Aviad Hasnis, CTO at Cynet Security, leads the company’s cybersecurity technology strategy, including development of its extended detection and response (XDR) platform, threat research, and managed detection and response (MDR) services. Prior to Cynet, he held senior cybersecurity roles in the Israel Defense Forces and holds advanced degrees in engineering and physics from the Technion.
Cynet Security offers an all-in-one automated cybersecurity platform designed to simplify protection for small and mid-sized organizations. Its solution integrates endpoint, network, user, email, and cloud security with built-in automation, XDR capabilities, and 24/7 MDR support.
Cybersecurity is an ever-evolving field. How do you balance staying ahead of threats while keeping solutions user-friendly and accessible to small and mid-sized businesses?
Lean SMB security teams must confront the same threats facing a Fortune 500 — with a fraction of the personnel or resources or budget. As cyberattacks soar in volume and complexity, SMB security leaders are driving demand for simplified, automated and consolidated security solutions to reduce complexity and improve protection.
At Cynet, my team purposely built the All-in-One Cybersecurity Platform to combine a full suite of security capabilities on a single, simple, AI-enabled solution.
- By unifying environment-wide visibility and protection on one intuitive dashboard, Cynet maximizes user-friendly simplicity.
- By automating key security processes, Cynet helps lean teams maximize efficiency.
Cynet’s platform is described as natively automated—can you explain how AI and automation play a role in detecting and mitigating cyber threats?
My team designed Cynet’s All-in-One Cybersecurity Platform to automate processes so people can spend less time managing day-to-day operations and more time building their business.
At Cynet, my team also takes pride in a “built, not bought” approach. Every capability, feature and automation of the All-in-One Cybersecurity Platform is developed in-house, from the ground up, and natively integrated so everything just works seamlessly out of the box. This eliminates integration gaps and overlaps that can compromise automated protections.
The MITRE ATT&CK evaluations ranked Cynet among the top performers. What AI-driven strategies contributed to this success?
I am immensely proud of my team’s contributions to Cynet’s record-breaking performance in the most recent MITRE ATT&CK Evaluation. There’s a good reason MITRE ATT&CK is the most trusted independent assessment among cybersecurity decision makers. MITRE uses real-world cyberattack scenarios to measure the performance of competing security platforms. That Cynet was the only vendor to achieve 100% Protection and 100% Detection Visibility reflects our commitment to building a reliable product for Cynet partners and customers around the world.
AI-based cybersecurity has been criticized for potential false positives and adversarial attacks. How does Cynet ensure accuracy and robustness in its threat detection?
AI-enabled cybersecurity solutions are most effective when integrated with expert oversight. While AI can process and analyze vast amounts of data rapidly, it is crucial to have experienced cybersecurity professionals providing ongoing supervision. My team at Cynet ensures that AI systems’ decisions are continuously validated, preventing situations where AI could potentially miss nuanced threats or make incorrect conclusions. In cybersecurity, where risks evolve quickly, human expertise is essential to interpreting results and making context-sensitive decisions.
To provide partners and customers with an additional layer of protection, Cynet backs the All-in-One Cybersecurity Platform with around-the-clock SOC support. Cynet’s SOC is staffed 24/7 by world-class analysts, ensuring that end-user environments are proactively monitored at all times, complementing automated scans. This unique combination of automated protection and hands-on expertise maximizes the peace of mind for Cynet partners and customers.
With the rise of deepfake attacks, AI-generated malware, and sophisticated social engineering, what emerging cybersecurity threats concern you the most?
We’re closely watching how generative AI is being weaponized—not just to craft deepfakes, but to automate phishing, generate polymorphic malware, and simulate legitimate user behavior. But all these AI-powered tactics are simply evolved means to a familiar end: tricking people. Therefore, it is not enough to simply keep cybercriminals “out”. Security teams also must be able to track user behavior and network activity for abnormal signals, and that’s a priority AI can assist.
To ensure our automated protections stay a step ahead of AI-enabled cyberattacks, Cynet’s product roadmap incorporates the latest security analyst insights, as well as direct input from Cynet partners and customers.
Ransomware attacks continue to evolve—how does Cynet’s AI-driven protection prevent and mitigate these attacks?
To thwart ransomware attacks, early detection is key. By automatically detecting threats, determining their root cause, eradicating all attack components throughout the environment, and delivering a report to confirm remediation, the All-in-One Cybersecurity Platform reduces manual incident handling by 90% and delivers 50 times faster results.
Do you see autonomous cybersecurity—where AI independently detects and responds to threats without human intervention—becoming a reality soon?
Though AI can automate detection and response, human analysts should always have the final say in strategic decisions. At Cynet, we embrace AI-driven automation while ensuring that security professionals remain engaged in high-value problem-solving.
- The Cynet All-in-One Cybersecurity Platform automates key security processes, reducing the burden of manual operations so security teams can focus on strategic initiatives rather than routine tasks.
- In incident response, Cynet automatically detects threats, determines root causes, eradicates attack components, and delivers detailed reports. This automation reduces manual incident handling by 90% and achieves 50-times faster results.
- Despite this high level of automation, we always emphasize human oversight. Our 24/7 SOC team continuously monitors environments, validates alerts, and ensures that AI-driven actions align with security best practices.
This balanced approach ensures that automated systems work as intended while allowing human experts to provide critical insight and intervention when necessary.
What role do large language models (LLMs) play in cybersecurity? Can they be leveraged for both offense and defense?
Cybercriminals are putting LLMs to all sorts of no good. Guardrails to prevent mainstream GenAI platforms from performing malicious activity can be bypassed with relative ease. Social engineering scams can be launched at scale with the click of a button. Combined with easy access to malware kits and RaaS in cybercriminal forums, the bar for cybercriminals to do damage is lower than ever. With genAI, aspiring script kiddies no longer need advanced hacking skills to do real damage.
AI is also being used by threat actors to automate cyberattacks. How do you see the AI arms race in cybersecurity playing out?
The AI arms race in cybersecurity is well underway, with attackers using AI to automate phishing campaigns, generate deepfake content and create more advanced malware. These technologies allow cybercriminals to scale their attacks rapidly and make them more difficult to detect, increasing the overall threat landscape.
My Cynet teammates and I help security teams fight AI-enabled fire with AI-enabled fire. We automate detection, analysis, response and reporting to facilitate results far faster than human teams alone could. The key to maintaining an edge is to continuously refine models with up-to-date, high-quality data, enhance automated defenses, and integrate real-world threat intelligence to adapt to evolving tactics. As AI-driven threats grow more sophisticated, proactive defense strategies will be critical in staying ahead of attackers.
How do you see quantum computing affecting cybersecurity in the next decade? Is Cynet preparing for potential quantum threats?
Quantum computing is an intriguing but distant frontier in cybersecurity. While it has the potential to break traditional encryption methods, I don’t see it as an immediate risk in the next few years. Unlike generative AI, which is widely accessible and already impacting cybersecurity, quantum computing remains largely confined to research labs and nation-state-level initiatives.
Currently, financially motivated adversaries would face significant hurdles to access and use quantum computing for malicious purposes. The complexity and resources required to conduct a quantum-based cyberattack likely preclude mainstream deployment for the time being. That said, it’s important for cybersecurity vendors to maintain a proactive approach to R&D. Quantum is certainly an area my team will be keeping an eye on as the technology advances from theoretical to proof of concept to something organizations might actually face in the wild.
Thank you for the great interview, readers who wish to learn more should visit Cynet Security.
Awesome https://shorturl.fm/5JO3e