AI-driven risks propelled APAC cybersecurity spending
Organisations adopt advanced defences against AI-driven threats.
As organisations across the Asia Pacific region grapple with advanced artificial intelligence (AI) threats and the increasing use of deep fake technologies, projected security spending is set to reach $36 billion this year.
Gurpal Singh, Senior Research Manager at IDC Asia/Pacific, said that to combat these sophisticated threats, organisations are increasingly turning to automation, integrated platform solutions, and AI-infused security technologies.
"AI technologies are not just being developed for defence; they are also being weaponized by hackers to enhance attacks or create new ones," Singh explained.
Automation plays a pivotal role in the cybersecurity landscape by enhancing threat detection and response capabilities. "Automation is essential for enabling more efficient and effective responses to potential threats across various cybersecurity domains," Singh stated. This includes everything from security operation centre workflows to compliance monitoring and user behaviour analytics.
Singh also highlighted the importance of platform solutions from security vendors. These integrated solutions are becoming more popular among organisations in Asia Pacific, driven by a broader trend towards technology and vendor consolidation.
"There is a high preference for partnering with platform players providing integrated security solutions," he noted, referencing data from an IDC study on Asia Pacific software trends.
According to Singh, security vendors have long been utilising AI to enhance the potency of their solutions. The emergence of generational AI technology promises to revolutionise capabilities further, providing real-time market intelligence and more robust defences.
"Organisations are adopting a two-pronged approach: robust processes and advanced identity access management technologies," he said. Zero trust architectures, which operate on the principle of never trusting and always verifying, are particularly effective.
Singh also emphasised the importance of implementing minimal access permissions, segmenting networks to prevent lateral movement, and conducting regular audits. "Technologically, enhancements in identity and authentication methods, including multi-factor authentication and biometrics like fingerprints or facial recognition, are vital," he added.