INTEGRATIVE INSIGHTS
ON EMERGING OPPORTUNITIES

Integrative research means our extensive company research informs every thesis and perspective. The result is deep industry knowledge, expertise, and trend insights that yield valuable results for our partners and clients.

About the Authors:
Howard Smith
Managing Director
Howard Smith is a managing director at First Analysis and is a managing partner of the firm's venture funds. He has over three decades of experience at First Analysis and works with entrepreneurs as an investor and as an advisor on growth transactions to help build leading technology businesses. Howard leads the firm's work in the cybersecurity, internet infrastructure and Internet of Things sectors. He also built the firm's historical franchises in call centers and computer telephony. His thought-leading research in these areas has been cited for excellence by the Wall Street Journal and other publications. He supports First Analysis' investments in EdgeIQ, Fortress Information Security, ObservIQ, Stamus Networks and Tracer. Prior to joining First Analysis in 1994, he was a senior tax consultant with Arthur Andersen & Co. He earned an MBA with honors from the University of Chicago and a bachelor's degree in accounting with highest honors from the University of Illinois at Urbana-Champaign. He is a certified public accountant.
Liam Moran
Associate
Liam Moran is an associate with First Analysis. Prior to joining First Analysis in 2020, he was in the executive development program with Macy's, where he was responsible for managing the financial modeling surrounding Macy's $3 billion asset-based loan, capital project valuations, and corporate forecasting. Liam graduated from Kenyon College with a bachelor’s degree in economics and a concentration in integrated program in humane studies. He was a four-year member of the Kenyon varsity swimming team.
First Analysis Cybersecurity Team
Howard Smith
Managing Director
Matthew Nicklin
Managing Director
Liam Moran
Associate
First Analysis Quarterly Insights
Cybersecurity
Challenges and promise of AI in cybersecurity
January 28, 2025
  • We reflect on both the frustrations and successes we’ve heard about AI in cybersecurity.
  • The biggest hope for AI in cybersecurity is that it can prevent attacks, detecting and potentially blocking novel attacks before they can cause damage; however, such solutions have not been the silver bullet they were hoped to be.
  • In the near-term, we believe it will be challenging to implement AI to detect zero-day and novel threats due to the unpredictable nature of these attacks and the difficulty AI has in distinguishing harmless anomalies from true threats. Efforts to address these shortcomings with information transparency also face challenges.
  • We’re seeing the most success among solutions that use AI to improve cybersecurity teams’ ability to interact with traditional cybersecurity approaches. By bridging the gap between technical complexity and human understanding, these AI solutions streamline security operations centers, enabling teams to be more efficient and effective.

TABLE OF CONTENTS

Frustrations along with some successes

Detecting and blocking novel attacks – the challenge of false alerts

Potential for transparent AI detection solutions

The bottom line for AI detection: Hybrid approaches first

AI success in cybersecurity: Enhancing traditional cybersecurity solutions

AI can be a key partner in cybersecurity efforts

Cybersecurity index: Volatile summer, but gains since September

Cybersecurity M&A: Notable transactions include SecureWorks, Dazz, and Fend

Cybersecurity private placements: Notable transactions include Armis and Upwind

Frustrations along with some successes

AI has had a dramatic effect on the cybersecurity industry in the past year. In this report, we reflect on both the frustrations and successes we’ve heard about in the market. In terms of frustrations, the biggest hope for AI in cybersecurity is that it can prevent attacks, detecting and potentially blocking novel attacks before they can cause damage; however, such solutions have not been the silver bullet they were hoped to be. Among the successes are more mundane AI capabilities – such as using large language models (LLMs) to query data and enhance explanations. These solutions have received less hype compared to AI detection capabilities, but they are the most impactful use of AI we’ve seen to date. We believe they have the potential to transform how security operations operate in relatively short order.

Detecting and blocking novel attacks – the challenge of false alerts

One of the most challenging aspects of defending organizations against cyberattacks is identifying and stopping attacks quickly to prevent or minimize damage. This is difficult for known vulnerabilities and attack vectors; it is even more difficult for zero-day vulnerabilities and novel attack vectors, which, by definition, have not been seen before so cannot be identified or stopped with widely available signatures and rule updates. But with AI, organizations are successfully detecting and blocking even novel attacks because AI excels at quickly identifying anomalous behavior and data traffic patterns and other suspicious activity and conditions. We have heard of numerous examples of zero-day threats found and mitigated with AI.

However, there are two related drawbacks. The first is false positives. AI detects threats that legacy methods would have missed, but it also perceives many harmless activities and patterns as threats. False positives are not a new problem in cybersecurity solutions. And some AI enthusiasts contend false positive alerts (alerting cybersecurity personnel to harmless actions) is valuable because unusual activity is noteworthy, regardless of whether the cause is malicious. However, our conversations indicate this a minority view.

©2025 by First Analysis Corporation.
One South Wacker Drive
  ·  
Suite 3900
  ·  
Chicago, IL 60606
  ·  
312-258-1400