On May 14, in Las Vegas, seven cybersecurity experts and University of Texas at San Antonio’s National Collegiate Cyber Defense Competition teams tested AI-powered cybersecurity solutions in an intense cyber warfare simulation, where red and blue teams used AI agents to launch attacks and defend networks across distributed systems.
In the desert of Sin City, the competition blurred the line between simulation and real cyber warfare as veteran red teams launched coordinated attacks while collegiate blue teams defended fragmented networks across the US. Within this setting, AI-powered cybersecurity solutions were deployed to accelerate attack planning, reconnaissance, and defense coordination.
The University of Texas at San Antonio hosted the exercise, combining live intrusion attempts, data exfiltration, and defensive response drills designed to mirror actual cyber warfare.
AI-powered cybersecurity solutions are more deeply integrated into both sides of the battlefield, and the environment of such cyber conducts is taking a more realistic shape.
Automated threats are becoming faster than traditional defenses. Human operations, on the other hand, are shaped by AI-driven threat detection systems working alongside human operators.
Autonomous cyber defense is changing landscape, where machines are taking on roles once reserved strictly for skilled analysts,
AI Joins Cyber Warfare Frontlines
Organizers noted that automated threat detection systems were constantly scanning network activity, flagging anomalies in real time as teams tried to outmaneuver each other.
“Each time we penetrate their systems and exfiltrate data, they incur a penalty in points,” said Alex Levinson, a leader within the red team, described the escalating complexity of the projects, adding that “our objective is to employ custom malware—something distinctive that they’ve never encountered.”
As AI agents were introduced into the workflow, operators like Dan Borges began delegating large portions of attack planning to AI-driven threat detection systems.
Other AI-powered cybersecurity solutions that could simulate potential breaches at scale. “They enable me to execute tasks in parallel,” he stated. “I can act swiftly and broadly.”
At the same time, defensive teams leaned heavily on automated vulnerability management tools to patch weaknesses discovered during the simulation.
These systems worked with threats detection models that sometimes misclassified benign activity as malicious, revealing the limitations of over-reliance on automation. Borges recalled one bot’s unexpected behavior as “Absolutely the worst idea I have ever heard,” he chuckled.
Meanwhile, other operators, such as David Cowen, watched AI bots autonomously uncover vulnerabilities during breaks, prompting laughter and surprise.
Across the exercise, the tension between human intuition and machine speed was present, as AI-powered cybersecurity solutions shaped live decision-making loops.
Human Judgment Still Anchors AI Cyber Defense
Cybersecurity leaders studying AI deployments say technology is reshaping both offense and defense beyond simulations. At a Harvard Extension School convening, experts warned that AI-driven threat detection lowers cybercrime barriers while increasing attack sophistication and scale.
Enterprise deployed automated threat detection face adversaries exploiting the same capabilities to refine their tactics. Consequently, organizations are investing heavily in AI-powered cybersecurity solutions and experimenting with automated threat response systems reacting within milliseconds of detecting suspicious activity.
Yet, as threats scale, defenders argue that governance and oversight remain critical.
Many firms are implementing vulnerability management automation strategies to streamline patching cycles, while exploring ways to safely automate vulnerability management without sacrificing transparency.
Jennifer Gold added that organizations risk creating blind spots if human expertise is removed from the loop.
Experts also stress that organizations must evaluate vendors carefully, secure internal AI systems, and avoid opaque “black box” models that obscure accountability. While systems are becoming foundational, they still require constant human validation to ensure reliability under pressure.
Across both real-world deployments and simulated environments like the Las Vegas competition, a consistent pattern emerges, AI-powered cybersecurity solutions are accelerating cybersecurity operations at every level.
Yet even as threats grow more complex expand their reach, the decisive factor remains human oversight guiding, interpreting, and correcting systems that are still far from infallible.
Inside Telecom provides you with an extensive list of content covering all aspects of the tech industry. Keep an eye on our Cybersecurity sections to stay informed and up-to-date with our daily articles.