{"id":79123,"date":"2024-02-20T18:25:44","date_gmt":"2024-02-20T16:25:44","guid":{"rendered":"https:\/\/blog.richardvanhooijdonk.com\/?p=79123"},"modified":"2024-02-20T19:22:05","modified_gmt":"2024-02-20T17:22:05","slug":"friend-or-foe-the-role-of-ai-in-the-cybersecurity-domain","status":"publish","type":"post","link":"https:\/\/blog.richardvanhooijdonk.com\/en\/friend-or-foe-the-role-of-ai-in-the-cybersecurity-domain\/","title":{"rendered":"Friend or foe: the role of AI in the cybersecurity domain"},"content":{"rendered":"\n<ul class=\"bold-list wp-block-list\">\n<li><strong>Cyberattacks are on the rise<\/strong><\/li>\n\n\n\n<li><strong>The MOVEit data breach<\/strong><\/li>\n\n\n\n<li><strong>Could AI become our ally in the fight against cybercrime?<\/strong><\/li>\n\n\n\n<li><strong>Darktrace\u2019s AI Cyber Loop can autonomously identify and stop an attack<\/strong><\/li>\n<\/ul>\n\n\n\n<p>Artificial intelligence (AI) technology has attracted a great deal of attention in recent years, especially following the launch of generative AI. In a relatively short period of time, generative AI models like ChatGPT, DALL-E, and Stable Diffusion achieved widespread adoption, with people mainly using them to <a href=\"https:\/\/blog.richardvanhooijdonk.com\/en\/exploring-generative-ais-impact-on-human-creativity\/\" target=\"_blank\" rel=\"noreferrer noopener\">produce<\/a> text and images that are nearly indistinguishable from human-generated content. Unsurprisingly, it wasn\u2019t long until the technology found its way into the workplace as well, where it is used to streamline various workflows and improve the efficiency of human workers. However, this growing influence of generative AI technology in numerous spheres of our lives has inevitably <a href=\"https:\/\/www.forbes.com\/sites\/forbesbooksauthors\/2023\/08\/04\/artificial-intelligence-generative-ai-in-cyber-should-worry-us-heres-why\/?sh=82ec979204fa\" target=\"_blank\" rel=\"noreferrer noopener\">raised<\/a> some serious concerns about the potential negative effects on people and society as a whole.<\/p>\n\n\n\n<p>While most of the discussion has revolved around generative AI\u2019s impact on human labour, this groundbreaking technology may pose even greater threats to our society. Many industry experts are concerned that generative AI could lead to a dramatic increase in the number of cybersecurity threats in the upcoming years, as it enables almost anyone to launch sophisticated cyberattacks, even if they have very little to no previous programming experience. Perhaps even more worryingly, generative AI could <a href=\"https:\/\/blog.richardvanhooijdonk.com\/en\/the-growing-role-of-generative-ai-in-cyberattacks\/\" target=\"_blank\" rel=\"noreferrer noopener\">enable<\/a> cybercriminals to develop entirely new types of attacks that our existing security measures would not be able to cope with, causing significant damage to individuals and organisations alike. So, is there anything we can do to protect ourselves?<\/p>\n\n\n\n<div style=\"height:8px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<blockquote class=\"wp-block-quote has-text-align-center quote-stat is-layout-flow wp-block-quote-is-layout-flow\">\n<p>\u201cCybercriminals are exploiting the biggest vulnerability within any organisation: humans. As progress in artificial intelligence (AI) and analytics continues to advance, hackers will find more inventive and effective ways to capitalise on human weakness in areas of (mis)trust, the desire for expediency, and convenient rewards\u201d.<\/p>\n<cite><em>Amy Larsen DeCarlo, principal analyst at GlobalData<\/em><\/cite><\/blockquote>\n\n\n\n<div style=\"height:8px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Cyberattacks are on the rise<\/h2>\n\n\n\n<p>The truth is that hackers have never shied away from embracing emerging technologies and exploiting them to achieve their nefarious goals, so it was only a matter of time before generative AI caught their attention as well. Generative AI\u2019s ability to produce written text, audio, and even video content that looks authentic has made it easier than ever for cybercriminals to trick people into disclosing sensitive information. This reflects in a notable surge in social engineering attacks, which increased not only in frequency but also in severity in 2023, a trend that is expected to continue in 2024, according to data and analytics company Global Data. \u201cCybercriminals are exploiting the biggest vulnerability within any organisation: humans\u201d, <a href=\"https:\/\/www.dailyhostnews.com\/threat-actors-use-social-engineering-and-ai-to-drive-more-cyber-attacks-in-2024\" target=\"_blank\" rel=\"noreferrer noopener\">says<\/a> Amy Larsen DeCarlo, principal analyst at GlobalData. \u201cAs progress in artificial intelligence (AI) and analytics continues to advance, hackers will find more inventive and effective ways to capitalise on human weakness in areas of (mis)trust, the desire for expediency, and convenient rewards\u201d.<\/p>\n\n\n\n<p>Similarly, the Google Cloud Cybersecurity Forecast 2024 report <a href=\"https:\/\/www.zdnet.com\/article\/watch-out-generative-ai-will-level-up-cyber-attacks-according-to-new-google-report\/\" target=\"_blank\" rel=\"noreferrer noopener\">predicts<\/a> that cybercriminals will increasingly use generative AI and large language models (LLMs) to execute a wide range of cyberattacks, including SMS and phishing attacks. In the past, such attacks were relatively easy to identify due to misspelt words and grammatical errors. However, now that generative AI is capable of mimicking natural language with a high degree of accuracy, this will no longer be the case. Generative AI models could also be used to disseminate fake news and create incredibly realistic deepfake photos and videos, making it increasingly difficult to differentiate fact from fiction and further eroding the public trust, even in legitimate news sources. It\u2019s not just external threats that companies will have to contend with, though. Employees themselves could inadvertently expose their own company\u2019s sensitive information by feeding it into a generative AI model, thus potentially enabling an attacker to gain access to this information by simply entering the right prompt. To prevent this from happening, companies will need to implement appropriate security measures and educate their employees on the proper use of generative AI in the workplace.<\/p>\n\n\n\n<div style=\"height:1px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">The MOVEit data breach<\/h2>\n\n\n\n<p>The past year has seen an endless stream of cyberattacks on a wide range of businesses, but one that stands out because of the sheer number of victims affected by it is the MOVEit data breach. By exploiting a zero-day vulnerability in this popular file transfer software, the ransomware group Clop was able to steal data from numerous businesses and even some government agencies. Some of the more high-profile victims of the attack included Shell, British Airways, and the US Department of Energy. Although the developer, Progress Software, reacted quickly and issued a fix for the vulnerability, it wasn\u2019t before significant damage had already been done. Also, it took months before the full extent of the damage had become evident, with new names being added to the list of the victims week after week.<\/p>\n\n\n\n<p>According to an investigation conducted by the antivirus company Emsisoft, a total of 2,167 organisations across the world have been affected by the data breach so far. Some 88 per cent of these are from the US, while the remaining 12 per cent are from Germany, the UK, and Canada. Furthermore, Emsisoft estimates that personal data from more than 62 million individuals was exposed in the breach. However, it\u2019s important to point out that the real figures could be much higher, possibly reaching hundreds of millions. \u201cIt\u2019s inevitable that there are corporate victims that don\u2019t yet know they\u2019re victims, and there are individuals out there who don\u2019t yet know they\u2019ve been impacted\u201d, <a href=\"https:\/\/www.wired.com\/story\/moveit-breach-victims\/\" target=\"_blank\" rel=\"noreferrer noopener\">says<\/a> Brett Callow, a threat analyst at Emsisoft. \u201cMOVEit is especially significant simply because of the number of victims, who those victims are, the sensitivity of the data that was obtained, and the multitude of ways that data can be used\u201d. The overall cost of the breach has been <a href=\"https:\/\/www.msspalert.com\/native\/opentext-names-the-nastiest-malware\" target=\"_blank\" rel=\"noreferrer noopener\">estimated<\/a> at around $11 billion. Probably the most worrying aspect of the whole incident is that even some organisations that didn\u2019t use the MOVEit software directly have had their data stolen in the breach because a third party or a vendor they collaborated with did use it, which enabled attackers to gain access to data from other companies in their network.<\/p>\n\n\n\n<div style=\"height:8px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe title=\"BA, BBC and Boots hit by cyber security breach\" width=\"800\" height=\"450\" src=\"https:\/\/www.youtube.com\/embed\/IoaPIu5uSl0?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<div style=\"height:8px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<blockquote class=\"wp-block-quote has-text-align-center quote-stat is-layout-flow wp-block-quote-is-layout-flow\">\n<p>\u201cAttackers are increasingly using AI and ML to develop more sophisticated attacks, but AI can also be used to counter these attacks. This arms race between AI-driven defence and AI-assisted offence will drive innovation in the cybersecurity industry, resulting in ever more advanced security solutions\u201d.<\/p>\n<cite><em>Brian Roche, chief product officer at Veracode<\/em><\/cite><\/blockquote>\n\n\n\n<div style=\"height:8px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Could AI become our ally in the fight against cybercrime?<\/h2>\n\n\n\n<p>It\u2019s undeniable that AI has enabled cybercriminals to make their attacks more potent and difficult to recognise. However, there is no reason why we couldn\u2019t also leverage the power of AI to keep those new threats at bay. Many industry experts are convinced that AI is going to become a potent new ally in our ongoing fight against cybercrime. \u201cAttackers are increasingly using AI and ML to develop more sophisticated attacks, but AI can also be used to counter these attacks. This arms race between AI-driven defence and AI-assisted offence will drive innovation in the cybersecurity industry, resulting in ever more advanced security solutions,\u201d <a href=\"https:\/\/www.msspalert.com\/news\/ai-trends-2024-what-the-experts-are-saying\" target=\"_blank\" rel=\"noreferrer noopener\">says<\/a> Brian Roche, chief product officer at Veracode. \u201cAI-powered security solutions are already being used to identify and prioritise threats, automate incident response, and personalise security controls. In the future, these solutions will become even more sophisticated as they learn from experience and adapt to new threats in real time. This will enable AI-driven cyber defence systems to proactively identify and neutralise automated attacks fuelled by AI before they cause damage. In this evolving cybersecurity landscape, organisations need to embrace AI and ML to stay ahead of the curve\u201d.<\/p>\n\n\n\n<p>A recent survey conducted by CyberRisk Alliance, which included 800 senior IT and cybersecurity decision-makers from various US and UK organisations, reveals that 22 per cent of organisations already have the majority of their cybersecurity budget dedicated to AI-powered solutions, while 64 per cent are highly likely to implement one such solution within the next year. When asked about possible use cases for AI, 61 per cent of respondents said that they believed AI was better than humans at identifying threats, while 46 per cent said that the most notable advantage of AI is that it allows us to automate various response actions or repetitive tasks, such as alert triage. The vast majority of respondents agree, however, that humans will continue to have an important role to play in cybersecurity, as there are still some things they do better than machines, such as understanding and explaining the context of threats. \u201cThis survey reveals that the role artificial intelligence will play in enhancing threat detection and response is undeniable, yet it is crucial to recognise that technology alone cannot protect businesses against modern threats\u201d, <a href=\"https:\/\/www.msspalert.com\/news\/technology-alone-cannot-protect-businesses-from-modern-cyber-attacks-study-finds\" target=\"_blank\" rel=\"noreferrer noopener\">says<\/a> Dan Schiappa, chief product officer at Arctic Wolf. \u201cAs threat actors become more advanced and leverage AI tools themselves, humans will have an essential role investigating novel attacks, explaining their context within their business, and most importantly, leveraging their knowledge and expertise to train the very AI and machine learning models that will become deeply embedded within next-generation cybersecurity solutions\u201d.<\/p>\n\n\n\n<div style=\"height:1px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Darktrace\u2019s AI Cyber Loop can autonomously identify and stop an attack<\/h2>\n\n\n\n<p>For example, the Cambridge-based cybersecurity company Darktrace has developed a comprehensive set of cybersecurity solutions called Cyber AI Loop, which can autonomously identify a potential attack and stop it before any damage is done. The Cyber AI Loop consists of four separate components \u2014 PREVENT, DETECT, RESPOND, and HEAL \u2014 that work together to keep both your internal and external data safe from intruders. At the heart of each component is Darktrace\u2019s proprietary Self-Learning AI, which sits in the background and keeps an eye on everything that goes on in the company\u2019s network, including user behaviour and device activity. This enables it to gain a better understanding of what is considered normal behaviour for this particular company and identify potential threats.<\/p>\n\n\n\n<p>The entire process can be <a href=\"https:\/\/www.haptic-networks.com\/cyber-security\/introduction-to-darktrace\/\" target=\"_blank\" rel=\"noreferrer noopener\">outlined<\/a> in four stages. First, Darktrace PREVENT uses AI to search through the company\u2019s servers, networks, and IP addresses to identify all of the assets that belong to it. It then looks for potential vulnerabilities by emulating attacks on each individual asset and identifying those that may be exploited to gain access to the company\u2019s networks. All of the findings are also forwarded to the DETECT and RESPOND components of the AI Loop, which they use to fortify your company\u2019s defences. In the second stage, Darktrace DETECT uses anomaly detection techniques, behavioural analysis, and threat emulation to detect any unusual activity within your company\u2019s network, including new threats that may not have been identified before. This is where Darktrace RESPOND enters the picture \u2014 it nullifies the threat by isolating the affected devices or parts of the network before it spreads to other areas. Any data related to the attack is subsequently fed back to the previous stages of the AI Loop to minimise the chances of similar incidents occurring in the future. The fourth and final stage involves Darktrace HEAL, which allows the company to restore its assets, devices, and networks to the states they were in before the attack took place. HEAL also generates a detailed report of the incident to provide all stakeholders with valuable insights into everything that took place. Another important feature of the HEAL component of the AI Loop is that allows companies to simulate various attacks on their systems, to ensure that their employees are prepared and know what to do when an attack occurs in real life.<\/p>\n\n\n\n<div style=\"height:8px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe title=\"Introducing Darktrace HEAL: Be Ready and Recover Quickly from Cyber Incidents\" width=\"800\" height=\"450\" src=\"https:\/\/www.youtube.com\/embed\/djgRVDBTy2I?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<div style=\"height:8px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Closing thoughts<\/h2>\n\n\n\n<p>The widespread integration of artificial intelligence technology into various aspects of our lives may have enhanced our productivity in ways we couldn\u2019t imagine before, but it has also introduced new threats that could limit our ability to stay safe in this digital age. In the wrong hands, AI could indeed be a potent weapon used to launch sophisticated cyberattacks against unsuspecting victims. At the same time, AI also has the potential to be a force for good, a vigilant guardian that keeps our digital assets safe from both internal and external threats and ensures the continuity of our business operations. As we move forward, we need to ask ourselves the following question: how do we ensure that we harness the power of AI while safeguarding ourselves and our assets against the vulnerabilities it could introduce? The answer to this question will shape the trajectory of cybersecurity practices and the future security landscape of our increasingly connected world.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The widespread integration of AI into various aspects of our lives may have enhanced our productivity, but it has also introduced new threats.<\/p>\n","protected":false},"author":10,"featured_media":79124,"parent":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[2885],"tags":[4464,5621,5489],"article-type":[],"trends":[5485],"class_list":["post-79123","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybercrime","tag-cybercrime","tag-cyberthreat","tag-ransomware","trends-artificial-intelligence-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Friend or foe: the role of AI in the cybersecurity domain<\/title>\n<meta name=\"description\" content=\"The widespread integration of AI into various aspects of our lives may have enhanced our productivity, but it has also introduced new threats.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.richardvanhooijdonk.com\/en\/friend-or-foe-the-role-of-ai-in-the-cybersecurity-domain\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Friend or foe: the role of AI in the cybersecurity domain\" \/>\n<meta property=\"og:description\" content=\"The widespread integration of AI into various aspects of our lives may have enhanced our productivity, but it has also introduced new threats.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.richardvanhooijdonk.com\/en\/friend-or-foe-the-role-of-ai-in-the-cybersecurity-domain\/\" \/>\n<meta property=\"og:site_name\" content=\"Richard van Hooijdonk Blog\" \/>\n<meta property=\"article:published_time\" content=\"2024-02-20T16:25:44+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-20T17:22:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/2024\/02\/shutterstock_2237018175-min-1-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1141\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"sheheryar khan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"sheheryar khan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/friend-or-foe-the-role-of-ai-in-the-cybersecurity-domain\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/friend-or-foe-the-role-of-ai-in-the-cybersecurity-domain\\\/\"},\"author\":{\"name\":\"sheheryar khan\",\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/#\\\/schema\\\/person\\\/5b8ddcabed59c2c30bcffbd7cefda6b7\"},\"headline\":\"Friend or foe: the role of AI in the cybersecurity domain\",\"datePublished\":\"2024-02-20T16:25:44+00:00\",\"dateModified\":\"2024-02-20T17:22:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/friend-or-foe-the-role-of-ai-in-the-cybersecurity-domain\\\/\"},\"wordCount\":2125,\"publisher\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/friend-or-foe-the-role-of-ai-in-the-cybersecurity-domain\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/shutterstock_2237018175-min-1-scaled.jpg\",\"keywords\":[\"cybercrime\",\"cyberthreat\",\"Ransomware\"],\"articleSection\":[\"Cybercrime\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/friend-or-foe-the-role-of-ai-in-the-cybersecurity-domain\\\/\",\"url\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/friend-or-foe-the-role-of-ai-in-the-cybersecurity-domain\\\/\",\"name\":\"Friend or foe: the role of AI in the cybersecurity domain\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/friend-or-foe-the-role-of-ai-in-the-cybersecurity-domain\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/friend-or-foe-the-role-of-ai-in-the-cybersecurity-domain\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/shutterstock_2237018175-min-1-scaled.jpg\",\"datePublished\":\"2024-02-20T16:25:44+00:00\",\"dateModified\":\"2024-02-20T17:22:05+00:00\",\"description\":\"The widespread integration of AI into various aspects of our lives may have enhanced our productivity, but it has also introduced new threats.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/friend-or-foe-the-role-of-ai-in-the-cybersecurity-domain\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/friend-or-foe-the-role-of-ai-in-the-cybersecurity-domain\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/friend-or-foe-the-role-of-ai-in-the-cybersecurity-domain\\\/#primaryimage\",\"url\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/shutterstock_2237018175-min-1-scaled.jpg\",\"contentUrl\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/shutterstock_2237018175-min-1-scaled.jpg\",\"width\":2560,\"height\":1141,\"caption\":\"Friend or foe: the role of AI in the cybersecurity domain\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/friend-or-foe-the-role-of-ai-in-the-cybersecurity-domain\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/keynotespreker-trendwatcher-en-futurist\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Friend or foe: the role of AI in the cybersecurity domain\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/#website\",\"url\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/\",\"name\":\"Richard van Hooijdonk Blog\",\"description\":\"Keynote speaker, trendwatcher and futurist\",\"publisher\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/#organization\",\"name\":\"Richard van Hooijdonk BV\",\"url\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/logo-footer-1.png\",\"contentUrl\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/logo-footer-1.png\",\"width\":100,\"height\":72,\"caption\":\"Richard van Hooijdonk BV\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/#\\\/schema\\\/person\\\/5b8ddcabed59c2c30bcffbd7cefda6b7\",\"name\":\"sheheryar khan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/07ae74b03e00f9ff42e325d79df595de8f0d2212f49d9fe9ff4d54b5df9a1180?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/07ae74b03e00f9ff42e325d79df595de8f0d2212f49d9fe9ff4d54b5df9a1180?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/07ae74b03e00f9ff42e325d79df595de8f0d2212f49d9fe9ff4d54b5df9a1180?s=96&d=mm&r=g\",\"caption\":\"sheheryar khan\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Friend or foe: the role of AI in the cybersecurity domain","description":"The widespread integration of AI into various aspects of our lives may have enhanced our productivity, but it has also introduced new threats.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.richardvanhooijdonk.com\/en\/friend-or-foe-the-role-of-ai-in-the-cybersecurity-domain\/","og_locale":"en_US","og_type":"article","og_title":"Friend or foe: the role of AI in the cybersecurity domain","og_description":"The widespread integration of AI into various aspects of our lives may have enhanced our productivity, but it has also introduced new threats.","og_url":"https:\/\/blog.richardvanhooijdonk.com\/en\/friend-or-foe-the-role-of-ai-in-the-cybersecurity-domain\/","og_site_name":"Richard van Hooijdonk Blog","article_published_time":"2024-02-20T16:25:44+00:00","article_modified_time":"2024-02-20T17:22:05+00:00","og_image":[{"width":2560,"height":1141,"url":"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/2024\/02\/shutterstock_2237018175-min-1-scaled.jpg","type":"image\/jpeg"}],"author":"sheheryar khan","twitter_card":"summary_large_image","twitter_misc":{"Written by":"sheheryar khan","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/friend-or-foe-the-role-of-ai-in-the-cybersecurity-domain\/#article","isPartOf":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/friend-or-foe-the-role-of-ai-in-the-cybersecurity-domain\/"},"author":{"name":"sheheryar khan","@id":"https:\/\/blog.richardvanhooijdonk.com\/#\/schema\/person\/5b8ddcabed59c2c30bcffbd7cefda6b7"},"headline":"Friend or foe: the role of AI in the cybersecurity domain","datePublished":"2024-02-20T16:25:44+00:00","dateModified":"2024-02-20T17:22:05+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/friend-or-foe-the-role-of-ai-in-the-cybersecurity-domain\/"},"wordCount":2125,"publisher":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/#organization"},"image":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/friend-or-foe-the-role-of-ai-in-the-cybersecurity-domain\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/2024\/02\/shutterstock_2237018175-min-1-scaled.jpg","keywords":["cybercrime","cyberthreat","Ransomware"],"articleSection":["Cybercrime"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/friend-or-foe-the-role-of-ai-in-the-cybersecurity-domain\/","url":"https:\/\/blog.richardvanhooijdonk.com\/en\/friend-or-foe-the-role-of-ai-in-the-cybersecurity-domain\/","name":"Friend or foe: the role of AI in the cybersecurity domain","isPartOf":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/friend-or-foe-the-role-of-ai-in-the-cybersecurity-domain\/#primaryimage"},"image":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/friend-or-foe-the-role-of-ai-in-the-cybersecurity-domain\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/2024\/02\/shutterstock_2237018175-min-1-scaled.jpg","datePublished":"2024-02-20T16:25:44+00:00","dateModified":"2024-02-20T17:22:05+00:00","description":"The widespread integration of AI into various aspects of our lives may have enhanced our productivity, but it has also introduced new threats.","breadcrumb":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/friend-or-foe-the-role-of-ai-in-the-cybersecurity-domain\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.richardvanhooijdonk.com\/en\/friend-or-foe-the-role-of-ai-in-the-cybersecurity-domain\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/friend-or-foe-the-role-of-ai-in-the-cybersecurity-domain\/#primaryimage","url":"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/2024\/02\/shutterstock_2237018175-min-1-scaled.jpg","contentUrl":"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/2024\/02\/shutterstock_2237018175-min-1-scaled.jpg","width":2560,"height":1141,"caption":"Friend or foe: the role of AI in the cybersecurity domain"},{"@type":"BreadcrumbList","@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/friend-or-foe-the-role-of-ai-in-the-cybersecurity-domain\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.richardvanhooijdonk.com\/en\/keynotespreker-trendwatcher-en-futurist\/"},{"@type":"ListItem","position":2,"name":"Friend or foe: the role of AI in the cybersecurity domain"}]},{"@type":"WebSite","@id":"https:\/\/blog.richardvanhooijdonk.com\/#website","url":"https:\/\/blog.richardvanhooijdonk.com\/","name":"Richard van Hooijdonk Blog","description":"Keynote speaker, trendwatcher and futurist","publisher":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.richardvanhooijdonk.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/blog.richardvanhooijdonk.com\/#organization","name":"Richard van Hooijdonk BV","url":"https:\/\/blog.richardvanhooijdonk.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.richardvanhooijdonk.com\/#\/schema\/logo\/image\/","url":"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/2019\/04\/logo-footer-1.png","contentUrl":"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/2019\/04\/logo-footer-1.png","width":100,"height":72,"caption":"Richard van Hooijdonk BV"},"image":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/blog.richardvanhooijdonk.com\/#\/schema\/person\/5b8ddcabed59c2c30bcffbd7cefda6b7","name":"sheheryar khan","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/07ae74b03e00f9ff42e325d79df595de8f0d2212f49d9fe9ff4d54b5df9a1180?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/07ae74b03e00f9ff42e325d79df595de8f0d2212f49d9fe9ff4d54b5df9a1180?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/07ae74b03e00f9ff42e325d79df595de8f0d2212f49d9fe9ff4d54b5df9a1180?s=96&d=mm&r=g","caption":"sheheryar khan"}}]}},"_links":{"self":[{"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/posts\/79123","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/comments?post=79123"}],"version-history":[{"count":0,"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/posts\/79123\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/media\/79124"}],"wp:attachment":[{"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/media?parent=79123"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/categories?post=79123"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/tags?post=79123"},{"taxonomy":"article-type","embeddable":true,"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/article-type?post=79123"},{"taxonomy":"trends","embeddable":true,"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/trends?post=79123"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}