Friday, November 15, 2024
HomeCyber AIMicrosoft Copilot for Security: AI tool to Help Security and IT professionals

Microsoft Copilot for Security: AI tool to Help Security and IT professionals

Published on

Microsoft Copilot for security was a generative AI solution that can help security and IT professionals handle their security operations much more efficiently.

This was claimed to be the industry’s first generative AI solution for strengthening an organization’s security expertise. 

However, Microsoft has announced that Microsoft Copilot for security will be available worldwide by April 1, 2024.

- Advertisement - SIEM as a Service

Microsoft also stated that Copilot’s threat intelligence comprises 78 Trillion security signals that are processed by Microsoft every single day.

This is combined with Large language models (LLMs) to deliver the best possible insights and guidance towards the next steps.

Microsoft has recently introduced PyRIT, a Red Team tool designed to assist in the creation of generative AI systems. This tool’s capabilities enable it to identify weaknesses in AI systems and identify potential vulnerabilities that can be exploited.

PyRIT utilizes a combination of automated techniques and expert knowledge to create a more efficient and effective Red Team process for generative AI systems.

Microsoft Copilot for Security

According to the reports shared with Cyber Security News, Copilot for Security’s economic study reveals that experienced security professionals could perform complex security functions swiftly and more accurately.

In addition, Microsoft specified that experienced security analysts could work 22% faster by using Copilot for security.

Studies of Copilot for Security (Source: Microsoft)
Studies of Copilot for Security (Source: Microsoft)

Moreover, 97% of the users mentioned wanting to use Copilot when doing the next task.

This study focused on experienced security professionals and a randomized controlled trial published last November.

Both of these studies combined showed that people with any level of experience and expertise can use Copilot effectively.

Pay-as-you-go Model & Global Availability

Alongside this new public availability, Microsoft has also launched its pay-as-you-go Licensing model for Copilot for Security, enabling access to a wide range of organizations.

Microsoft mentioned, “With this flexible, consumption-based pricing model, you can get started quickly, then scale your usage and costs according to your needs and budget.”

Copilot is described as multilingual and capable of processing prompts in eight languages.

Furthermore, the interface contains 25 different languages, making it readily available and usable across major regions, including North America, South America, Europe, and Asia.

Microsoft detailed the workflow in a video.

New Innovations and AI-powered Security

As Copilot becomes available worldwide, Microsoft has also added additional capabilities, such as 

  • Custom promptbooks – Create and save self-made Natural language prompts for common security tasks.
  • Knowledgebase Integrations – Integrate Copilot for security with business logic and perform tasks based on step-by-step guides.
  • Multi-language support – Process prompts and respond in eight different languages with 25 supported interfaces
  • Third-party Integrations – Integrate with global partners that work on developing integrations and services.
  • Connection with External Attack Surface from Microsoft Defender ASM – Identify and analyze the most recent information from external attack surface risks.
  • Microsoft Entra Audit Logs and Diagnostic Logs – Gather additional insights for a security investigation or IT issue analysts of audit logs associated with specific user/events summarized in natural language.
  • Usage reporting – Dashboard insights on how teams are using Copilot and identify more opportunities.

This AI-powered Copilot for Security is available as two rich user experiences: an immersive standalone portal or embedded into security products.

Integrating Copilot with Microsoft Security Products is even easier for IT and security professionals, as it offers the advantages of speed and accuracy demonstrated in the Microsoft study.

Furthermore, Copilot still has many more features and capabilities in an organization’s security infrastructure.

Microsoft has also mentioned additional features that are coming soon, such as a unified security operations platform, Copilot in Microsoft Entra, Copilot in Microsoft Purview, and Copilot in Microsoft Intune.

Some of these features are currently available, and others have yet to be made available.

With Perimeter81 malware protection, you can block malware, including Trojans, ransomware, spyware, rootkits, worms, and zero-day exploits. All are incredibly harmful and can wreak havoc on your network.

Stay updated on Cybersecurity news, Whitepapers, and Infographics. Follow us on LinkedIn & Twitter.

Eswar
Eswar
Eswar is a Cyber security content editor with a passion for creating captivating and informative content. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news.

Latest articles

Critical TP-Link DHCP Vulnerability Let Attackers Execute Arbitrary Code Remotely

A critical security flaw has been uncovered in certain TP-Link routers, potentially allowing malicious...

Chinese SilkSpecter Hackers Attacking Black Friday Shoppers

SilkSpecter, a Chinese financially motivated threat actor, launched a sophisticated phishing campaign targeting e-commerce...

Cybercriminals Launch SEO Poisoning Attack to Lure Shoppers to Fake Online Stores

The research revealed how threat actors exploit SEO poisoning to redirect unsuspecting users to...

Black Basta Ransomware Leveraging Social Engineering For Malware Deployment

Black Basta, a prominent ransomware group, has rapidly gained notoriety since its emergence in...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Critical TP-Link DHCP Vulnerability Let Attackers Execute Arbitrary Code Remotely

A critical security flaw has been uncovered in certain TP-Link routers, potentially allowing malicious...

Chinese SilkSpecter Hackers Attacking Black Friday Shoppers

SilkSpecter, a Chinese financially motivated threat actor, launched a sophisticated phishing campaign targeting e-commerce...

Cybercriminals Launch SEO Poisoning Attack to Lure Shoppers to Fake Online Stores

The research revealed how threat actors exploit SEO poisoning to redirect unsuspecting users to...