
5 ways AI is being used to improve security: Security awareness training
Artificial Intelligence (AI) has revolutionized various sectors, some of which we've covered over the last few months. We jumped into a few different AI topics:
- How artificial intelligence is changing the threat landscape
- 5 ways cybercriminals are using AI (Series)
Now, we're exploring how AI contributes to efforts to keep the world safe from cybercrime. We've covered threat detection and intelligence and email security, and today, we're looking at how AI is used in security awareness training.
What is security awareness training?
Employees are almost always the primary targets of threat actors. Phishing attacks and other email threats rely on human error to gain access to sensitive information. According to various sources, phishing attacks are responsible for a significant percentage of data breaches and ransomware attacks:
- A typical organization receives 5 highly personalized spear-phishing emails per day (Barracuda)
- 1 in 4 organizations had at least one email account compromised in 2022 (Barracuda)
- Phishing and other email-based threats are a major factor in 95% of cybersecurity breaches (IBM)
- Phishing is involved in about 36% of data breaches (Verizon)
- 90% of data breaches are caused by phishing attacks that rely on human error (Cisco)
The numbers vary according to timeframe and methodology, but the research is clear. Email-based phishing attacks are a large factor in data breaches, and human error is the determining factor in a phishing attack's success. Security teams and business managers started to fully understand the impact of email attacks in the mid-2010s, and the adoption of automated security awareness training started to grow.
Put simply, security awareness training is an educational program designed to educate individuals about email threats or other types of cybersecurity. A properly executed security awareness program will transform your employees into a resilient first line of defense.
Automated and AI-enhanced training
The use of AI in technology and cybersecurity was growing, and security awareness training was significantly improved with the addition of features like real-time threat simulation and adaptive learning paths. The machine learning (ML) intelligence in these systems was used to continuously update training content based on the latest threat intelligence. This kept the training material relevant to the latest email attacks.
Early security training was automated but not intelligent. Most programs did not add AI or ML until later, but the automation did elevate the effectiveness of the training. Automation made the program delivery consistent and personalized, and it offered reporting and analytics features that could demonstrate the effectiveness of the training.
The differences between automated and AI-enhanced automated security awareness training are summarized in the following table:
Feature |
Automated Security Awareness Training |
AI-Enhanced Automated Security Awareness Training |
Pre-defined Content |
Standardized training materials covering basic security topics |
Adaptive content tailored to individual knowledge gaps |
Scheduled Sessions |
Training modules delivered at pre-scheduled times |
Real-time, adaptive training based on user performance |
Interactive Elements |
Quizzes, videos, and interactive exercises |
Personalized interactive elements based on user behavior and performance |
Progress Tracking |
Tracks completion rates and performance |
Detailed behavioral analytics and real-time adaptation |
Reporting |
Reports on completion and assessment performance |
Advanced reports with insights into user behavior and risk prediction |
Adaptive Learning Paths |
Not available |
Provides personalized learning paths based on performance |
Real-Time Threat Simulation |
Not available |
Simulates real-time threats based on current trends |
Behavioral Analytics |
Basic tracking of user progress |
Monitors and analyzes user behavior for targeted interventions |
Continuous Improvement |
Limited updates based on a predefined schedule |
Continuously updates content with the latest threat intelligence |
Personalized Feedback |
General feedback based on module performance |
Detailed, customized feedback and suggestions for improvement |
Cybersecurity Ventures reports that security awareness training has been widely adopted as of 2024 and is used regularly in over 90% of large enterprises. That number is much greater than the adoption rate of small and medium businesses, which is currently measured at just over 60%. This disparity is unfortunate because AI-enhanced security awareness training is more accessible and affordable than ever before.
Barracuda Security Awareness Training
Barracuda Email Protection includes Security Awareness Training to help customers defend against email threats. Our program uses AI technologies to simulate real-world phishing attacks, analyze user behavior, and provide personalized, in-the-moment training. This training exposes users to the latest threats and measures the response, which is used to inform customized training programs. This approach ensures continuous and effective training, enhancing users' ability to recognize and respond to phishing attempts and other email-based attacks.
Did you know…
Barracuda has published a new e-book titled Securing tomorrow: A CISO’s guide to the role of AI in cybersecurity. This e-book explores security risks and exposes the vulnerabilities that cybercriminals exploit with the aid of AI to scale up their attacks and improve their success rates. Get your free copy of the e-book right now and see all the latest threats, data, analysis, and solutions for yourself.

The Ransomware Insights Report 2025
Risultati chiave sull'esperienza e l'impatto del ransomware sulle organizzazioni a livello mondiale
Iscriviti al blog di Barracuda.
Iscriviti per ricevere i Threat Spotlight, commenti del settore e altro ancora.

Sicurezza della vulnerabilità gestita: correzione più rapida, meno rischi, conformità più semplice
Scopri quanto può essere facile individuare le vulnerabilità che i criminali informatici vogliono sfruttare