{"id":36180,"date":"2024-10-16T14:27:57","date_gmt":"2024-10-16T14:27:57","guid":{"rendered":"https:\/\/expleo.com\/global\/en\/?post_type=insights&#038;p=87391"},"modified":"2024-10-21T15:05:56","modified_gmt":"2024-10-21T15:05:56","slug":"ai-in-cybersecurity","status":"publish","type":"insights","link":"https:\/\/expleo.com\/global\/de\/einblicke\/neuigkeiten\/ai-in-cybersecurity\/","title":{"rendered":"Expleo Appell zur Cybersicherheit: Auf transformative KI-Auswirkungen vorbereiten\u00a0"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"36180\" class=\"elementor elementor-36180\" data-elementor-post-type=\"insights\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1d1a0f1 gg-article-content gg-standard-article-template gg-simple-text gg-container-tiny elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1d1a0f1\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-415c0999\" data-id=\"415c0999\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-69403be4 elementor-widget elementor-widget-text-editor\" data-id=\"69403be4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong><span class=\"TextRun SCXW44379053 BCX8\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"none\"><span class=\"NormalTextRun SpellingErrorV2Themed SCXW44379053 BCX8\">Expleo<\/span><span class=\"NormalTextRun SCXW44379053 BCX8\">, <\/span><span class=\"NormalTextRun SCXW44379053 BCX8\">Vereinigtes K\u00f6nigreich<\/span><span class=\"NormalTextRun SCXW44379053 BCX8\">, 16 Oktober <\/span><\/span><span class=\"TextRun SCXW44379053 BCX8\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW44379053 BCX8\">2024.<\/span><\/span><\/strong><span class=\"TextRun SCXW44379053 BCX8\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"none\"> <span class=\"NormalTextRun SCXW44379053 BCX8\">Das weltweit t\u00e4tige Ingenieurs-, Technologie- und Beratungsunternehmen <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW44379053 BCX8\">Expleo<\/span> <span class=\"NormalTextRun SCXW44379053 BCX8\">appelliert an<\/span> <span class=\"NormalTextRun SCXW44379053 BCX8\">Unternehmen, sich auf die transformativen Auswirkungen von KI auf die Cybersicherheit vorzubereiten<\/span><span class=\"NormalTextRun SCXW44379053 BCX8\">. Um <\/span><span class=\"NormalTextRun SCXW44379053 BCX8\">den<\/span><span class=\"NormalTextRun SCXW44379053 BCX8\"> immer <\/span><span class=\"NormalTextRun SCXW44379053 BCX8\">raffinierteren<\/span> <span class=\"NormalTextRun SCXW44379053 BCX8\">KI-gesteuerte<\/span><span class=\"NormalTextRun SCXW44379053 BCX8\">n<\/span><span class=\"NormalTextRun SCXW44379053 BCX8\"> Cyberangriffe<\/span><span class=\"NormalTextRun SCXW44379053 BCX8\">n<\/span> <span class=\"NormalTextRun SCXW44379053 BCX8\">entgegenzuwirken<\/span><span class=\"NormalTextRun SCXW44379053 BCX8\">, <\/span><span class=\"NormalTextRun SCXW44379053 BCX8\">m\u00fcssen Organisationen <\/span><span class=\"NormalTextRun SCXW44379053 BCX8\">in <\/span><span class=\"NormalTextRun SCXW44379053 BCX8\">KI-gest\u00fctzten Schutz <\/span><span class=\"NormalTextRun SCXW44379053 BCX8\">investieren<\/span><span class=\"NormalTextRun SCXW44379053 BCX8\">.<\/span><\/span><span class=\"EOP SCXW44379053 BCX8\" data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">In einem neuen Leitfaden mit dem Titel <\/span><b><i><span data-contrast=\"none\">\u201eKI in der Cybersicherheit: ein zweischneidiges Schwert\u201c<\/span><\/i><\/b><span data-contrast=\"none\"> untersucht Expleo die k\u00fcnftigen Auswirkungen der sich rasch weiterentwickelnden KI-Technologien auf verschiedene Sektoren. Der Leitfaden enth\u00e4lt zudem konkrete Handlungsanweisungen, wie KI in verschiedenen Branchensegmenten zur Verbesserung der Cybersicherheit eingesetzt werden kann, sowie Empfehlungen, wie Unternehmen wachsam gegen\u00fcber m\u00f6glichen Missbr\u00e4uchen bleiben.<\/span><\/p>\n<p><b><span data-contrast=\"none\">Jeff Hoyle, EVP Aero, Space &amp; Defence, erkl\u00e4rt<\/span><\/b><span data-contrast=\"none\">: <\/span><i><span data-contrast=\"none\">\u201eKI ist die bahnbrechende Technologie unserer Zeit. Sie erm\u00f6glicht intelligentere Luft- und Raumfahrtlogistik, verbesserte Datensicherheit im Automobilbereich und Echtzeit-Bedrohungserkennung im Bank- und Finanzwesen \u2013 und hat damit das Potenzial, bestehende Cybersicherheitsl\u00f6sungen erheblich zu verbessern.\u201c<\/span><\/i><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><i><span data-contrast=\"none\">\u201eSie kann jedoch auch f\u00fcr Angriffe und St\u00f6rungen eingesetzt werden. Schon heute manipulieren Kriminelle KI-Technologie, um Schwachstellen in bestehenden Cybersicherheitsma\u00dfnahmen auszunutzen.\u201c<\/span><\/i><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><i><span data-contrast=\"none\">\u201eUm sich darauf vorzubereiten, m\u00fcssen F\u00fchrungskr\u00e4fte die Vorteile und Risiken dieser neuen Technologie genau verstehen und wissen, wie die Technologie eingesetzt werden kann, um die Cybersicherheit zu verbessern und potenzielle Angriffe zu entsch\u00e4rfen, noch bevor sie zu einem kostspieligen Problem werden.\u201c<\/span><\/i><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e827f4d elementor-widget elementor-widget-spacer\" data-id=\"e827f4d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4a3a982 gg-image-with-overalpping-text gg-image-with-overalpping-text-v2 gg-container-large elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4a3a982\" data-element_type=\"section\" data-e-type=\"section\" id=\"download\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-34b8873\" data-id=\"34b8873\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b87ba18 gg-image-with-overalpping-text__tagline gg-font-v33 elementor-widget elementor-widget-heading\" data-id=\"b87ba18\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">PDF herunterladen<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9d5d282 gg-image-with-overalpping-text__heading elementor-widget elementor-widget-heading\" data-id=\"9d5d282\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">For more in-depth analysis download the full guide \u2018AI in cybersecurity: between shield and shadow\u2019 <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-21f9afd elementor-widget elementor-widget-spacer\" data-id=\"21f9afd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b09a4fb gg-button-v6 gg-font-v28 elementor-align-left elementor-mobile-align-center elementor-hidden-mobile elementor-widget elementor-widget-button\" data-id=\"b09a4fb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-grow\" href=\"https:\/\/indd.adobe.com\/view\/ffed279e-f482-4b26-b5ae-58619bcb47fa\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">PDF herunterladen<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-062e1d1 gg-button-v6 gg-font-v28 elementor-align-left elementor-mobile-align-center elementor-hidden-desktop elementor-widget elementor-widget-button\" data-id=\"062e1d1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-grow\" href=\"https:\/\/indd.adobe.com\/view\/ffed279e-f482-4b26-b5ae-58619bcb47fa\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">PDF herunterladen<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e101868 gg-button-v6 gg-font-v28 elementor-align-left elementor-mobile-align-center elementor-widget elementor-widget-button\" data-id=\"e101868\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-grow\" href=\"https:\/\/expleo.com\/global\/de\/media-room\/\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">media room<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-96158a9 gg-article-content gg-standard-article-template gg-simple-text gg-container-tiny elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"96158a9\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f2efc76\" data-id=\"f2efc76\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-19051b0 elementor-widget elementor-widget-spacer\" data-id=\"19051b0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-810d722 elementor-widget elementor-widget-heading\" data-id=\"810d722\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">KI-gest\u00fctzte Cybersicherheit <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6cb26c9 elementor-widget elementor-widget-text-editor\" data-id=\"6cb26c9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\n<p><span class=\"TextRun SCXW8753592 BCX8\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW8753592 BCX8\">KI ist <\/span><span class=\"NormalTextRun SCXW8753592 BCX8\">f\u00fcr<\/span> <span class=\"NormalTextRun SCXW8753592 BCX8\">viele Branchen <\/span><span class=\"NormalTextRun SCXW8753592 BCX8\">zukunftstr\u00e4chtig. Sie<\/span> <span class=\"NormalTextRun SCXW8753592 BCX8\">erm\u00f6glicht neue Arbeitsweisen<\/span><span class=\"NormalTextRun SCXW8753592 BCX8\"> und gew\u00e4hrleistet <\/span><span class=\"NormalTextRun SCXW8753592 BCX8\">gleichzeitig die Integrit\u00e4t, indem sie Menschen auf dem neu<\/span><span class=\"NormalTextRun SCXW8753592 BCX8\">e<\/span><span class=\"NormalTextRun SCXW8753592 BCX8\">sten Stand h\u00e4lt. I<\/span><span class=\"NormalTextRun SCXW8753592 BCX8\">m <\/span><span class=\"NormalTextRun SCXW8753592 BCX8\">Bericht untersucht <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW8753592 BCX8\">Expleo<\/span><span class=\"NormalTextRun SCXW8753592 BCX8\"> die Vorteile und Risiken f\u00fcr die Luft- und Raumfahrt, die Automobilindustrie, den Bankensektor, die Verteidigungsindustrie und den Energiesektor<\/span><span class=\"NormalTextRun SCXW8753592 BCX8\">:<\/span><\/span><span class=\"EOP SCXW8753592 BCX8\" data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e68c341 elementor-widget elementor-widget-heading\" data-id=\"e68c341\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Luft- und Raumfahrt: KI \u2013 erster Offizier der Cybersicherheit<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ee03ccc elementor-widget elementor-widget-text-editor\" data-id=\"ee03ccc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW10925509 BCX8\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW10925509 BCX8\">Die Integration digitaler Systeme in moderne Flugzeuge macht <\/span><span class=\"NormalTextRun SCXW10925509 BCX8\">sie<\/span> <span class=\"NormalTextRun SCXW10925509 BCX8\">zu einem fliegenden Rechenzentrum, das anf\u00e4llig f\u00fcr Angriffe ist. Durch die Integration von KI-gest\u00fctzter Cybersicherheit in COTS-Komponenten (Commercial off <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW10925509 BCX8\">the<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW10925509 BCX8\">Shelf<\/span><span class=\"NormalTextRun SCXW10925509 BCX8\">) und Zero-Trust-Architektur<\/span><span class=\"NormalTextRun SCXW10925509 BCX8\">en<\/span><span class=\"NormalTextRun SCXW10925509 BCX8\"> k\u00f6nnen sich Unternehmen<\/span><span class=\"NormalTextRun SCXW10925509 BCX8\"> aus der Luft- und Raumfahrt<\/span><span class=\"NormalTextRun SCXW10925509 BCX8\"> vor raffinierten Angriffen sch\u00fctzen.<\/span><\/span><\/p>\n<p><span class=\"TextRun SCXW247203497 BCX8\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"none\"><strong><span class=\"NormalTextRun SCXW247203497 BCX8\">Graham Younger, VP Aerospace<\/span><span class=\"NormalTextRun SCXW247203497 BCX8\">,<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW247203497 BCX8\">Expleo<\/span><span class=\"NormalTextRun SCXW247203497 BCX8\">, <\/span><\/strong><span class=\"NormalTextRun SCXW247203497 BCX8\">kommentiert<\/span><span class=\"NormalTextRun SCXW247203497 BCX8\">: <\/span><\/span><span class=\"TextRun SCXW247203497 BCX8\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW247203497 BCX8\">\u201e<\/span><em><span class=\"NormalTextRun SCXW247203497 BCX8\">Nur durch die Umsetzung eines mehrschichtigen Ansatzes f\u00fcr <\/span><span class=\"NormalTextRun SCXW247203497 BCX8\">die <\/span><span class=\"NormalTextRun SCXW247203497 BCX8\">Cybersicherheit in Verbindung mit strengen Tests kann die Luft- und Raumfahrt <\/span><span class=\"NormalTextRun SCXW247203497 BCX8\">KI-Technologien sicher integrieren. Dieser Ansatz ebnet den Weg der Branche<\/span><span class=\"NormalTextRun SCXW247203497 BCX8\"> in ein neues goldenes Zeitalter des Fliegens, das von Innovation, <\/span><span class=\"NormalTextRun SCXW247203497 BCX8\">mehr<\/span> <span class=\"NormalTextRun SCXW247203497 BCX8\">Nachhaltigkeit und Effizienz gepr\u00e4gt ist.<\/span><\/em><span class=\"NormalTextRun SCXW247203497 BCX8\">\u201c<\/span><\/span><span class=\"EOP SCXW247203497 BCX8\" data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5a0d20a elementor-widget elementor-widget-heading\" data-id=\"5a0d20a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Automobilindustrie: Technologie \u00fcbernimmt das Steuer <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a47c402 elementor-widget elementor-widget-text-editor\" data-id=\"a47c402\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW213164482 BCX8\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW213164482 BCX8\">Um die <\/span><span class=\"NormalTextRun SCXW213164482 BCX8\">F\u00e4higkeiten<\/span> <span class=\"NormalTextRun SCXW213164482 BCX8\">der KI <\/span><span class=\"NormalTextRun SCXW213164482 BCX8\">zum <\/span><span class=\"NormalTextRun SCXW213164482 BCX8\">Vorteil <\/span><span class=\"NormalTextRun SCXW213164482 BCX8\">der<\/span><span class=\"NormalTextRun SCXW213164482 BCX8\"> Automobilindustrie <\/span><span class=\"NormalTextRun SCXW213164482 BCX8\">nutzen zu k\u00f6nnen<\/span><span class=\"NormalTextRun SCXW213164482 BCX8\">, <\/span><span class=\"NormalTextRun SCXW213164482 BCX8\">bietet sich <\/span><span class=\"NormalTextRun SCXW213164482 BCX8\">zuk\u00fcnftig <\/span><span class=\"NormalTextRun SCXW213164482 BCX8\">eine <\/span><span class=\"NormalTextRun SCXW213164482 BCX8\">Open<\/span><span class=\"NormalTextRun SCXW213164482 BCX8\">&#8211;<\/span><span class=\"NormalTextRun SCXW213164482 BCX8\">Source<\/span><span class=\"NormalTextRun SCXW213164482 BCX8\">-artige<\/span> <span class=\"NormalTextRun SCXW213164482 BCX8\">Zusammenarbeit<\/span> <span class=\"NormalTextRun SCXW213164482 BCX8\">an<\/span><span class=\"NormalTextRun SCXW213164482 BCX8\">. Sie erm\u00f6glicht es<\/span><\/span> <span class=\"TextRun SCXW213164482 BCX8\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW213164482 BCX8\">Unternehmen, den \u00dcberblick \u00fcber die Bedrohungslage zu behalten.<\/span> <span class=\"NormalTextRun SCXW213164482 BCX8\">Dar\u00fcber hinaus<\/span><span class=\"NormalTextRun SCXW213164482 BCX8\"> m\u00fcssen Autohersteller mit ihren Zulieferern <\/span><\/span><a class=\"Hyperlink SCXW213164482 BCX8\" href=\"https:\/\/expleo.com\/global\/en\/insights\/whitepapers\/automotive-cybersecurity-guidebook\/\" target=\"_blank\" rel=\"noreferrer noopener\"><span class=\"TextRun Underlined SCXW213164482 BCX8\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW213164482 BCX8\" data-ccp-charstyle=\"Hyperlink\">\u201eSecurity by Design\u201c <\/span><\/span><\/a><span class=\"TextRun SCXW213164482 BCX8\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW213164482 BCX8\">gew\u00e4hrleisten und eine kontinuierliche \u00dcberwachung von Bedrohungen implementieren.<\/span><\/span><span class=\"EOP SCXW213164482 BCX8\" data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span class=\"TextRun SCXW62162547 BCX8\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"none\"><strong><span class=\"NormalTextRun SCXW62162547 BCX8\">Steve <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW62162547 BCX8\">McEvoy<\/span><span class=\"NormalTextRun SCXW62162547 BCX8\">, <\/span><span class=\"NormalTextRun ContextualSpellingAndGrammarErrorV2Themed SCXW62162547 BCX8\">VP Automotive<\/span><span class=\"NormalTextRun SCXW62162547 BCX8\">, <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW62162547 BCX8\">Expleo<\/span><\/strong><span class=\"NormalTextRun SCXW62162547 BCX8\"><strong>,<\/strong> <\/span><span class=\"NormalTextRun SCXW62162547 BCX8\">sagt dazu<\/span><span class=\"NormalTextRun SCXW62162547 BCX8\">:<\/span> <\/span><em><span class=\"TextRun SCXW62162547 BCX8\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW62162547 BCX8\">\u201eDurch Zusammenarbeit <\/span><span class=\"NormalTextRun SCXW62162547 BCX8\">ergibt sich <\/span><span class=\"NormalTextRun SCXW62162547 BCX8\">die<\/span><span class=\"NormalTextRun SCXW62162547 BCX8\"> Chance<\/span><span class=\"NormalTextRun SCXW62162547 BCX8\">, dass<\/span><span class=\"NormalTextRun SCXW62162547 BCX8\"> die Automobilindustrie bei der Festlegung von Standards und der gemeinsamen Entwicklung von L\u00f6sungen eine Vorreiterrolle einnimmt<\/span><span class=\"NormalTextRun SCXW62162547 BCX8\">. Gleichzeitig ist es damit m\u00f6glich,<\/span> <span class=\"NormalTextRun SCXW62162547 BCX8\">die Herausforderungen, die KI f\u00fcr Autohersteller und Tier-1-Zulieferer mit sich bringt, gemeinsam zu <\/span><span class=\"NormalTextRun SCXW62162547 BCX8\">meistern<\/span><span class=\"NormalTextRun SCXW62162547 BCX8\">.<\/span><span class=\"NormalTextRun SCXW62162547 BCX8\">\u201c<\/span><\/span><span class=\"EOP SCXW62162547 BCX8\" data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/em><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-95c418d elementor-widget elementor-widget-heading\" data-id=\"95c418d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Banken, Finanzdienstleister und Versicherungen: Innovation als Basis<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-efd171b elementor-widget elementor-widget-text-editor\" data-id=\"efd171b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW44260067 BCX8\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW44260067 BCX8\">Unternehmen aus diesem Marktsegment<\/span> <span class=\"NormalTextRun SCXW44260067 BCX8\">bleiben<\/span><span class=\"NormalTextRun SCXW44260067 BCX8\"> skeptisch<\/span><span class=\"NormalTextRun SCXW44260067 BCX8\">, <\/span><span class=\"NormalTextRun SCXW44260067 BCX8\">was die F\u00e4higkeit von KI betrifft, einen Mehrwert zu schaffen<\/span><span class=\"NormalTextRun SCXW44260067 BCX8\">.<\/span><span class=\"NormalTextRun SCXW44260067 BCX8\"> Kosten, mangelnde Transparenz und die Unf\u00e4higkeit, in Echtzeit zu arbeiten, <\/span><span class=\"NormalTextRun SCXW44260067 BCX8\">werden als Gegenargument genannt<\/span><span class=\"NormalTextRun SCXW44260067 BCX8\">.<\/span> <span class=\"NormalTextRun SCXW44260067 BCX8\">Doch drei<\/span><span class=\"NormalTextRun SCXW44260067 BCX8\"> KI-Modelle <\/span><span class=\"NormalTextRun SCXW44260067 BCX8\">erweisen bereits ihren Wert f\u00fcr <\/span><span class=\"NormalTextRun SCXW44260067 BCX8\">Banken, Finanzdienstleistern und Versicherungen<\/span><span class=\"NormalTextRun SCXW44260067 BCX8\"> \u2013 beispielsweise f\u00fcr den Betrugsschutz<\/span><span class=\"NormalTextRun SCXW44260067 BCX8\">: maschinelles Lernen (ML), nat\u00fcrliche Sprachverarbeitung (NLP) und Deep Learning<\/span><span class=\"NormalTextRun SCXW44260067 BCX8\">.<\/span><\/span><span class=\"EOP SCXW44260067 BCX8\" data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><strong>Angus Panton, Head of Banking and Finance Service, UK Expleo, <\/strong><b><span data-contrast=\"none\">sagt:<\/span><\/b><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><i><span data-contrast=\"none\">\u201e<\/span><\/i><em>Es besteht ein grundlegendes Bewusstsein daf\u00fcr, dass eine zu schnelle Einf\u00fchrung die Gefahr birgt, Modelle und Werkzeuge k\u00f6nnten manipuliert und missbraucht werden. Hier kommt die Implementierung einer <a href=\"https:\/\/expleo.com\/global\/de\/einblicke\/neuigkeiten\/expleo-und-permanent-tsb-anti-smishing-loesung\/\">sicheren Architektur<\/a> in der gesamten Organisation mit entsprechenden Testprogrammen und Qualit\u00e4tssicherungsma\u00dfnahmen ins Spiel<\/em><i><span data-contrast=\"none\">.\u201c<\/span><\/i><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-68e3da2 elementor-widget elementor-widget-heading\" data-id=\"68e3da2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Wehrtechnik: Wenn Sicherheit nicht verhandelbar ist <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-80a6aa0 elementor-widget elementor-widget-text-editor\" data-id=\"80a6aa0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-contrast=\"none\">Der Verteidigungssektor konzentriert sich auf KI-basierte L\u00f6sungen, die mit einem Human-in-the-Loop-Ansatz entworfen, eingesetzt und betrieben werden. So l\u00e4sst sich sicherstellen, dass ethische und rechtliche Standards strikt eingehalten werden.<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><strong><span class=\"TextRun SCXW116372959 BCX8\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW116372959 BCX8\">Jeff <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW116372959 BCX8\">Hoyle<\/span><span class=\"NormalTextRun SCXW116372959 BCX8\">, EVP Aero, Space and Defence, <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW116372959 BCX8\">Expleo<\/span><span class=\"NormalTextRun SCXW116372959 BCX8\">:<\/span> <\/span><\/strong><span class=\"TextRun SCXW116372959 BCX8\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW116372959 BCX8\">\u201e<\/span><span class=\"NormalTextRun SCXW116372959 BCX8\">Sicherheit <\/span><span class=\"NormalTextRun SCXW116372959 BCX8\">ist <\/span><span class=\"NormalTextRun SCXW116372959 BCX8\">in der Verteidigung <\/span><\/span><span class=\"TextRun Underlined SCXW116372959 BCX8\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW116372959 BCX8\">nicht verhandelbar<\/span><\/span><span class=\"TextRun SCXW116372959 BCX8\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW116372959 BCX8\">. <\/span><span class=\"NormalTextRun SCXW116372959 BCX8\">Es ist<\/span> <span class=\"NormalTextRun SCXW116372959 BCX8\">allgemein anerkannt, dass KI eine <\/span><span class=\"NormalTextRun SCXW116372959 BCX8\">wichtige Rolle bei der Gew\u00e4hrleistung und Einhaltung von Cybersicherheitsstandards spielen kann, um Verteidigungsprogramme vor b\u00f6swilligen Akteuren zu sch\u00fctzen<\/span><span class=\"NormalTextRun SCXW116372959 BCX8\">. Dennoch<\/span> <span class=\"NormalTextRun SCXW116372959 BCX8\">m\u00fcssen wir <\/span><span class=\"NormalTextRun SCXW116372959 BCX8\">uns dar\u00fcber im Klaren sein, dass der Mensch<\/span><span class=\"NormalTextRun SCXW116372959 BCX8\"> im Mittelpunkt <\/span><span class=\"NormalTextRun SCXW116372959 BCX8\">von<\/span><span class=\"NormalTextRun SCXW116372959 BCX8\"> Entscheidung<\/span><span class=\"NormalTextRun SCXW116372959 BCX8\">en<\/span> <span class=\"NormalTextRun SCXW116372959 BCX8\">stehen muss<\/span><span class=\"NormalTextRun SCXW116372959 BCX8\">, um eine sichere, ethische und korrekte Nutzung zu gew\u00e4hrleisten.<\/span><span class=\"NormalTextRun SCXW116372959 BCX8\">\u201c<\/span><\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-646c571 elementor-widget elementor-widget-heading\" data-id=\"646c571\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Energie und Versorgung: Cybersicherheit in gro\u00dfem Ma\u00dfstab <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d6bf4e6 elementor-widget elementor-widget-text-editor\" data-id=\"d6bf4e6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW165671038 BCX8\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW165671038 BCX8\">Im Bereich Energie und Versorgung sollten sich Unternehmen auf die Umsetzung von KI-gesteuerten Sicherheitsstrategien in gro\u00dfem Ma\u00dfstab konzentrieren, um alle Ebenen kritischer Infrastrukturen zu sch\u00fctzen.<\/span><\/span><span class=\"EOP SCXW165671038 BCX8\" data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span class=\"TextRun SCXW100578265 BCX8\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"none\"><strong><span class=\"NormalTextRun SCXW100578265 BCX8\">Stephen <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW100578265 BCX8\">Magennis<\/span><span class=\"NormalTextRun SCXW100578265 BCX8\">, Global Head <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW100578265 BCX8\">of<\/span><span class=\"NormalTextRun SCXW100578265 BCX8\"> E&amp;U<\/span><span class=\"NormalTextRun SCXW100578265 BCX8\">,<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW100578265 BCX8\">Expleo<\/span><span class=\"NormalTextRun SCXW100578265 BCX8\">, <\/span><\/strong><span class=\"NormalTextRun SCXW100578265 BCX8\">erkl\u00e4rt<\/span><span class=\"NormalTextRun SCXW100578265 BCX8\">: <\/span><\/span><span class=\"TextRun SCXW100578265 BCX8\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW100578265 BCX8\">\u201e<\/span><\/span><span class=\"TextRun SCXW100578265 BCX8\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"none\"><em><span class=\"NormalTextRun SCXW100578265 BCX8\">Die st\u00e4ndig wachsende Angriffsfl\u00e4che im Energie- und Versorgungssektor erfordert eine intelligentere Verteidigung. KI bietet eine leistungsstarke <\/span><span class=\"NormalTextRun SCXW100578265 BCX8\">M\u00f6glichkeit<\/span><span class=\"NormalTextRun SCXW100578265 BCX8\">, riesige Datenmengen in Echtzeit <\/span><span class=\"NormalTextRun SCXW100578265 BCX8\">zu <\/span><span class=\"NormalTextRun SCXW100578265 BCX8\">analysieren und Anomalien und potenzielle Cyberbedrohungen viel schneller als herk\u00f6mmliche Methoden <\/span><span class=\"NormalTextRun SCXW100578265 BCX8\">zu <\/span><span class=\"NormalTextRun SCXW100578265 BCX8\">erkennen. So k\u00f6nnen Anbieter Risiken proaktiv angehen und kritische Infrastrukturen sch\u00fctzen, um eine sicherere und widerstandsf\u00e4higere Zukunft f\u00fcr unsere Branche zu gew\u00e4hrleisten.<\/span><\/em><span class=\"NormalTextRun SCXW100578265 BCX8\">\u201c<\/span><\/span><span class=\"EOP SCXW100578265 BCX8\" data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7379147 elementor-widget elementor-widget-text-editor\" data-id=\"7379147\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW138125297 BCX8\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW138125297 BCX8\">F\u00fcr eine detailliertere Analyse <\/span><span class=\"NormalTextRun SCXW138125297 BCX8\">steht der<\/span><span class=\"NormalTextRun SCXW138125297 BCX8\"> vollst\u00e4ndige Leitfaden \u201e<\/span><\/span><span class=\"TextRun SCXW138125297 BCX8\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW138125297 BCX8\">KI in der Cybersicherheit: ein zweischneidiges Schwert<\/span><span class=\"NormalTextRun SCXW138125297 BCX8\">\u201c<\/span> <\/span><span class=\"TextRun SCXW138125297 BCX8\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW138125297 BCX8\">zum <a href=\"https:\/\/indd.adobe.com\/view\/ffed279e-f482-4b26-b5ae-58619bcb47fa\">Download zur Verf\u00fcgung.<\/a><\/span><\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4de2b3f elementor-widget elementor-widget-spacer\" data-id=\"4de2b3f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Expleo, Vereinigtes K\u00f6nigreich, 16 Oktober 2024. Das weltweit t\u00e4tige Ingenieurs-, Technologie- und Beratungsunternehmen Expleo appelliert an Unternehmen, sich auf die transformativen Auswirkungen von KI auf die Cybersicherheit vorzubereiten. Um den immer raffinierteren KI-gesteuerten Cyberangriffen entgegenzuwirken, m\u00fcssen Organisationen in KI-gest\u00fctzten Schutz investieren.\u00a0 In einem neuen Leitfaden mit dem Titel \u201eKI in der Cybersicherheit: ein zweischneidiges Schwert\u201c [&hellip;]<\/p>\n","protected":false},"featured_media":36182,"parent":0,"template":"","meta":{"_oasis_is_in_workflow":0,"_oasis_original":0,"_oasis_task_priority":"","footnotes":""},"topic":[122,120],"insights-single-templates":[],"industry-taxonomy":[293],"content-type":[20],"country":[113],"service":[445,446,222],"class_list":["post-36180","insights","type-insights","status-publish","has-post-thumbnail","hentry","topic-business-transformation","topic-digitale-transformation","industry-taxonomy-all","content-type-neuigkeiten","country-global","service-ai-powered-cx-product-quality-analytics","service-ai-powered-visual-inspection","service-digital-transformation"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.0 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Expleo Appell zur Cybersicherheit<\/title>\n<meta name=\"description\" content=\"F\u00fcr eine . Analyse steht der vollst\u00e4ndige Leitfaden \u201e\u201eKI in der Cybersicherheit: ein zweischneidiges Schwert\u201c zum Download zur Verf\u00fcgung.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/expleo.com\/global\/de\/einblicke\/neuigkeiten\/ai-in-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Expleo Appell zur Cybersicherheit: Auf transformative KI-Auswirkungen vorbereiten\u00a0\" \/>\n<meta property=\"og:description\" content=\"F\u00fcr eine . Analyse steht der vollst\u00e4ndige Leitfaden \u201e\u201eKI in der Cybersicherheit: ein zweischneidiges Schwert\u201c zum Download zur Verf\u00fcgung.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/expleo.com\/global\/de\/einblicke\/neuigkeiten\/ai-in-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"Global DE\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-21T15:05:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/expleo.com\/global\/de\/wp-content\/uploads\/2024\/09\/ai-in-cybersecurity-guide_featured_de.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"720\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/de\\\/einblicke\\\/neuigkeiten\\\/ai-in-cybersecurity\\\/\",\"url\":\"https:\\\/\\\/expleo.com\\\/global\\\/de\\\/einblicke\\\/neuigkeiten\\\/ai-in-cybersecurity\\\/\",\"name\":\"Expleo Appell zur Cybersicherheit\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/de\\\/einblicke\\\/neuigkeiten\\\/ai-in-cybersecurity\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/de\\\/einblicke\\\/neuigkeiten\\\/ai-in-cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/expleo.com\\\/global\\\/de\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/ai-in-cybersecurity-guide_featured_de.jpg\",\"datePublished\":\"2024-10-16T14:27:57+00:00\",\"dateModified\":\"2024-10-21T15:05:56+00:00\",\"description\":\"F\u00fcr eine . Analyse steht der vollst\u00e4ndige Leitfaden \u201e\u201eKI in der Cybersicherheit: ein zweischneidiges Schwert\u201c zum Download zur Verf\u00fcgung.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/de\\\/einblicke\\\/neuigkeiten\\\/ai-in-cybersecurity\\\/#breadcrumb\"},\"inLanguage\":\"de-DE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/expleo.com\\\/global\\\/de\\\/einblicke\\\/neuigkeiten\\\/ai-in-cybersecurity\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/de\\\/einblicke\\\/neuigkeiten\\\/ai-in-cybersecurity\\\/#primaryimage\",\"url\":\"https:\\\/\\\/expleo.com\\\/global\\\/de\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/ai-in-cybersecurity-guide_featured_de.jpg\",\"contentUrl\":\"https:\\\/\\\/expleo.com\\\/global\\\/de\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/ai-in-cybersecurity-guide_featured_de.jpg\",\"width\":1280,\"height\":720,\"caption\":\"A display of magazine pages with a purple background. The pages feature text and images related to cybersecurity and AI, including graphics, a shield icon, and a person holding a laptop. Text is predominantly in German.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/de\\\/einblicke\\\/neuigkeiten\\\/ai-in-cybersecurity\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/expleo.com\\\/global\\\/de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Einblicke\",\"item\":\"https:\\\/\\\/expleo.com\\\/global\\\/de\\\/einblicke\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Expleo Appell zur Cybersicherheit: Auf transformative KI-Auswirkungen vorbereiten\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/expleo.com\\\/global\\\/de\\\/\",\"name\":\"Expleo | DE\",\"description\":\"Expleo\",\"publisher\":{\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/expleo.com\\\/global\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de-DE\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/de\\\/#organization\",\"name\":\"Expleo | DE\",\"url\":\"https:\\\/\\\/expleo.com\\\/global\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/expleo.com\\\/global\\\/de\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/expleo-logo-and-tagline.png\",\"contentUrl\":\"https:\\\/\\\/expleo.com\\\/global\\\/de\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/expleo-logo-and-tagline.png\",\"width\":1600,\"height\":774,\"caption\":\"Expleo | DE\"},\"image\":{\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Expleo Appell zur Cybersicherheit","description":"F\u00fcr eine . Analyse steht der vollst\u00e4ndige Leitfaden \u201e\u201eKI in der Cybersicherheit: ein zweischneidiges Schwert\u201c zum Download zur Verf\u00fcgung.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/expleo.com\/global\/de\/einblicke\/neuigkeiten\/ai-in-cybersecurity\/","og_locale":"de_DE","og_type":"article","og_title":"Expleo Appell zur Cybersicherheit: Auf transformative KI-Auswirkungen vorbereiten\u00a0","og_description":"F\u00fcr eine . Analyse steht der vollst\u00e4ndige Leitfaden \u201e\u201eKI in der Cybersicherheit: ein zweischneidiges Schwert\u201c zum Download zur Verf\u00fcgung.","og_url":"https:\/\/expleo.com\/global\/de\/einblicke\/neuigkeiten\/ai-in-cybersecurity\/","og_site_name":"Global DE","article_modified_time":"2024-10-21T15:05:56+00:00","og_image":[{"width":1280,"height":720,"url":"https:\/\/expleo.com\/global\/de\/wp-content\/uploads\/2024\/09\/ai-in-cybersecurity-guide_featured_de.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/expleo.com\/global\/de\/einblicke\/neuigkeiten\/ai-in-cybersecurity\/","url":"https:\/\/expleo.com\/global\/de\/einblicke\/neuigkeiten\/ai-in-cybersecurity\/","name":"Expleo Appell zur Cybersicherheit","isPartOf":{"@id":"https:\/\/expleo.com\/global\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/expleo.com\/global\/de\/einblicke\/neuigkeiten\/ai-in-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/expleo.com\/global\/de\/einblicke\/neuigkeiten\/ai-in-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/expleo.com\/global\/de\/wp-content\/uploads\/2024\/09\/ai-in-cybersecurity-guide_featured_de.jpg","datePublished":"2024-10-16T14:27:57+00:00","dateModified":"2024-10-21T15:05:56+00:00","description":"F\u00fcr eine . Analyse steht der vollst\u00e4ndige Leitfaden \u201e\u201eKI in der Cybersicherheit: ein zweischneidiges Schwert\u201c zum Download zur Verf\u00fcgung.","breadcrumb":{"@id":"https:\/\/expleo.com\/global\/de\/einblicke\/neuigkeiten\/ai-in-cybersecurity\/#breadcrumb"},"inLanguage":"de-DE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/expleo.com\/global\/de\/einblicke\/neuigkeiten\/ai-in-cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/expleo.com\/global\/de\/einblicke\/neuigkeiten\/ai-in-cybersecurity\/#primaryimage","url":"https:\/\/expleo.com\/global\/de\/wp-content\/uploads\/2024\/09\/ai-in-cybersecurity-guide_featured_de.jpg","contentUrl":"https:\/\/expleo.com\/global\/de\/wp-content\/uploads\/2024\/09\/ai-in-cybersecurity-guide_featured_de.jpg","width":1280,"height":720,"caption":"A display of magazine pages with a purple background. The pages feature text and images related to cybersecurity and AI, including graphics, a shield icon, and a person holding a laptop. Text is predominantly in German."},{"@type":"BreadcrumbList","@id":"https:\/\/expleo.com\/global\/de\/einblicke\/neuigkeiten\/ai-in-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/expleo.com\/global\/de\/"},{"@type":"ListItem","position":2,"name":"Einblicke","item":"https:\/\/expleo.com\/global\/de\/einblicke\/"},{"@type":"ListItem","position":3,"name":"Expleo Appell zur Cybersicherheit: Auf transformative KI-Auswirkungen vorbereiten\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/expleo.com\/global\/de\/#website","url":"https:\/\/expleo.com\/global\/de\/","name":"Expleo | DE","description":"Expleo","publisher":{"@id":"https:\/\/expleo.com\/global\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/expleo.com\/global\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de-DE"},{"@type":"Organization","@id":"https:\/\/expleo.com\/global\/de\/#organization","name":"Expleo | DE","url":"https:\/\/expleo.com\/global\/de\/","logo":{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/expleo.com\/global\/de\/#\/schema\/logo\/image\/","url":"https:\/\/expleo.com\/global\/de\/wp-content\/uploads\/2019\/02\/expleo-logo-and-tagline.png","contentUrl":"https:\/\/expleo.com\/global\/de\/wp-content\/uploads\/2019\/02\/expleo-logo-and-tagline.png","width":1600,"height":774,"caption":"Expleo | DE"},"image":{"@id":"https:\/\/expleo.com\/global\/de\/#\/schema\/logo\/image\/"}}]}},"hreflang":{"rendered":"<link rel=\"alternate\" href=\"https:\/\/expleo.com\/global\/en\/einblicke\/news\/ai-in-cybersecurity\/\" hreflang=\"x-default\"\/>\n<link rel=\"alternate\" href=\"https:\/\/expleo.com\/global\/en\/einblicke\/news\/ai-in-cybersecurity\/\" hreflang=\"en\"\/>\n<link rel=\"alternate\" href=\"https:\/\/expleo.com\/global\/fr\/einblicke\/actualite\/ia-cybersecurite\/\" hreflang=\"fr\"\/>\n<link rel=\"alternate\" href=\"https:\/\/expleo.com\/global\/de\/einblicke\/neuigkeiten\/ai-in-cybersecurity\/\" hreflang=\"de\"\/>\n","structure":[{"blogId":4,"blogIsHidden":false,"postId":87391,"url":"https:\/\/expleo.com\/global\/en\/einblicke\/news\/ai-in-cybersecurity\/","language":"en","default":true},{"blogId":5,"blogIsHidden":false,"postId":43198,"url":"https:\/\/expleo.com\/global\/fr\/einblicke\/actualite\/ia-cybersecurite\/","language":"fr","default":false},{"blogId":6,"blogIsHidden":false,"postId":36180,"url":"https:\/\/expleo.com\/global\/de\/einblicke\/neuigkeiten\/ai-in-cybersecurity\/","language":"de","default":false}]},"_links":{"self":[{"href":"https:\/\/expleo.com\/global\/de\/wp-json\/wp\/v2\/insights\/36180","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/expleo.com\/global\/de\/wp-json\/wp\/v2\/insights"}],"about":[{"href":"https:\/\/expleo.com\/global\/de\/wp-json\/wp\/v2\/types\/insights"}],"version-history":[{"count":0,"href":"https:\/\/expleo.com\/global\/de\/wp-json\/wp\/v2\/insights\/36180\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/expleo.com\/global\/de\/wp-json\/wp\/v2\/media\/36182"}],"wp:attachment":[{"href":"https:\/\/expleo.com\/global\/de\/wp-json\/wp\/v2\/media?parent=36180"}],"wp:term":[{"taxonomy":"topic","embeddable":true,"href":"https:\/\/expleo.com\/global\/de\/wp-json\/wp\/v2\/topic?post=36180"},{"taxonomy":"insights-single-templates","embeddable":true,"href":"https:\/\/expleo.com\/global\/de\/wp-json\/wp\/v2\/insights-single-templates?post=36180"},{"taxonomy":"industry-taxonomy","embeddable":true,"href":"https:\/\/expleo.com\/global\/de\/wp-json\/wp\/v2\/industry-taxonomy?post=36180"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/expleo.com\/global\/de\/wp-json\/wp\/v2\/content-type?post=36180"},{"taxonomy":"country","embeddable":true,"href":"https:\/\/expleo.com\/global\/de\/wp-json\/wp\/v2\/country?post=36180"},{"taxonomy":"service","embeddable":true,"href":"https:\/\/expleo.com\/global\/de\/wp-json\/wp\/v2\/service?post=36180"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}