{"id":87391,"date":"2024-09-11T15:19:20","date_gmt":"2024-09-11T15:19:20","guid":{"rendered":"https:\/\/expleo.com\/global\/en\/?post_type=insights&#038;p=87391"},"modified":"2024-11-13T08:42:09","modified_gmt":"2024-11-13T08:42:09","slug":"ai-in-cybersecurity","status":"publish","type":"insights","link":"https:\/\/expleo.com\/global\/en\/insights\/news\/ai-in-cybersecurity\/","title":{"rendered":"Expleo calls on firms to prepare for transformational impact of AI in cybersecurity"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"87391\" class=\"elementor elementor-87391\" data-elementor-post-type=\"insights\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1d1a0f1 gg-article-content gg-standard-article-template gg-simple-text gg-container-tiny elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1d1a0f1\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-415c0999\" data-id=\"415c0999\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-69403be4 elementor-widget elementor-widget-text-editor\" data-id=\"69403be4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Expleo, UK, 12 September 2024.<\/strong> Expleo, the global engineering, technology and consulting company is calling on businesses to prepare for the transformational impact of AI on cybersecurity by investing in AI-powered protection to meet the threat of increasingly sophisticated AI-led cyber-attacks.<\/p>\n<p>In a new guide, <strong><em>\u2018AI in cybersecurity: between shield and shadow\u2019<\/em><\/strong>, Expleo looks at the effect that rapidly emerging AI-based technologies will have on several sectors and how each can leverage AI for enhanced cybersecurity protection while remaining vigilant against its potential misuse.<\/p>\n<p><strong>Jeff Hoyle, EVP of Aero, Space &amp; Defence and MD of Expleo, UK said<\/strong>: <em>&#8220;AI is the breakthrough technology of our times. It promises smarter aerospace logistics, enhanced automotive data security and real-time threat detection in banking and finance \u2013 it has the power to significantly enhance existing cybersecurity programmes.<\/em><\/p>\n<p><em>\u201cHowever, it can also be used to attack and disrupt, with bad actors already manipulating AI technology to target and exploit vulnerabilities in existing cybersecurity defences.<\/em><\/p>\n<p><em>\u201cTo prepare, leaders should face into the benefits and the risks this new technology poses and understand at a deep level how this technology might be put to work to enhance their cybersecurity operations, defusing would-be attacks before they become a costly problem.\u201d<\/em><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e827f4d elementor-widget elementor-widget-spacer\" data-id=\"e827f4d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4a3a982 gg-image-with-overalpping-text gg-image-with-overalpping-text-v2 gg-container-large elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4a3a982\" data-element_type=\"section\" data-e-type=\"section\" id=\"download\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-34b8873\" data-id=\"34b8873\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b87ba18 gg-image-with-overalpping-text__tagline gg-font-v33 elementor-widget elementor-widget-heading\" data-id=\"b87ba18\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">download<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9d5d282 gg-image-with-overalpping-text__heading elementor-widget elementor-widget-heading\" data-id=\"9d5d282\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">For more in-depth analysis download the full guide \u2018AI in cybersecurity: between shield and shadow\u2019 <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-21f9afd elementor-widget elementor-widget-spacer\" data-id=\"21f9afd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b09a4fb gg-button-v6 gg-font-v28 elementor-align-left elementor-mobile-align-center elementor-hidden-mobile elementor-widget elementor-widget-button\" data-id=\"b09a4fb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-grow\" href=\"https:\/\/indd.adobe.com\/view\/87836047-01f8-484c-a880-c02928c4c35b\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">download PDF GUIDE<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-062e1d1 gg-button-v6 gg-font-v28 elementor-align-left elementor-mobile-align-center elementor-hidden-desktop elementor-widget elementor-widget-button\" data-id=\"062e1d1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-grow\" href=\"https:\/\/expleo.com\/global\/en\/wp-content\/documents\/Expleo_AI_in_cybersecurity_guide.pdf\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">download PDF GUIDE<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e101868 gg-button-v6 gg-font-v28 elementor-align-left elementor-mobile-align-center elementor-widget elementor-widget-button\" data-id=\"e101868\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-grow\" href=\"https:\/\/expleo.com\/global\/en\/about-us\/media-room\/\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">media room<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-96158a9 gg-article-content gg-standard-article-template gg-simple-text gg-container-tiny elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"96158a9\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f2efc76\" data-id=\"f2efc76\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-19051b0 elementor-widget elementor-widget-spacer\" data-id=\"19051b0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-810d722 elementor-widget elementor-widget-heading\" data-id=\"810d722\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">AI-powered cybersecurity<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6cb26c9 elementor-widget elementor-widget-text-editor\" data-id=\"6cb26c9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\n<p>AI is showing promise across multiple sectors, powering up new ways of working while ensuring integrity, by keeping a human-in-the-loop. In its report, Expleo explores the benefits and watch-outs for aerospace, automotive, BFSI, defence and E&amp;U:<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e68c341 elementor-widget elementor-widget-heading\" data-id=\"e68c341\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Aerospace: AI as the first officer of cybersecurity<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ee03ccc elementor-widget elementor-widget-text-editor\" data-id=\"ee03ccc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Adopting digital systems into modern aircraft makes them an airborne data centre vulnerable to attack. By building AI-enhanced cybersecurity into Commercial off the Shelf (COTS) components and Zero-Trust architecture, companies can shield themselves against sophisticated attacks.<\/p>\n<p><strong>Graham Younger, VP of Aerospace at Expleo, commented: <\/strong><em>\u201cOnly by implementing a multi-layered approach to cybersecurity coupled with rigorous testing can aerospace pave the way for the safe and secure integration of AI technologies that will propel the sector into a new golden age of flight characterised by innovation, greater sustainability and efficiency.\u201d<\/em><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5a0d20a elementor-widget elementor-widget-heading\" data-id=\"5a0d20a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Automotive: technology takes the driver\u2019s seat<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a47c402 elementor-widget elementor-widget-text-editor\" data-id=\"a47c402\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>To harness the power of AI for good in automotive, the future may lie in open-source style collaboration, enabling businesses to stay on top of threat intelligence. Similarly, automakers need to ensure <a href=\"https:\/\/expleo.com\/global\/en\/insights\/whitepapers\/automotive-cybersecurity-guidebook\/\">security-by-design <\/a>with suppliers and implement continuous monitoring of threats.<\/p>\n<p><strong>Steve McEvoy, VP of Automotive, Expleo, said:<\/strong>\u00a0<em>\u201cIt\u2019s through collaboration that we can seize on this moment of opportunity for automotive to lead the way in setting standards and co-creating solutions to collectively defuse the common challenges that AI presents automakers and tier one suppliers with.\u201d<\/em><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-95c418d elementor-widget elementor-widget-heading\" data-id=\"95c418d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">BFSI: a foundation built on innovation<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-efd171b elementor-widget elementor-widget-text-editor\" data-id=\"efd171b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>While some in this sector remain sceptical of AI&#8217;s ability to add value &#8211; citing cost, a lack of transparency and an inability to work in real-time &#8211; three AI models are proving their worth as a trinity of tech in BFSI fraud protection: machine learning (ML), natural language processing (NLP) and deep learning.<\/p>\n<p><strong>Angus Panton, Head of Banking and Finance Service, UK at Expleo, said:<\/strong><em>\u201cThere\u2019s an innate awareness that adopting too fast, risks houses built on sand with models and tools that can be exploited. That\u2019s where implementing a <a href=\"https:\/\/expleo.com\/global\/en\/insights\/news\/anti-smishing-solution-permanent-tsb\/\">secure architecture<\/a> across the organisation with the appropriate testing programmes and quality assurance come in.\u201d<\/em><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-68e3da2 elementor-widget elementor-widget-heading\" data-id=\"68e3da2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Defence: when cybersecurity is non-negotiable<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-80a6aa0 elementor-widget elementor-widget-text-editor\" data-id=\"80a6aa0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The defence sector is focused on AI-based solutions that are designed, deployed, and operated with a human-in-the-loop &#8211; to ensure that ethical and legal standards are rigorously upheld.<\/p>\n<p><strong>Jeff Hoyle, EVP Aero, Space and Defence, Expleo:<\/strong><em>\u201cSecurity and safety are non-negotiable in defence, and while it is widely recognised that AI can play a significant role in assurance and compliance with cybersecurity standards to protect defence programmes from bad actors, we must keep human oversight at the heart of decision-making to ensure continued safe, ethical and accurate use.\u201d<\/em><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-646c571 elementor-widget elementor-widget-heading\" data-id=\"646c571\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Energy and utilities: deploying cybersecurity at scale<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d6bf4e6 elementor-widget elementor-widget-text-editor\" data-id=\"d6bf4e6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In energy and utilities, businesses should focus on implementing AI-driven security-at-scale strategies, protecting all levels of critical infrastructure.<\/p>\n<p><strong>Stephen Magennis, Global Head of E&amp;U at Expleo, said: <\/strong><em>&#8220;The ever-expanding attack exposure in energy and utilities demands a smarter defence. AI offers a powerful solution, one that can analyse vast amounts of data in real-time, identify anomalies and potential cyber threats much faster than traditional methods. This allows providers to proactively address risks and safeguard critical infrastructure, ensuring a more secure and resilient future for our industry.&#8221;<\/em><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7379147 elementor-widget elementor-widget-text-editor\" data-id=\"7379147\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW87254675 BCX8\" lang=\"EN-GB\" xml:lang=\"EN-GB\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW87254675 BCX8\">For more in-depth analysis download the full <\/span><span class=\"NormalTextRun SCXW87254675 BCX8\">guide<\/span><span class=\"NormalTextRun SCXW87254675 BCX8\"> \u2018<\/span><\/span><span class=\"TextRun SCXW87254675 BCX8\" lang=\"EN-GB\" xml:lang=\"EN-GB\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW87254675 BCX8\"><a href=\"#download\">AI in cybersecurity: between shield and shadow<\/a>\u2019<\/span><\/span><\/p>\n<p><span style=\"text-decoration: underline;\"><b>Media contact<\/b><br \/><\/span><a href=\"mailto:gwen.allen@expleogroup.com\">gwen.allen@expleogroup.com<\/a>\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4de2b3f elementor-widget elementor-widget-spacer\" data-id=\"4de2b3f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Expleo, UK, 12 September 2024. Expleo, the global engineering, technology and consulting company is calling on businesses to prepare for the transformational impact of AI on cybersecurity by investing in AI-powered protection to meet the threat of increasingly sophisticated AI-led cyber-attacks. In a new guide, \u2018AI in cybersecurity: between shield and shadow\u2019, Expleo looks at [&hellip;]<\/p>\n","protected":false},"author":99,"featured_media":88142,"parent":0,"template":"","meta":{"_oasis_is_in_workflow":0,"_oasis_original":0,"_oasis_task_priority":"","_angie_page":false,"footnotes":""},"topic":[164,144,212,145],"insights-single-templates":[],"industry-taxonomy":[265],"content-type":[22],"country":[130],"service":[216,361,358,362,360],"class_list":["post-87391","insights","type-insights","status-publish","has-post-thumbnail","hentry","topic-artificial-intelligence-and-robotics","topic-business-transformation","topic-data-science-and-cybersecurity","topic-digital-transformation","industry-taxonomy-aall-industries","content-type-news","country-united-kingdom","service-digital-transformation","service-ai-powered-cx","service-ai-powered-software-quality","service-ai-powered-visual-inspection","service-data-analytics-ai"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.0 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Expleo | AI in cybersecurity - between shield and shadow<\/title>\n<meta name=\"description\" content=\"Prepare for the transformative impact of AI in cybersecurity with our guide to NIST cybersecurity and Zero Trust AI-powered protection.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/expleo.com\/global\/en\/insights\/news\/ai-in-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Expleo calls on firms to prepare for transformational impact of AI in cybersecurity\" \/>\n<meta property=\"og:description\" content=\"Prepare for the transformative impact of AI in cybersecurity with our guide to NIST cybersecurity and Zero Trust AI-powered protection.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/expleo.com\/global\/en\/insights\/news\/ai-in-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"Global EN\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-13T08:42:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2024\/08\/ai-in-cybersecurity-guide-mockup.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"720\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/insights\\\/news\\\/ai-in-cybersecurity\\\/\",\"url\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/insights\\\/news\\\/ai-in-cybersecurity\\\/\",\"name\":\"Expleo | AI in cybersecurity - between shield and shadow\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/insights\\\/news\\\/ai-in-cybersecurity\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/insights\\\/news\\\/ai-in-cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/ai-in-cybersecurity-guide-mockup.jpg\",\"datePublished\":\"2024-09-11T15:19:20+00:00\",\"dateModified\":\"2024-11-13T08:42:09+00:00\",\"description\":\"Prepare for the transformative impact of AI in cybersecurity with our guide to NIST cybersecurity and Zero Trust AI-powered protection.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/insights\\\/news\\\/ai-in-cybersecurity\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/insights\\\/news\\\/ai-in-cybersecurity\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/insights\\\/news\\\/ai-in-cybersecurity\\\/#primaryimage\",\"url\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/ai-in-cybersecurity-guide-mockup.jpg\",\"contentUrl\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/ai-in-cybersecurity-guide-mockup.jpg\",\"width\":1280,\"height\":720,\"caption\":\"A high-angle view of multiple digital documents and reports arranged on a purple background. These documents feature insights and information on AI in cybersecurity, showcasing text, charts, and images with themes of technology, data protection, and analysis.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/insights\\\/news\\\/ai-in-cybersecurity\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Insights\",\"item\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/insights\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Expleo calls on firms to prepare for transformational impact of AI in cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/\",\"name\":\"Expleo | EN\",\"description\":\"Expleo\",\"publisher\":{\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/#organization\",\"name\":\"Expleo | EN\",\"url\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/expleo-logo-and-tagline.png\",\"contentUrl\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/expleo-logo-and-tagline.png\",\"width\":1600,\"height\":774,\"caption\":\"Expleo | EN\"},\"image\":{\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Expleo | AI in cybersecurity - between shield and shadow","description":"Prepare for the transformative impact of AI in cybersecurity with our guide to NIST cybersecurity and Zero Trust AI-powered protection.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/expleo.com\/global\/en\/insights\/news\/ai-in-cybersecurity\/","og_locale":"en_GB","og_type":"article","og_title":"Expleo calls on firms to prepare for transformational impact of AI in cybersecurity","og_description":"Prepare for the transformative impact of AI in cybersecurity with our guide to NIST cybersecurity and Zero Trust AI-powered protection.","og_url":"https:\/\/expleo.com\/global\/en\/insights\/news\/ai-in-cybersecurity\/","og_site_name":"Global EN","article_modified_time":"2024-11-13T08:42:09+00:00","og_image":[{"width":1280,"height":720,"url":"https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2024\/08\/ai-in-cybersecurity-guide-mockup.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/expleo.com\/global\/en\/insights\/news\/ai-in-cybersecurity\/","url":"https:\/\/expleo.com\/global\/en\/insights\/news\/ai-in-cybersecurity\/","name":"Expleo | AI in cybersecurity - between shield and shadow","isPartOf":{"@id":"https:\/\/expleo.com\/global\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/expleo.com\/global\/en\/insights\/news\/ai-in-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/expleo.com\/global\/en\/insights\/news\/ai-in-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2024\/08\/ai-in-cybersecurity-guide-mockup.jpg","datePublished":"2024-09-11T15:19:20+00:00","dateModified":"2024-11-13T08:42:09+00:00","description":"Prepare for the transformative impact of AI in cybersecurity with our guide to NIST cybersecurity and Zero Trust AI-powered protection.","breadcrumb":{"@id":"https:\/\/expleo.com\/global\/en\/insights\/news\/ai-in-cybersecurity\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/expleo.com\/global\/en\/insights\/news\/ai-in-cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/expleo.com\/global\/en\/insights\/news\/ai-in-cybersecurity\/#primaryimage","url":"https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2024\/08\/ai-in-cybersecurity-guide-mockup.jpg","contentUrl":"https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2024\/08\/ai-in-cybersecurity-guide-mockup.jpg","width":1280,"height":720,"caption":"A high-angle view of multiple digital documents and reports arranged on a purple background. These documents feature insights and information on AI in cybersecurity, showcasing text, charts, and images with themes of technology, data protection, and analysis."},{"@type":"BreadcrumbList","@id":"https:\/\/expleo.com\/global\/en\/insights\/news\/ai-in-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/expleo.com\/global\/en\/"},{"@type":"ListItem","position":2,"name":"Insights","item":"https:\/\/expleo.com\/global\/en\/insights\/"},{"@type":"ListItem","position":3,"name":"Expleo calls on firms to prepare for transformational impact of AI in cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/expleo.com\/global\/en\/#website","url":"https:\/\/expleo.com\/global\/en\/","name":"Expleo | EN","description":"Expleo","publisher":{"@id":"https:\/\/expleo.com\/global\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/expleo.com\/global\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/expleo.com\/global\/en\/#organization","name":"Expleo | EN","url":"https:\/\/expleo.com\/global\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/expleo.com\/global\/en\/#\/schema\/logo\/image\/","url":"https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2019\/02\/expleo-logo-and-tagline.png","contentUrl":"https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2019\/02\/expleo-logo-and-tagline.png","width":1600,"height":774,"caption":"Expleo | EN"},"image":{"@id":"https:\/\/expleo.com\/global\/en\/#\/schema\/logo\/image\/"}}]}},"hreflang":{"rendered":"<link rel=\"alternate\" href=\"https:\/\/expleo.com\/global\/en\/insights\/news\/ai-in-cybersecurity\/\" hreflang=\"x-default\"\/>\n<link rel=\"alternate\" href=\"https:\/\/expleo.com\/global\/en\/insights\/news\/ai-in-cybersecurity\/\" hreflang=\"en\"\/>\n<link rel=\"alternate\" href=\"https:\/\/expleo.com\/global\/fr\/insights\/actualite\/ia-cybersecurite\/\" hreflang=\"fr\"\/>\n<link rel=\"alternate\" href=\"https:\/\/expleo.com\/global\/de\/insights\/neuigkeiten\/ai-in-cybersecurity\/\" hreflang=\"de\"\/>\n","structure":[{"blogId":4,"blogIsHidden":false,"postId":87391,"url":"https:\/\/expleo.com\/global\/en\/insights\/news\/ai-in-cybersecurity\/","language":"en","default":true},{"blogId":5,"blogIsHidden":false,"postId":43198,"url":"https:\/\/expleo.com\/global\/fr\/insights\/actualite\/ia-cybersecurite\/","language":"fr","default":false},{"blogId":6,"blogIsHidden":false,"postId":36180,"url":"https:\/\/expleo.com\/global\/de\/insights\/neuigkeiten\/ai-in-cybersecurity\/","language":"de","default":false}]},"_links":{"self":[{"href":"https:\/\/expleo.com\/global\/en\/wp-json\/wp\/v2\/insights\/87391","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/expleo.com\/global\/en\/wp-json\/wp\/v2\/insights"}],"about":[{"href":"https:\/\/expleo.com\/global\/en\/wp-json\/wp\/v2\/types\/insights"}],"author":[{"embeddable":true,"href":"https:\/\/expleo.com\/global\/en\/wp-json\/wp\/v2\/users\/99"}],"version-history":[{"count":0,"href":"https:\/\/expleo.com\/global\/en\/wp-json\/wp\/v2\/insights\/87391\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/expleo.com\/global\/en\/wp-json\/wp\/v2\/media\/88142"}],"wp:attachment":[{"href":"https:\/\/expleo.com\/global\/en\/wp-json\/wp\/v2\/media?parent=87391"}],"wp:term":[{"taxonomy":"topic","embeddable":true,"href":"https:\/\/expleo.com\/global\/en\/wp-json\/wp\/v2\/topic?post=87391"},{"taxonomy":"insights-single-templates","embeddable":true,"href":"https:\/\/expleo.com\/global\/en\/wp-json\/wp\/v2\/insights-single-templates?post=87391"},{"taxonomy":"industry-taxonomy","embeddable":true,"href":"https:\/\/expleo.com\/global\/en\/wp-json\/wp\/v2\/industry-taxonomy?post=87391"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/expleo.com\/global\/en\/wp-json\/wp\/v2\/content-type?post=87391"},{"taxonomy":"country","embeddable":true,"href":"https:\/\/expleo.com\/global\/en\/wp-json\/wp\/v2\/country?post=87391"},{"taxonomy":"service","embeddable":true,"href":"https:\/\/expleo.com\/global\/en\/wp-json\/wp\/v2\/service?post=87391"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}