Episode 99: Cybersecurity in the Age of AI: Navigating Threats with Confidence

T Hunt WF Headshot 100x100
Troy Hunt03/27/2025

Cybersecurity isn’t just a technical challenge. It’s a constantly shifting battlefield where hackers look for weaknesses, and defenders work to stay one step ahead. In a recent episode of the #shifthappens podcast, cybersecurity expert Troy Hunt, creator of Have I Been Pwned (HIBP), shares his insights on the ever-evolving threat landscape. He discusses the role of AI in cybercrime and why strong digital security practices are essential for everyone, from individuals to large corporations.

Data Breaches: A Growing Concern

Troy spends over a decade tracking data breaches, watching them grow in both frequency and scale. When he launched HIBP in 2013, he started with 155 million breached records. Today, that number is closing in at a staggering 15 billion.

Troy speaks about the challenge of pushing for transparency. He notes that many companies would rather stay quiet unless forced to acknowledge a breach. Organizations often hesitate to disclose breaches due to legal concerns and fear of reputational damage. However, with data security now a critical issue for individuals and businesses alike, hiding incidents is no longer an option.

Cybercrime Doesn’t Have to Be Sophisticated

There’s a common perception that cyberattacks are always complex, highly sophisticated operations carried out by elite hackers. The reality, as Troy points out, is far simpler. Many attacks succeed because they exploit basic human mistakes — weak passwords, lack of multi-factor authentication (MFA), and poor security awareness.

One of the most prevalent threats remains phishing. Troy shares a story about a friend’s partner who lost thousands of dollars to a scammer pretending to be from the bank. They were manipulated into handing over money. It’s a stark reminder that cybercriminals don’t need advanced techniques; they only need a well-crafted lie and an understanding of human psychology.

The Double-Edged Sword of Generative AI in Cybersecurity

AI changes the game for both attackers and defenders. On one hand, cybercriminals use AI to create more convincing phishing emails, deepfake videos, and automated scams. Errors that once helped users spot fraudulent messages, such as misspellings or odd phrasing, are disappearing. AI-powered attacks are becoming more polished and harder to detect.

On the flip side, AI also provides defenders with powerful tools. Organizations use AI to detect suspicious activity, flag unusual communication patterns, and even prevent fraud before it happens. For example, AI can analyze an executive’s typical email writing style and identify anomalies in messages that might indicate a phishing attempt.

Troy points out that while AI plays an increasing role in security, it isn’t a silver bullet. The fundamentals are still the foundation of a good security strategy.

The Dangers of Oversharing Information

One of Troy’s core security principles is simple: “You can’t lose what you don’t have.” Too many companies and individuals share unnecessary personal data, creating an increased risk in the event of a breach.

Take something as seemingly harmless as one’s date of birth. Many services ask for it even when it’s not strictly needed. Troy recalls a recent breach involving a ticketing service that stores users’ birthdates, exposing them to fraud risks. Given that some organizations still use birthdays as a form of identity verification, this kind of information in the wrong hands can lead to serious consequences.

Troy advises both businesses and individuals to think critically about the data they collect and share. The less stored personal information, the lower the potential fallout from a breach.

The Legal and Ethical Challenges of Cybersecurity

Many people assume that companies must disclose breaches to affected users, but that’s not always the case. While laws like the General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA) require reporting breaches to regulators, direct user notification only happens if the breach is deemed to pose a significant risk.

This means some companies avoid public disclosure unless absolutely necessary. Troy mentions he often plays a role in pushing organizations to inform their customers while balancing legal, ethical, and reputational considerations. While companies themselves are often victims of cybercrime, withholding information from customers only deepens the damage.

What Businesses and Individuals Can Do to Stay Secure

Looking ahead, Troy expects cybersecurity to continue evolving rapidly. AI becomes more prevalent in both offensive and defensive strategies, and organizations must be ready to adapt.

For businesses, Troy recommends some proactive cybersecurity practices:

  • Stop Cybercriminals Before They Strike: Hackers don’t need sophisticated attacks — weak passwords, lack of MFA, and social engineering tactics make their jobs easy. Strengthen your security by using strong, unique passwords and enabling MFA wherever possible.
  • Outsmart AI-Powered Attacks: Cybercriminals leverage AI to craft more convincing phishing scams and deepfake fraud attempts. Counter these threats with AI-powered detection tools, employee training, and skepticism toward unexpected emails or requests.
  • Share Less, Stay Safer: Many companies ask for unnecessary personal details, putting you at greater risk in the event of a breach. Before providing sensitive information, ask yourself if it’s truly required. The less data you share, the less attackers can exploit.
  • Hold Companies Accountable: Some companies don’t disclose breaches unless legally required, leaving users unaware of their compromised data. Stay informed by using breach notification services and advocate for greater transparency in cybersecurity practices.

Final Thoughts

Troy’s insights serve as an important reminder that cybersecurity goes beyond technology. It’s about people, behavior, and decision-making. While AI presents new challenges, it also offers opportunities to enhance security in ways never seen before.

As Troy puts it, “The more we prepare today, the less we have to react tomorrow.” Cybersecurity is an ongoing effort, and staying informed is the first step to staying ahead.

Episode Resources:

Stay Ahead of the Curve with the Latest Insights on the Future of Work

Explore Insights