7 MDR support.

Cyber ​​security is a constantly developed field. How to balance the top of threats while maintaining easy -to -use solutions to small and medium -sized companies?

SMB Lean security teams should face the same threats facing the fortune of 500 – with a small portion of employees, resources or budget. With the high electronic attacks in size and complexity, SMB security leaders lead the demand for simplified, mechanical and unified safety solutions to reduce complexity and improve protection.

In CYNET, my team intentionally built the cyberspace security platform in one to merge a full set of safety capabilities on one, simple and enabled solution of artificial intelligence.

  • By standardizing vision and protection at the environment level on one intuitive information plate, Cynet increases the simplicity of easy -to -use.
  • By automating the main safety operations, CYNET helps the tremendous difference to increase efficiency.

The Cynet platform is described as an original autonomy – can you explain how artificial intelligence and automation play a role in discovering and eliminating electronic threats?

The Cynet All-IN-One Cyblesecurity teams designed to automate operations so that people can spend less time in daily operations management and more time building their business.

In CYNET, my team is also proud of the “building, not purchased” approach. Each ability, features and automation of the cyberspace security platform is developed in one at home, from A to Z, already integrated so that everything works smoothly outside the box. This eliminates the gaps of integration and interventions that can bargone mechanical protection.

MITER Att & CK Cynet reviews are rated among the best performance artists. What strategies do AI move in this success?

I am very proud of my CYNET team’s team’s contributions that cut record in the latest Miter Att & CK rating. There is a good reason for the Att & CK is the most trusted independent evaluation among decision -makers of cybersecurity. MITER uses the real world’s electronic attack scenarios to measure competing safety platforms. This CYNET was the only seller to achieve 100 % protection, and the 100 % detection vision reflects our commitment to building a reliable product for CYNET partners and customers all over the world.

Cybrian security based on artificial intelligence has been criticized due to the possible wrong positives and aggressive attacks. How does Cynet ensure accuracy and durability in discovering the threat?

Cyber ​​security solutions that support artificial intelligence are more effective when combined while monitoring experts. Although artificial intelligence can quickly process and analyze huge amounts of data, it is very important that there are cybersecurity who provide continuous supervision. My CYNET team guarantees that the decisions of the artificial intelligence systems are valid, which prevents the situations in which artificial intelligence can miss precise threats or take incorrect conclusions. In cybersecurity, where risks develop quickly, human experience is necessary to explain results and make sensitive decisions of context.

To provide partners and clients with an additional layer of protection, Cynet supports the cyberspace security platform one in one with a support around the clock. Cynet ‘all a clock throughout the week by analysts at the global level, ensuring that the ultimate user environments are monitored at all times, complementing automatic surveying operations. This unique mixture increases automatic protection and practical experiences from peace of mind for CYNET partners and customers.

With the appearance of Deepfake attacks, malware created from artificial intelligence, and advanced social engineering, what are the more emerging cybersecurity threats?

We closely monitor how artificial developed intelligence – not only to formulate Deepfakes, but to automate hunting, generate multi -shape malware, and simulate legitimate user behavior. But all these male -powered tactics have simply evolved into a familiar end: people deceive. Therefore, it is not enough to just keep the Internet criminals “outside”. Safety teams should also be able to track user behavior and network activity for abnormal signals, and this is a priority that artificial intelligence can help.

To ensure that our automatic protection remains a step forward from electronic attacks that support artificial intelligence, the CYNET product map includes the latest visions of safety analysts, as well as direct inputs of CYNET partners and customers.

Punay attacks continue to develop-How to prevent Cynet to protect and mitigate CYNET?

To thwart Ransomware attacks, early detection is the key. By discovering threats automatically, identifying their radical case, eliminating all components of the attack throughout the environment, submitting a report to confirm treatment, the cyberspace security platform in one reduces the treatment of hand accidents by 90 % and provides 50 times faster results.

Do you see independent cybersecurity – where artificial intelligence discovers independently and responds to threats without human intervention – after a fact?

Although artificial intelligence can automate detection and response, human analysts must always have the final statement in strategic decisions. In CYNET, we embrace the automation driven by artificial intelligence while ensuring security professionals remain involved in solving high -value problems.

  • The Cynet All-INE platform is to automate the main safety operations, which reduces the burden of manual operations so that the security teams can focus on strategic initiatives instead of routine tasks.
  • In the incident response, Cynet discovers automatic threats, determines the root causes, leads to the components of the attack, and provides detailed reports. This automation reduces manual handling accidents by 90 % and achieves the results of 50-Times.
  • Despite this high level of automation, we always emphasize human control. Our team monitors the clock throughout the week the environments, confirms the verification of alerts, and ensures that the measures driven by artificial intelligence are in line with the best security practices.

This balanced approach guarantees that the automatic systems are intended, while allowing human experts to provide critical vision and intervention when necessary.

What role does LLMS models play in cybersecurity? Is it possible to benefit from both crime and defense?

LLMs put on all kinds of nothing. Genai pads can be overcome from the prevailing Genai from performing malignant activity easily. Social engineering fraud can be widely launched with one click of a button. Along with easy access to malware and Roa groups in CyberCriminal Forums, the Internet criminals bar to damage the damage is less than ever. With Genai, ambitious children who need advanced penetration skills to cause real damage.

Artificial intelligence is also used by the threats to automate electronic attacks. How do you see the AI ​​Arms race in cybersecurity plays?

The AI ​​Arms race is well in cybersecurity, as attackers use Amnesty International to automate the hunting campaigns, create Deepfake content and create more advanced harmful programs. These technologies allow Internet criminals to quickly expand their attacks and make them more difficult to discover, which increases the scene of a total threat.

My teammates and I help the security teams fight the AI-enabled fire through the enabled AI-fire. We perform the automation of detection, analysis, response and preparation to facilitate the results much faster than the human difference alone. The edge preservation key is constantly improving the models with updated and high -quality data, enhancing automatic defenses and integrating the intelligence of the threat in the real world to adapt to advanced tactics. Since AI’s threats grow more sophisticated, pre -emptive defense strategies will be decisive to stay in the forefront of the attackers.

How do you see quantum computing that affects cybersecurity in the next decade? Is Cynet prepare for potential quantum threats?

Quantitative computing is exciting but far away in cybersecurity. Although it has the ability to break the traditional encryption methods, I do not see that it is an immediate danger in the next few years. Unlike obstetric artificial intelligence, which is widely accessible and already affects cybersecurity, quantum computing is still largely confined to research and initiatives at the national state level.

Currently, the opponents will fill in the financial motivation of great obstacles to reaching quantum computing and using them for harmful purposes. It is possible that the complexity and resources needed to conduct the electronic attack on quantity prevailing at the present time. However, it is important for cybersecurity sellers to maintain a proactive approach to research and development. Quantum is definitely a region that will monitor my team with technology progressing from theory to proving the concept of something that organizations may already face in the wilderness.

Thank you for the wonderful interview, readers who want to know more Cynet Security.

Don’t miss more hot News like this! Click here to discover the latest in AI news!

2025-05-23 17:11:00

Related Articles

Back to top button