Joseph Gertz
We are witnessing a fundamental re-mapping of the cybersecurity stack. Commercial AI is making once-essential security software redundant, but some solutions are more resilient than others.
We are witnessing a fundamental re-mapping of the cybersecurity stack. The current industry turmoil isn't just about hackers using AI- it’s about Commercial AI making once-essential security software redundant.
In these areas, Commercial AI doesn't just "improve" the tool; it obviates the need for the tool entirely. When an LLM or autonomous agent can reason through data as a native function, standalone "solutions" become legacy shelfware.
SIEM/SOC & Automation: AI now ingests raw telemetry and reconstructs incidents in real-time. The "middleman" software that alerts a human to look at a screen is becoming a relic.
Threat Hunting: Once the pinnacle of human expertise, AI agents now hypothesize, test, and pivot through networks at machine speed. The manual "hunt" is being replaced by continuous, autonomous verification.
External Attack Surface Management (EASM) & Risk Management: Why pay for a platform to "discover" your assets and quantify risk? AI agents can now crawl your entire digital footprint, identify shadow IT, and generate real-time risk scores more accurately than any static dashboard.
Patching & Vulnerability Management: The cycle of "scan, prioritize, and manually patch" is dying. AI can now auto-generate, test, and deploy patches for known vulnerabilities in minutes, turning a massive software category into a background OS feature.
Email & DLP: AI understands intent. When a model natively comprehends what "sensitive IP" looks like in context, traditional rule-based DLP suites become obsolete.
Moving to a commercial, open-to-anyone AI architecture introduces existential business risks that many aren't accounting for:
The "Secret Sauce" Drain: Feeding your proprietary playbooks and custom detection rules into a commercial AI means they eventually become part of a global training set. You are essentially training your future attackers.
The Cost Trap: Between astronomical compute requirements for local AI and the "hidden" costs of cloud API tokens, security budgets are being cannibalized by the very tools meant to save them.
Unknown Future Architecture: We are in a "Cambrian Explosion" phase. Committing your entire security logic to a specific vendor’s architecture today could leave you stranded when the industry moves to a superior, incompatible model tomorrow.
Vendor & AI Lockdown: The risk of becoming "locked in" to a specific AI ecosystem is real. Moving your logic from one model to another isn't as simple as a data migration; it’s a total cognitive re-wiring of your defense.
While software-centric tools scramble, the "un-AI-able" layers of security are seeing a massive surge in relevance.
Hardware-Enforced Security: You cannot "prompt-inject" a physical transistor. As software becomes fluid and non-deterministic, the industry is retreating to the Immutable Root of Trust found in hardware.
On-Prem Products: AI thrives on public data but struggles with isolated environments. Truly “local AI” is still in its infancy. The value of infrastructure is skyrocketing as organizations seek to keep their data sovereign and invisible to external crawlers.
Zeroport product is a Non-IP, Remote Access physical device. It is not reliant on cloud connectivity and runs AI on the physical device itself, to boost detection and automation. While it does not make us immune to the “AI-magadon”, it provides us with an excellent vantage point to tackle future challenges.
Empower global teams with secure, hardware-enforced remote access, no VPNs, no data exposure, no risk.