Quick facts

Why it matters

Because AI in cyber security affects breach response, resilience, trust, and regulatory exposure. Getting the basics right matters long before anyone wheels in the hype machine.

What you’ll learn

Who this book is for

IT security professionals, CISOs, and risk managers who need a practical guide to using AI for threat detection and breach prevention.

What this book covers

A guide to using artificial intelligence for cybersecurity, using machine learning to detect threats, prevent breaches, and enhance data protection.

What makes this book distinct

The uncomfortable truth this book opens with: AI is as powerful a tool for attackers as it is for defenders. The chapters on adversarial AI, deepfake-based social engineering, and AI-generated phishing campaigns are essential reading for anyone who thinks cyber security is just about firewalls and patching.

Not your book? If you're a practising security professional wanting implementation guides or code, look elsewhere — this is strategic and conceptual, written for decision-makers and non-technical managers who need to understand what they're actually defending against.

Jonathan Harris – AI Author & Podcast Host
Jonathan Harris Artificial Intelligence Author & Host of Turing's Torch AI Weekly

Get this book

Keep exploring

🎧 Related listening

Turing's Torch AI Weekly unpacks the latest in AI every week.

Browse podcast episodes

📚 Further reading

Plain-English definitions for every AI term you'll encounter.

Explore the glossary

📰 Weekly signal

AI Edge — the weekly AI newsletter worth reading before coffee.

Subscribe free

Deeper overview

Longer-form context from the retired overview page, now folded into the canonical book route.

Problem framing: where this topic gets messy

In cyber security, the issue is not a lack of alerts. It is signal, speed, and whether defenders can respond faster than attackers adapt. A guide to using artificial intelligence for cybersecurity, using machine learning to detect threats, prevent breaches, and enhance data protection. Pages: 269. Because AI in cyber security affects breach response, resilience, trust, and regulatory exposure. Getting the basics right matters long before anyone wheels in the hype machine.

Practical outcomes

In practical terms, the aim is simple: you should get a more grounded sense of where detection, triage, and response automation help — and where blind trust becomes a liability. That means clearer judgement, fewer lazy assumptions, and a much better sense of where to press further or walk away.

  • Identify where ai is already being used in cyber security today — and where the claims are running ahead of reality.
  • Work through the workflows, systems, and trade-offs behind practical cyber security use cases, explained in plain english.
  • Work through key themes including threat detection, breach prevention, automation, response.
  • Work through the limits, risks, and awkward questions worth asking before you sign off on the sales pitch.

Chapter-level signals

Not a chapter list carved in stone, but the sort of material readers can reasonably expect to work through.

Where AI is already being used

Where AI is already being used in cyber security today — and where the claims are running ahead of reality.

The workflows, systems, and trade-offs behind

The workflows, systems, and trade-offs behind practical cyber security use cases, explained in plain English.

Key themes including threat detection, breach

Key themes including threat detection, breach prevention, automation, response.

The limits, risks, and awkward questions

The limits, risks, and awkward questions worth asking before you sign off on the sales pitch.

What makes this title distinct

The uncomfortable truth this book opens with: AI is as powerful a tool for attackers as it is for defenders. The chapters on adversarial AI, deepfake-based social engineering, and AI-generated phishing campaigns are essential reading for anyone who thinks cyber security is just about firewalls and patching. Not your book? If you're a practising security professional wanting implementation guides or code, look elsewhere — this is strategic and conceptual, written for decision-makers and non-technical managers who need to understand what they're actually defending against.

FAQ

What will I learn from this book?

A guide to using artificial intelligence for cybersecurity, using machine learning to detect threats, prevent breaches, and enhance data protection.

Who is this book for?

IT security professionals, CISOs, and risk managers who need a practical guide to using AI for threat detection and breach prevention.

How long is it?

It’s 269 pages (varies by edition).

What format is it available in?

Available as an eBook via Amazon (use the buy link on this page).

Keep exploring the Jonathan Harris AI library

Use the links below to carry on browsing the wider catalogue, the podcast, the newsletter, or a related topic.