Machine Learning: opportunity or threat?

November 10, 2021

In the light of the upcoming VBN Security Summit held in Amersfoort, we tackle the topic of Machine Learning and its implication in the security management field. On the 18th of November, the first lecture given will be about Artificial Intelligence as an advantage or a danger for the security environment. Regardless of the conclusion, it is clear that Artificial Intelligence and Machine Learning will shape the future of security. Therefore, it seemed natural to give a few insights on this topic ourselves as many major companies moved from a purely “signature-based” system to machine learning systems used to anticipate and to detect malware. If you want to learn more, keep on reading.  

1. First and foremost, what is Machine Learning?    

While machine learning has been around for quite some time now, the growing availability of large amounts of data and advances in computing power have created an environment that has allowed for significant technological progress in recent years. Even though terms are sometimes misused and misunderstood, machine learning can be viewed as a sub-field of today’s very important field of artificial intelligence, which has actually existed since the 1950s.


Machine learning is all about building statistical models that make predictions from data without hard-coded rules and have the ability to improve their performance over time with further data exposure. A machine learning algorithm makes a prediction about a property of interest given a sufficient number of instances from a data source, known as training data, and a property of interest when given a fresh, unseen example. This can be accomplished by calibrating internal parameters using known examples or by using alternative techniques.


Therefore, the concept of machine learning can be clearly defined as “the ability for computers to learn without being explicitly programmed”. Machine learning algorithms essentially develop models of behaviors and utilize those models as a basis for making future predictions based on new input data using mathematical techniques used across large datasets.


Machine learning is often interlinked with the development of self-driving cars. They would use the data gathered by car to anticipate various scenarios along the way such as bad traffic or crossing paths. However, a much more common and vastly utilized example can be identified: Netflix. The platforms constantly suggest new shows to watch based on the previously viewed ones. This constant update available on the platform is a form of machine learning through Netflix algorithm. But these examples are far from being the only ones. Various fields such as medical diagnostics, commerce or finance are also benefiting from this recent development. Regarding the security field, machine learning intends at helping businesses to better analyze threats and to improve the response to attacks and security incidents. 

2. Opportunities

Threat anticipation

As mentioned earlier, one of the key features of machine learning is the ability of machine learning models to analyse large amounts of data - both structured or unstructured. This can radically improve analytical capabilities in risk management and compliance by allowing risk managers in various kinds of institutions to identify risks more effectively and timely, make more informed decisions, and reduce the risk of incidents. Machine learning algorithms will help businesses to detect malicious activities faster and stop attacks before they even get started.

Enhance human learning

At the heart of machine learning in security, there is the belief that it helps human analysts with all aspects of the job, including detecting malicious attacks, analyzing networks, and vulnerability assessment. By that, we mean that the human brain will be pushing its analysis further thanks to machine learning, as the model will provide pre-analyzed data. Therefore, the human learning process will be starting a few steps ahead than it usually does. 

Automation of tasks

The real benefit of using machine learning is that it could automate repetitive and boring tasks, enabling the security staff to focus on more important work. The Machine Learning process should ultimately be aiming at removing the need for humans to do repetitive, law-value decision-making activities. Let the machine handle the repetitive work such as opening doors so that the humans can free up time to deal with strategic and crucial issues instead. 

3. Threats

Adversarial attacks

A classic adversarial attack targets a trained machine learning model by incorporating inputs to the model intentionally designed to cause it to make a mistake. It consists of subtly modifying an original image in such a way that the changes are almost undetectable to the human eye. They are like optical illusions for machines. The modified image is called an adversarial image, and when submitted to a classifier is misclassified, while the original one is correctly classified.


Adversarial attacks raise important security concerns as such attacks could be performed on different systems such as footage retrieved from CCTV cameras. Simply by adding a level of noise of the images, incidents could remain undetected as they would not be correctly classified. Its risk is also aggravated by the fact that they can be performed even if the even if the attacker has no access to the underlying model. A possible defense against them is to use adversarial training, i.e. generating many adversarial examples and explicitly training the model not to be fooled by them.

Data poisoning

Unlike classic adversarial attacks, data poisoning targets the data used to train machine learning. Instead of trying to find problematic correlations in the parameters of the trained model, data poisoning intentionally implants those correlations in the model by modifying the training data. As Machine Learning is often dealing with very large chunks of data, it would be very difficult to notice right away a few poisoned data within the sets which would to misinterpretation of the data.


While data poisoning sounds dangerous, it presents some challenges, the most important being that the attacker must have access to the training pipeline of the machine learning model.

In conclusion, as many arising new technologies, machine learning presents both positive and negative aspects depending on how it is used and by whom. Regardless, the development and the adaption of the technology is bound to be drastically increasing in the next few years. Therefore, rather than denying it, training in order to avoid a vast majority of potential threats might be the best option for the future of security businesses.

Illuminated office building at night with many lit windows against a dark sky
By Marketing Entelec April 29, 2026
Smart buildings use technology and data to improve efficiency, comfort, and sustainability in modern infrastructure and urban environments.
City skyline at dusk with illuminated modern buildings reflected in blue water
By Marketing Entelec April 22, 2026
Discover how smart buildings reduce energy costs, strengthen security, and streamline facility management and why facility managers are making the switch.
A stressed professional sits at a desk with a laptop while a red alarm light flashes in a dim office corridor.
By Marketing Entelec April 15, 2026
False alarms cost more than you think. Discover how smart building integration can helps facility managers verify threats faster and avoid costly evacuations.
Aerial view of the New York City skyline at dusk, featuring the Empire State Building illuminated against a blue sky.
By Marketing Entelec April 8, 2026
Discover how integrated smart buildings unify safety, security, and comfort systems to improve efficiency, safety, and energy performance.
People at a VR display booth of Entelec , some wearing headsets. Signage for
By Marketing Entelec April 1, 2026
Discover how hospitals use VR, including the Sky-Walker control room, for immersive training, simulations, and safer decision-making in complex medical situations.
Three wind turbines stand next to the Oosterscheldekering storm surge barrier.  Sky-Walker
By Marketing Entelec March 25, 2026
Sky-Walker PSIM platform integrates energy management, building systems, and security. See how centralized control reduces costs amid energy crisis.
A wide-angle aerial view of a large industrial oil refinery at sunset, featuring tall towers, pipes, and steam plumes.
By Marketing Entelec March 18, 2026
Security infrastructure is evolving. Explore how unified PSIM platforms like Sky-Walker connect access control, CCTV, and intrusion detection seamlessly.
An industrial plant at night with glowing white lines connecting various points, mountains in the background, and a boat.
By Marketing Entelec March 11, 2026
Learn how centralized control rooms improve visibility and efficiency across multiple industrial sites, and how Sky-Walker enhances operational control.
Warehouse workers in discussion near shelving with paint cans and boxes.
By Marketing Entelec March 4, 2026
Discover how Sky-Walker helps large, multi-site companies protect employees with integrated fire safety, access control, intercom, and intrusion detection systems
Show More