RL Blog

Topics

All Blog PostsAppSec & Supply Chain SecurityDev & DevSecOpsProducts & TechnologySecurity OperationsThreat Research

Follow us

XX / TwitterLinkedInLinkedInFacebookFacebookInstagramInstagramYouTubeYouTubeblueskyBluesky

Subscribe

Get the best of RL Blog delivered to your in-box weekly. Stay up to date on key trends, analysis and best practices across threat intelligence and software supply chain security.

ReversingLabs: The More Powerful, Cost-Effective Alternative to VirusTotalSee Why
Skip to main content
Contact UsSupportLoginBlogCommunity
reversinglabsReversingLabs: Home
Solutions
Secure Software OnboardingSecure Build & ReleaseProtect Virtual MachinesIntegrate Safe Open SourceGo Beyond the SBOM
Increase Email Threat ResilienceDetect Malware in File Shares & StorageAdvanced Malware Analysis SuiteICAP Enabled Solutions
Scalable File AnalysisHigh-Fidelity Threat IntelligenceCurated Ransomware FeedAutomate Malware Analysis Workflows
Products & Technology
Spectra Assure®Software Supply Chain SecuritySpectra DetectHigh-Speed, High-Volume, Large File AnalysisSpectra AnalyzeIn-Depth Malware Analysis & Hunting for the SOCSpectra IntelligenceAuthoritative Reputation Data & Intelligence
Spectra CoreIntegrations
Industry
Energy & UtilitiesFinanceHealthcareHigh TechPublic Sector
Partners
Become a PartnerValue-Added PartnersTechnology PartnersMarketplacesOEM Partners
Alliances
Resources
BlogContent LibraryCybersecurity GlossaryConversingLabs PodcastEvents & WebinarsLearning with ReversingLabsWeekly Insights Newsletter
Customer StoriesDemo VideosDocumentationOpenSource YARA Rules
Company
About UsLeadershipCareersSeries B Investment
EventsRL at RSAC
Press ReleasesIn the News
Pricing
Software Supply Chain SecurityMalware Analysis and Threat Hunting
Request a demo
Menu
Security OperationsMay 7, 2024

Why GenAI fails at full SOC automation

In a new research note, Forrester analysts explain how the current limitations of AI-enabled SecOps tools keep autonomous security decision making out of reach.

man in suit
Jaikumar Vijayan, Freelance technology journalistJaikumar Vijayan
FacebookFacebookXX / TwitterLinkedInLinkedInblueskyBlueskyEmail Us
touch screen AI and lock icons

A rapidly growing number of organizations are exploring the use of generative AI tools to transform business processes, improve customer interactions, and enable a variety of new and innovative use cases. But technology leaders who hope to harness GenAI tools to build a completely autonomous security operations center (SOC) might need to keep their expectations in check.

The reasons, Forrester Research analysts Allie Mellen and Rowan Curran say in a new research note, have to do with the fact that AI-enabled tools, just like traditional ones, have limitations that keep autonomous security decision making out of reach.

[There’s] a deeper issue at play here that is as fundamental to security as time itself: enterprise data consolidation and access is an absolute bear of a problem that is unsolved. Put more simply, security tools can’t ingest, store, and interpret all enterprise data. And more than that, security tools don’t play nice together anyway.

Allie Mellen and Rowan Curran

Here's what you need to know about the limitations of GenAI in automating your SOC.

Related: GenAI and threat modeling: 3 AppSec benefitsGartner Report: Mitigate Supply Chain Risk

Data and integration challenges

Getting all of an enterprise's data into one place is challenging and costly, something that has been demonstrated with the security information and event management (SIEM) market, the two researchers said in a recent research note:

Further, continuous training on this data is expensive and resource intensive. These two factors make this approach nearly impossible if accuracy and timeliness are important, which in this instance they are.

Difficulty with security tool integration is another major issue, the researchers noted. Until organizations are able to seamlessly get their security tools talking with one another, GenAI tools will be somewhat limited in their ability to analyze and interpret all available data and make smart autonomous decisions, they said.

Using LLMs [Large Language Models] to support querying large, complex data architectures simply isn’t feasible today — anomaly detection, predictive modeling, etc. are still required.

Reality does not match the high expectations of AI

Business and technology leaders have high expectations for the potential for GenAI tools such as ChatGPT, GitHub CoPilot, AlphaCode, Claude, and Gemini to radically transform their operations in the next few years. A study by McKinsey Global showed that business leaders expect AI-enabled tools to help increase corporate profits by up to $4.4 trillion a year by making decisions that are "remarkably human."

McKinsey Global expects generative AI tools to make the biggest difference in areas such as high technology, banking, and life sciences. In a more recent survey, by EY, 43% of 1,405 enterprise organizations surveyed said they had already invested in GenAI technology for use cases such as employee training and collaboration and customer sales and service. Many of the those who have already invested in AI tools are still at the proof-of-concept stage, while 20% have implemented pilot projects.

AI is making a difference on the cybersecurity front as well, with a growing number of vendors integrating various AI features into their products, especially in areas such as anomaly detection and behavior analysis. Gartner expects that, by 2027, GenAI will help organizations reduce false-positive rates for application security testing (AST) and threat detection by 30%. But the analyst firm also believes that attacks leveraging AI, will force organizations to deploy more human resources— not fewer — in response:

Security operation chatbots [will] make it easier to surface insights from SOC tools. But experienced analysts are still needed to assess the quality of the outputs, detect potential hallucination and take appropriate actions according to the organization’s requirements.

Taking it a step at a time

So how can organizations harness AI in the SOC — and what can they reasonably expect by way of potential operational and efficiency gains? Ali Khan, field CISO at ReversingLabs, expects that AI will help speed up analysis significantly in the SOC. Organizations can expect AI to improve key metrics such as mean time to detect (MTD) a cyber-incident, mean time to respond (MTR), and mean time to contain (MTC).

If you can reduce IR playbook down to minutes from a ticket opening to closing, autonomously, then you have achieved nirvana.

Ali Khan

However, because of the many process, cultural, and engineering changes involved, getting there will be a challenge for legacy organizations that are adopting AI for the first time, Khan said. He recommended that SOC leaders start by identifying their biggest gaps and the challenges they encountered in addressing those gaps. Starting with the "why" can help stakeholders arrive at better decisions about the generative AI tool they need, he said.

Do a trial run on a small set of hosts to identify how it would actually work in a simulated environment before opening up Pandora's box.

Ali Khan

Khan said IT and business leaders need to make decisions based on their organization's existing technology, explaining that if current processes are not already enabled for autonomy, then the returns from GenAI could be less than optimal.

Autonomous SOCs are like autonomous highways: If every single car on the highway has full self-driving, then the margin of error is very small.

Ali Khan

Starting small and keeping expectations in check is an approach that Gartner recommends as well. Gartner identifies the first wave of AI-enabled security tools as giving SOC leaders a way to replace existing query-based search processes with conversational prompts.

The analyst firm expects that these tools will be especially useful in threat analysis and threat hunting by enabling better alert enrichment and improved alert scoring, and that they will also give a boost to areas such as attack surface summarization. threat summarization, and mitigation assistance. In the second phase, starting this year, Gartner expects security vendors to start adding features to their products that will allow organizations to enable a more automated defense capability.

However, because these tools cannot explain their generated response to an unfolding situation, security leaders will unlikely trust them enough to fully automate their defenses right away, Gartner said:

Mandatory approval workflows and detailed documentation will be necessary until the organization gains enough trust in the engine to incrementally increase the level of automation.

AI and your organization's security: It's a question of trust

Patrick Tiquet, vice president of security and architecture at Keeper Security, said there are multiple use cases for GenAI technology that make it a boon in the SOC, including the ability of AI tools to analyze massive datasets for anomalies faster than any team of humans can.

However, using GenAI for complete SOC automation raises some issues that organizations need to contend with, he said. One significant limitation with GenAI models in security is their tendency to hallucinate — to come up with assessments that sound plausible and even accurate but that the model cannot explain. While the recommendation could well be something worth investigating, it's risky to allow fully automated decision making based on the information alone.

The implementation of AI-powered cybersecurity tools in the SOC requires a comprehensive strategy that includes other technologies as well as human expertise to provide a layered defense against evolving threats, Tiquet said. He advocates for organizations paying attention to the basics before considering advanced detection methods using AI.

For example, does your organization have a cybersecurity control framework in place? Do you have password management handled? While these may not be the most exciting controls to talk about, these are the ones that stop the vast majority of breaches.

Reality check AI in your organization

For the moment, GenAI works best in providing human analysts with better information for decision making, said Chris Morales, chief information security officer at Netenrich. Machine intelligence can augment human intelligence, particularly in areas such as data management, detection engineering, and security analysis, he said.

It's still unclear, however, how AI use will evolve in the SOC over the next few years. But there are ways in which organizations can prepare now, Morales said.

Learn and promote the use of prompt engineering into daily routines. It is still too soon to fully realize what is going to be possible, but it is better to get started now to embrace whatever that future might bring.

Chris Morales

Keep learning

  • Get up to speed on the state of software security with RL's Software Supply Chain Security Report 2026. Plus: See the the webinar to discussing the findings.
  • Learn why binary analysis is a must-have in the Gartner® CISO Playbook for Commercial Software Supply Chain Security.
  • Take action on securing AI/ML with our report: AI Is the Supply Chain. Plus: See RL's research on nullifAI and watch how RL discovered the novel threat.
  • Get the report: Go Beyond the SBOM. Plus: See the CycloneDX xBOM webinar.

Explore RL's Spectra suite: Spectra Assure for software supply chain security, Spectra Detect for scalable file analysis, Spectra Analyze for malware analysis and threat hunting, and Spectra Intelligence for reputation data and intelligence.

Tags:Security Operations

More Blog Posts

Post-quantum security

Crypto group ushers in post-quantum security

Here’s a look at the Ethereum Foundation’s new PQC security effort — and why you need to modernize your SecOps.

Learn More about Crypto group ushers in post-quantum security
Crypto group ushers in post-quantum security
Cybercrime-as-a-service

Cybercrime-as-a-service forces a security rethink

With AI-powered tools readily available, sophisticated attacks no longer require sophisticated attackers.

Learn More about Cybercrime-as-a-service forces a security rethink
Cybercrime-as-a-service forces a security rethink
AI adoption guardrails

Why governance is key to safe AI adoption

A new CSA report stresses getting out in front of AI risk — and why it matters for SecOps.

Learn More about Why governance is key to safe AI adoption
Why governance is key to safe AI adoption
Adversarial AI rise

Adversarial AI is on the rise: What you need to know

Researchers explain that as threat actors move to AI-enabled malware in active operations, existing defenses will fail.

Learn More about Adversarial AI is on the rise: What you need to know
Adversarial AI is on the rise: What you need to know

Spectra Assure Free Trial

Get your 14-day free trial of Spectra Assure for Software Supply Chain Security

Get Free TrialMore about Spectra Assure Free Trial
Blog
Events
About Us
Webinars
In the News
Careers
Demo Videos
Cybersecurity Glossary
Contact Us
reversinglabsReversingLabs: Home
Privacy PolicyCookiesImpressum
All rights reserved ReversingLabs © 2026
XX / TwitterLinkedInLinkedInFacebookFacebookInstagramInstagramYouTubeYouTubeblueskyBlueskyRSSRSS
Back to Top