{"id":23687,"date":"2025-05-16T03:12:00","date_gmt":"2025-05-16T03:12:00","guid":{"rendered":"https:\/\/www.adminbyrequest.com\/?p=23687"},"modified":"2026-01-24T23:04:06","modified_gmt":"2026-01-24T23:04:06","slug":"ai-in-cybersecurity-arms-both-sides-of-the-fight","status":"publish","type":"post","link":"https:\/\/www.adminbyrequest.com\/en\/blogs\/ai-in-cybersecurity-arms-both-sides-of-the-fight","title":{"rendered":"AI in Cybersecurity Arms Both Sides of the Fight"},"content":{"rendered":"\n<p>Artificial intelligence is changing cybersecurity in ways we couldn&#8217;t have imagined a few years ago. Sure, tech has always moved fast, but what makes this shift unique is that the same technology strengthens both attackers and defenders.&nbsp;<\/p>\n\n\n\n<p>The AI that protects your network today might be studying your defenses tomorrow. And the tools built to find vulnerabilities can just as easily be turned against your systems as used to protect them.&nbsp;<\/p>\n\n\n\n<p>This isn&#8217;t just about faster computers or better algorithms. AI brings something fundamentally different to security: systems that learn independently and improve without human intervention.&nbsp;<\/p>\n\n\n\n<p>Let&#8217;s explore what this means for your organization.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>The AI Threat Scene: What&#8217;s Actually Happening<\/strong>&nbsp;<\/h2>\n\n\n\n<p>The conversations around AI security threats often bounce between fear-mongering and dismissive skepticism. Neither position is particularly helpful. Instead, let&#8217;s examine what&#8217;s actually happening in the wild.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Automated Reconnaissance and Attack Surface Mapping<\/strong>&nbsp;<\/h3>\n\n\n\n<p>Traditional network scanning was time-consuming and often noisy enough to trigger alerts. Today&#8217;s AI-powered reconnaissance tools operate with more subtlety, adapting their behavior based on network responses and mimicking legitimate traffic patterns.&nbsp;<\/p>\n\n\n\n<p>These systems can map attack surfaces over extended periods, identifying potential entry points while staying below detection thresholds. They don&#8217;t just scan for open ports; they build comprehensive models of organizational infrastructure, noting patterns, schedules, and relationships between systems.&nbsp;<\/p>\n\n\n\n<p>IBM demonstrated this concept with <a href=\"https:\/\/research.ibm.com\/publications\/deeplocker-concealing-targeted-attacks-with-ai-locksmithing\" target=\"_blank\" rel=\"noopener\" title=\"\">their DeepLocker proof of concept<\/a>, which used AI to hide malicious payloads in benign applications that would only activate when specific target conditions were met. While DeepLocker was created for research purposes, it illustrates how AI can enable stealthy, persistent reconnaissance that traditional security tools struggle to detect.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"572\" src=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/05\/inline-1-3-1024x572.jpg\" alt=\"\" class=\"wp-image-23702\" srcset=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/05\/inline-1-3-1024x572.jpg 1024w, https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/05\/inline-1-3-300x167.jpg 300w, https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/05\/inline-1-3-768x429.jpg 768w, https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/05\/inline-1-3-1536x857.jpg 1536w, https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/05\/inline-1-3-2048x1143.jpg 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Evolving Phishing and Social Engineering<\/strong>&nbsp;<\/h3>\n\n\n\n<p>The quality of AI-generated phishing attempts has improved dramatically. We&#8217;re no longer talking about those old typo-riddled emails promising you an inheritance from your long-lost granduncle. Today&#8217;s AI can:\u00a0<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Analyze writing styles from email archives or social media posts&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Craft messages that convincingly mimic colleagues, partners, or executives&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Time delivery based on work patterns&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Generate contextually relevant content that references ongoing projects&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Create fake voice or video content for more sophisticated attacks&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>These attacks work because they exploit human trust, and they&#8217;re getting better at it. <a href=\"https:\/\/sosafe-awareness.com\/company\/press\/one-in-five-people-click-on-ai-generated-phishing-emails-sosafe-data-reveals\/\" target=\"_blank\" rel=\"noreferrer noopener\">A 2023 study by SoSafe<\/a> showed that AI-written phishing emails were opened by 78% of people, with 21% clicking on malicious content within them.&nbsp;<\/p>\n\n\n\n<p>More recently, <a href=\"https:\/\/thedebrief.org\/ai-phishing-revolution-study-reveals-bots-now-out-scheme-humans-in-cyber-deception\/\" target=\"_blank\" rel=\"noreferrer noopener\">research published in February 2025<\/a> found that AI-generated phishing emails performed on par with those created by human experts, achieving a 54% success rate in eliciting clicks on embedded links.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Vulnerability Discovery and Exploitation<\/strong>&nbsp;<\/h3>\n\n\n\n<p>Perhaps most concerning is AI&#8217;s growing ability to discover and exploit vulnerabilities. While we&#8217;re not yet seeing widespread autonomous exploitation in the wild, research systems have shown they can:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Analyze code to find zero-day vulnerabilities&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Develop novel exploit techniques&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Test and refine attacks against defensive systems&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Generalize attack patterns across similar applications&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>The transition from research to actual attacks is occurring faster than many predicted. In November 2024, Google announced that their AI tool called Big Sleep <a href=\"https:\/\/thehackernews.com\/2024\/11\/googles-ai-tool-big-sleep-finds-zero.html\" target=\"_blank\" rel=\"noreferrer noopener\">had discovered a critical zero-day vulnerability<\/a> in the SQLite database engine, demonstrating how AI can be used to find previously unknown security flaws.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Polymorphic Malware and Attack Customization<\/strong>&nbsp;<\/h3>\n\n\n\n<p>Malware traditionally followed relatively predictable patterns, allowing security tools to identify cyber threats by their signatures or behaviors. AI-driven malware changes that equation by:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Continually modifying its code while maintaining functionality&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Customizing attack methods based on the environment it discovers&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Adapting its behavior to evade specific security measures&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Learning from failed attempts&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>This adaptive approach makes traditional signature-based threat detection nearly useless, forcing security teams to rely more heavily on behavior analysis and anomaly detection.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>The Defender&#8217;s Toolkit: AI&#8217;s Role in Modern Security<\/strong>&nbsp;<\/h2>\n\n\n\n<p>While the threat landscape looks increasingly challenging, security teams aren&#8217;t defenseless. The same core technologies powering attacks also create new defensive capabilities.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Enhanced Threat Detection and Response<\/strong>&nbsp;<\/h3>\n\n\n\n<p>AI systems excel at finding patterns in vast amounts of data, making them particularly useful for security monitoring and intrusion detection. Unlike traditional rule-based systems, AI-powered tools can:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Establish baseline behavior for networks, systems, and users&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Identify subtle anomalies that might indicate compromise&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Correlate events across disparate systems&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Reduce false positives by learning from analyst feedback&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>With these capabilities, organizations can identify potential security incidents much faster and with greater accuracy than traditional methods.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>User and Entity Behavior Analytics (UEBA)<\/strong>&nbsp;<\/h3>\n\n\n\n<p>Understanding normal behavior patterns helps identify emerging threats before they materialize. Modern AI-powered UEBA tools monitor activities of both users and systems, developing profiles that represent typical behavior. Deviations from these profiles trigger investigation.&nbsp;<\/p>\n\n\n\n<p>For example, if a system administrator who typically works during business hours suddenly logs in at 11 PM from an unusual location and accesses rarely-touched databases, that pattern would generate an alert, even if each individual action might be technically allowed.&nbsp;<\/p>\n\n\n\n<p>These systems grow more accurate over time as they learn patterns specific to your organization. They&#8217;re particularly effective at detecting insider threats and compromised credentials, which traditional perimeter security might miss.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Automated Vulnerability Management<\/strong>&nbsp;<\/h3>\n\n\n\n<p>Finding and patching vulnerabilities remains one of the most effective security measures, but the scale of modern IT environments makes comprehensive scanning and prioritization difficult for human teams alone.&nbsp;<\/p>\n\n\n\n<p>AI systems can help by:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Continuously scanning infrastructure for known vulnerabilities&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Correlating vulnerability information with threat intelligence&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Prioritizing patches based on actual exploitation risk&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Identifying security debt and systemic issues&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Recommending configuration changes to mitigate exposure&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>These capabilities don&#8217;t eliminate the need for human judgment, but they do help security teams focus their efforts where they matter most.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Security Orchestration and Automated Response<\/strong>&nbsp;<\/h3>\n\n\n\n<p>The speed of modern attacks often outpaces human response capabilities. AI-powered Security Orchestration, Automation and Response (SOAR) platforms help bridge this gap by:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Automating routine investigation steps&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Gathering context around alerts&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Triggering predetermined response playbooks&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Learning from past incidents to improve future response&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>These automated systems can contain threats in seconds rather than minutes or hours, significantly reducing the potential damage from active attacks.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>The Human Element: AI as Security Partner<\/strong>&nbsp;<\/h3>\n\n\n\n<p>Despite the impressive capabilities of AI security systems, the most effective security programs combine technology with human expertise. This partnership leverages the strengths of both.&nbsp;<\/p>\n\n\n\n<p>AI excels at processing vast amounts of data, detecting patterns, and performing consistent repetitive tasks. Meanwhile, humans provide context, strategic thinking, and ethical judgment. In other words, AI handles volume, people handle nuance. &nbsp;<\/p>\n\n\n\n<p>Security teams that view AI as a partner rather than a replacement typically see the best outcomes. But this partnership requires security professionals to develop new skills. Rather than performing every analysis manually, teams now need to:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Define appropriate parameters for AI systems&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Interpret AI-generated recommendations in broader context&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Evaluate the quality of AI outputs&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Understand AI limitations and failure modes&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>Organizations that invest in these skills can expect higher satisfaction with their AI cybersecurity tools and better outcomes overall.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>How Admin By Request Uses AI<\/strong>&nbsp;<\/h2>\n\n\n\n<p>At Admin By Request, we&#8217;ve integrated AI capabilities that solve real security challenges without unnecessary complexity. Here&#8217;s how we&#8217;re using AI to enhance endpoint security while improving efficiency:&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>AI-Powered Application Approval<\/strong>&nbsp;<\/h3>\n\n\n\n<p>Our <a href=\"\/en\/endpoint-privilege-management\" target=\"_blank\" rel=\"noopener\" title=\"\">Endpoint Privilege Management solution<\/a> uses AI to help organizations safely manage application elevation requests. The AI engine assigns two percentage scores (0-100%) to applications based on:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The application&#8217;s popularity and prevalence across our user base&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The reputation and recognition of the vendor&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>These scores help organizations automatically identify trusted applications that can be safely elevated without manual review. Applications with high scores (common applications from reputable vendors) can be <a href=\"https:\/\/docs.adminbyrequest.com\/features\/ai-approval.htm\" title=\"\">automatically approved<\/a>, while rarer applications from unknown vendors receive lower scores and can be flagged for manual review.\u00a0<\/p>\n\n\n\n<p>This approach lets organizations set their own risk thresholds while drastically reducing the administrative burden of managing application elevation requests. Instead of manually building and maintaining enormous pre-approved lists, the AI handles the initial risk assessment.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Machine Learning Auto-Approval<\/strong>&nbsp;<\/h3>\n\n\n\n<p>Working alongside our AI approval system, <a href=\"https:\/\/www.adminbyrequest.com\/en\/docs\/machine-learning\" target=\"_blank\" rel=\"noopener\" title=\"\">our Machine Learning capability<\/a> learns from administrator decisions to build a customized pre-approved application list over time.\u00a0<\/p>\n\n\n\n<p>Rather than requiring organizations to compile comprehensive lists ahead of time, the system observes which applications administrators repeatedly approve for elevation. After a configurable number of approvals, the system can automatically add these applications to the pre-approved list.&nbsp;<\/p>\n\n\n\n<p>This &#8220;learn as you go&#8221; approach combines human judgment with machine efficiency, creating a system that continuously improves while respecting organizational policies and risk tolerance.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>ChatGPT Integration for Request Assessment<\/strong>&nbsp;<\/h3>\n\n\n\n<p>We&#8217;ve also <a href=\"https:\/\/www.adminbyrequest.com\/en\/docs\/chatgpt\" title=\"\">integrated ChatGPT<\/a> to provide administrators with additional context when evaluating elevation requests. When users request to run applications with admin privileges, administrators can click an &#8220;AI Assistance&#8221; button to get detailed information about the application before making their decision.\u00a0<\/p>\n\n\n\n<p>This feature provides on-demand intelligence that helps administrators make better-informed decisions about whether to approve or deny requests, without having to manually research unfamiliar applications.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>What&#8217;s Next on the AI Security Horizon?<\/strong>&nbsp;<\/h2>\n\n\n\n<p>As we look toward the future of AI in cybersecurity, several trends will shape how organizations approach digital protection:&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Adversarial Machine Learning Will Intensify<\/strong>&nbsp;<\/h3>\n\n\n\n<p>As security tools increasingly rely on AI, attackers will focus more on subverting those systems through adversarial techniques. This might take the form of poisoning training data to create blind spots, crafting inputs specifically designed to trigger false negatives, and probing models to discover decision boundaries. Attackers may also develop techniques to extract protected information from models&nbsp;<\/p>\n\n\n\n<p>Organizations will need to harden their AI systems against these attacks, creating a new domain of security best practices.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>More Sophisticated AI Will Create More Sophisticated Threats<\/strong>&nbsp;<\/h3>\n\n\n\n<p>The progression from GPT-3 to GPT-4 demonstrated how quickly AI capabilities can advance. Future generations of AI will likely enable more convincing deepfakes and social engineering, plus better vulnerability discovery. It can also lead to more autonomous attack systems&nbsp;and novel attack vectors we haven&#8217;t yet considered.<\/p>\n\n\n\n<p>Security professionals will need to stay current with AI developments beyond the security domain, as advances in general AI capabilities inevitably affect the threat landscape.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Regulatory Frameworks Will Evolve<\/strong>&nbsp;<\/h3>\n\n\n\n<p>Governments worldwide are developing regulations for AI systems, with security implications receiving particular attention. It&#8217;s hard to say how long it will take for them to catch up, but organizations can expect things like mandatory security assessments for critical AI systems, liability frameworks for AI-related breaches, and requirements for explainability in security-related AI decisions.&nbsp;<\/p>\n\n\n\n<p>Standards for AI security may eventually grow to resemble those for traditional systems in depth. Staying ahead of these regulatory changes will require proactive planning rather than reactive compliance.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Human-AI Integration Will Deepen<\/strong>&nbsp;<\/h3>\n\n\n\n<p>The most effective security programs will continue to blend human and artificial intelligence. This partnership may take the form of security pros developing better ways to work alongside AI systems, those AI tools get better at explaining their reasoning, and training programs adapting to prepare teams for this hybrid environment.<\/p>\n\n\n\n<p>Organizations that invest in this integration will outperform those that treat AI as either a magic solution or just another tool in the box.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Finding Balance in an AI Security World<\/strong>&nbsp;<\/h2>\n\n\n\n<p>The rapid evolution of AI in cybersecurity creates both excitement and concern. These technologies offer powerful new capabilities for protecting our systems, but also enable more sophisticated attacks. Finding the right balance requires careful consideration of several factors:&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Ethics and Boundaries<\/strong>&nbsp;<\/h3>\n\n\n\n<p>Not everything technically possible is ethically appropriate. Organizations need clear guidelines for AI use in security contexts, particularly regarding:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Privacy implications of monitoring systems&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Transparency with users and employees&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Limitations on automated responses&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Testing boundaries that don&#8217;t create actual risk&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>These considerations should be part of your security governance framework, not afterthoughts when problems arise.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Technical Debt and Fundamental Security<\/strong>&nbsp;<\/h3>\n\n\n\n<p>While AI tools can significantly enhance security capabilities, they shouldn&#8217;t distract from fundamental security practices. Organizations still need:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Robust identity and access management&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Comprehensive asset inventory and management&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Strong configuration and patch management&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Clear security policies and procedures&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>AI works best when built upon these foundations, not as a replacement for them.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Appropriate Trust Levels<\/strong>&nbsp;<\/h3>\n\n\n\n<p>Neither blind faith in AI systems nor complete skepticism serves organizations well. Instead, security teams should develop nuanced understanding of:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Where their AI tools excel and where they struggle&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Which decisions require human review&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>How to validate AI outputs when necessary&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>When to override automated recommendations&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>This calibrated trust comes from experience, training, and clear evaluation procedures.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>The Path Forward: Pragmatic AI Security<\/strong>&nbsp;<\/h2>\n\n\n\n<p>After exploring how AI is changing cybersecurity, here are some practical steps to consider:&nbsp;<\/p>\n\n\n\n<ol start=\"1\" class=\"wp-block-list\">\n<li><strong>Assess your current situation<\/strong> from both offensive and defensive angles. Know how these technologies change your threat model and security capabilities.&nbsp;<\/li>\n<\/ol>\n\n\n\n<ol start=\"2\" class=\"wp-block-list\">\n<li><strong>Invest in people, not just tech<\/strong>. AI tools only work when your team can use them effectively and understand what they&#8217;re telling you.&nbsp;<\/li>\n<\/ol>\n\n\n\n<ol start=\"3\" class=\"wp-block-list\">\n<li><strong>Start small with specific use cases<\/strong> rather than trying to transform your entire security program overnight. Endpoint protection, phishing detection, and user behavior analytics make good starting points.&nbsp;<\/li>\n<\/ol>\n\n\n\n<ol start=\"4\" class=\"wp-block-list\">\n<li><strong>Create clear rules of engagement<\/strong> for your AI security tools, including ethical guidelines, testing procedures, and who&#8217;s responsible for what.&nbsp;<\/li>\n<\/ol>\n\n\n\n<ol start=\"5\" class=\"wp-block-list\">\n<li><strong>Share information with peers<\/strong> about what you&#8217;re seeing with AI security. Things change too quickly for any one organization to monitor alone.&nbsp;<\/li>\n<\/ol>\n\n\n\n<p>The organizations that succeed will approach AI security with both enthusiasm and a healthy dose of skepticism. They&#8217;ll recognize the potential while staying clear-eyed about the limitations and risks.&nbsp;<\/p>\n\n\n\n<p>At Admin By Request, we&#8217;re committed to helping our clients stay ready through practical solutions that improve security without adding unnecessary complexity. We integrate AI where it adds real value, while maintaining the security basics that have always been the foundation of good protection.&nbsp;<\/p>\n\n\n\n<p>The future of security isn&#8217;t purely human or purely artificial \u2013 it&#8217;s a thoughtful blend of both. By focusing on that integration, organizations can use AI&#8217;s strengths while managing its risks, creating security programs ready for whatever comes next.&nbsp;<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>AI in cybersecurity is playing both sides, arming attackers and defenders with tools that get smarter every day. See how it&#8217;s changing things across the board.<\/p>\n","protected":false},"author":16,"featured_media":23701,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[36],"tags":[44,45,148,52,371,441],"ppma_author":[428],"class_list":["post-23687","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blogs","tag-ai","tag-artificial-intelligence","tag-cybersecurity","tag-machine-learning","tag-phishing","tag-threat-detection","entry","has-media"],"aioseo_notices":[],"aioseo_head":"\n\t\t<!-- All in One SEO Pro 4.9.6.2 - aioseo.com -->\n\t<meta name=\"description\" content=\"AI in cybersecurity is playing both sides, arming attackers and defenders with tools that get smarter every day. See how it&#039;s changing things across the board.\" \/>\n\t<meta name=\"robots\" content=\"max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n\t<meta name=\"author\" content=\"Pocholo Legaspi\"\/>\n\t<meta name=\"keywords\" content=\"ai,artificial intelligence,cybersecurity,machine learning,phishing,threat detection\" \/>\n\t<link rel=\"canonical\" href=\"https:\/\/www.adminbyrequest.com\/en\/blogs\/ai-in-cybersecurity-arms-both-sides-of-the-fight\" \/>\n\t<meta name=\"generator\" content=\"All in One SEO Pro (AIOSEO) 4.9.6.2\" \/>\n\t\t<meta property=\"og:locale\" content=\"en_US\" \/>\n\t\t<meta property=\"og:site_name\" content=\"Admin By Request \u00bb Local Admin Rights, Managed.\" \/>\n\t\t<meta property=\"og:type\" content=\"article\" \/>\n\t\t<meta property=\"og:title\" content=\"AI in Cybersecurity Arms Both Sides of the Fight\" \/>\n\t\t<meta property=\"og:description\" content=\"AI in cybersecurity is playing both sides, arming attackers and defenders with tools that get smarter every day. See how it&#039;s changing things across the board.\" \/>\n\t\t<meta property=\"og:url\" content=\"https:\/\/www.adminbyrequest.com\/en\/blogs\/ai-in-cybersecurity-arms-both-sides-of-the-fight\" \/>\n\t\t<meta property=\"og:image\" content=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg\" \/>\n\t\t<meta property=\"og:image:secure_url\" content=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg\" \/>\n\t\t<meta property=\"article:published_time\" content=\"2025-05-16T03:12:00+00:00\" \/>\n\t\t<meta property=\"article:modified_time\" content=\"2026-01-24T23:04:06+00:00\" \/>\n\t\t<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/adminbyrequest\" \/>\n\t\t<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n\t\t<meta name=\"twitter:site\" content=\"@AdminByRequest\" \/>\n\t\t<meta name=\"twitter:title\" content=\"AI in Cybersecurity Arms Both Sides of the Fight\" \/>\n\t\t<meta name=\"twitter:description\" content=\"AI in cybersecurity is playing both sides, arming attackers and defenders with tools that get smarter every day. See how it&#039;s changing things across the board.\" \/>\n\t\t<meta name=\"twitter:creator\" content=\"@AdminByRequest\" \/>\n\t\t<meta name=\"twitter:image\" content=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg\" \/>\n\t\t<script type=\"application\/ld+json\" class=\"aioseo-schema\">\n\t\t\t{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"BlogPosting\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/ai-in-cybersecurity-arms-both-sides-of-the-fight#blogposting\",\"name\":\"AI in Cybersecurity Arms Both Sides of the Fight\",\"headline\":\"AI in Cybersecurity Arms Both Sides of the Fight\",\"author\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/pocholo-editor#author\"},\"publisher\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#organization\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/main-2-scaled.jpg\",\"width\":2560,\"height\":1429,\"caption\":\"Admin By Request blog post on AI in cybersecurity\"},\"datePublished\":\"2025-05-16T03:12:00+00:00\",\"dateModified\":\"2026-01-24T23:04:06+00:00\",\"inLanguage\":\"en-US\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/ai-in-cybersecurity-arms-both-sides-of-the-fight#webpage\"},\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/ai-in-cybersecurity-arms-both-sides-of-the-fight#webpage\"},\"articleSection\":\"Blogs, AI, Artificial Intelligence, Cybersecurity, Machine Learning, Phishing, Threat Detection, Pocholo Legaspi\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/ai-in-cybersecurity-arms-both-sides-of-the-fight#breadcrumblist\",\"itemListElement\":[{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en#listItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs#listItem\",\"name\":\"Blogs\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs#listItem\",\"position\":2,\"name\":\"Blogs\",\"item\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/ai-in-cybersecurity-arms-both-sides-of-the-fight#listItem\",\"name\":\"AI in Cybersecurity Arms Both Sides of the Fight\"},\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en#listItem\",\"name\":\"Home\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/ai-in-cybersecurity-arms-both-sides-of-the-fight#listItem\",\"position\":3,\"name\":\"AI in Cybersecurity Arms Both Sides of the Fight\",\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs#listItem\",\"name\":\"Blogs\"}}]},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#organization\",\"name\":\"Admin By Request\",\"description\":\"Local Admin Rights, Managed.\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/\",\"telephone\":\"+12622994600\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/Circle-Tick-24.svg\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/ai-in-cybersecurity-arms-both-sides-of-the-fight\\\/#organizationLogo\"},\"image\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/ai-in-cybersecurity-arms-both-sides-of-the-fight\\\/#organizationLogo\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/adminbyrequest\",\"https:\\\/\\\/twitter.com\\\/AdminByRequest\",\"https:\\\/\\\/www.instagram.com\\\/AdminByRequest\\\/\",\"https:\\\/\\\/www.tiktok.com\\\/@adminbyrequest\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCwq1wlbT9m_z3YH-EPaZqKw\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/adminbyrequest\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/pocholo-editor#author\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/pocholo-editor\",\"name\":\"Pocholo Legaspi\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/ai-in-cybersecurity-arms-both-sides-of-the-fight#webpage\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/ai-in-cybersecurity-arms-both-sides-of-the-fight\",\"name\":\"AI in Cybersecurity Arms Both Sides of the Fight\",\"description\":\"AI in cybersecurity is playing both sides, arming attackers and defenders with tools that get smarter every day. See how it's changing things across the board.\",\"inLanguage\":\"en-US\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#website\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/ai-in-cybersecurity-arms-both-sides-of-the-fight#breadcrumblist\"},\"author\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/pocholo-editor#author\"},\"creator\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/pocholo-editor#author\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/main-2-scaled.jpg\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/ai-in-cybersecurity-arms-both-sides-of-the-fight\\\/#mainImage\",\"width\":2560,\"height\":1429,\"caption\":\"Admin By Request blog post on AI in cybersecurity\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/ai-in-cybersecurity-arms-both-sides-of-the-fight#mainImage\"},\"datePublished\":\"2025-05-16T03:12:00+00:00\",\"dateModified\":\"2026-01-24T23:04:06+00:00\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/\",\"name\":\"Admin By Request\",\"alternateName\":\"ABR\",\"description\":\"Local Admin Rights, Managed.\",\"inLanguage\":\"en-US\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#organization\"}}]}\n\t\t<\/script>\n\t\t<script type=\"text\/javascript\">\n\t\t\t(function(c,l,a,r,i,t,y){\n\t\t\tc[a]=c[a]||function(){(c[a].q=c[a].q||[]).push(arguments)};t=l.createElement(r);t.async=1;\n\t\t\tt.src=\"https:\/\/www.clarity.ms\/tag\/\"+i+\"?ref=aioseo\";y=l.getElementsByTagName(r)[0];y.parentNode.insertBefore(t,y);\n\t\t})(window, document, \"clarity\", \"script\", \"n4woz8og40\");\n\t\t<\/script>\n\t\t<script>(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start': new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0], j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src='https:\/\/www.googletagmanager.com\/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f);})(window,document,'script','dataLayer',\"GTM-PGQ6572W\");<\/script>\n\t\t<!-- All in One SEO Pro -->\r\n\t\t<title>AI in Cybersecurity Arms Both Sides of the Fight<\/title>\n\n","aioseo_head_json":{"title":"AI in Cybersecurity Arms Both Sides of the Fight","description":"AI in cybersecurity is playing both sides, arming attackers and defenders with tools that get smarter every day. See how it's changing things across the board.","canonical_url":"https:\/\/www.adminbyrequest.com\/en\/blogs\/ai-in-cybersecurity-arms-both-sides-of-the-fight","robots":"max-snippet:-1, max-image-preview:large, max-video-preview:-1","keywords":"ai,artificial intelligence,cybersecurity,machine learning,phishing,threat detection","webmasterTools":{"miscellaneous":""},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"BlogPosting","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/ai-in-cybersecurity-arms-both-sides-of-the-fight#blogposting","name":"AI in Cybersecurity Arms Both Sides of the Fight","headline":"AI in Cybersecurity Arms Both Sides of the Fight","author":{"@id":"https:\/\/www.adminbyrequest.com\/en\/author\/pocholo-editor#author"},"publisher":{"@id":"https:\/\/www.adminbyrequest.com\/en\/#organization"},"image":{"@type":"ImageObject","url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/05\/main-2-scaled.jpg","width":2560,"height":1429,"caption":"Admin By Request blog post on AI in cybersecurity"},"datePublished":"2025-05-16T03:12:00+00:00","dateModified":"2026-01-24T23:04:06+00:00","inLanguage":"en-US","mainEntityOfPage":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/ai-in-cybersecurity-arms-both-sides-of-the-fight#webpage"},"isPartOf":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/ai-in-cybersecurity-arms-both-sides-of-the-fight#webpage"},"articleSection":"Blogs, AI, Artificial Intelligence, Cybersecurity, Machine Learning, Phishing, Threat Detection, Pocholo Legaspi"},{"@type":"BreadcrumbList","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/ai-in-cybersecurity-arms-both-sides-of-the-fight#breadcrumblist","itemListElement":[{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en#listItem","position":1,"name":"Home","item":"https:\/\/www.adminbyrequest.com\/en","nextItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs#listItem","name":"Blogs"}},{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs#listItem","position":2,"name":"Blogs","item":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs","nextItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/ai-in-cybersecurity-arms-both-sides-of-the-fight#listItem","name":"AI in Cybersecurity Arms Both Sides of the Fight"},"previousItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en#listItem","name":"Home"}},{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/ai-in-cybersecurity-arms-both-sides-of-the-fight#listItem","position":3,"name":"AI in Cybersecurity Arms Both Sides of the Fight","previousItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs#listItem","name":"Blogs"}}]},{"@type":"Organization","@id":"https:\/\/www.adminbyrequest.com\/en\/#organization","name":"Admin By Request","description":"Local Admin Rights, Managed.","url":"https:\/\/www.adminbyrequest.com\/en\/","telephone":"+12622994600","logo":{"@type":"ImageObject","url":"\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/ai-in-cybersecurity-arms-both-sides-of-the-fight\/#organizationLogo"},"image":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/ai-in-cybersecurity-arms-both-sides-of-the-fight\/#organizationLogo"},"sameAs":["https:\/\/www.facebook.com\/adminbyrequest","https:\/\/twitter.com\/AdminByRequest","https:\/\/www.instagram.com\/AdminByRequest\/","https:\/\/www.tiktok.com\/@adminbyrequest","https:\/\/www.youtube.com\/channel\/UCwq1wlbT9m_z3YH-EPaZqKw","https:\/\/www.linkedin.com\/company\/adminbyrequest\/"]},{"@type":"Person","@id":"https:\/\/www.adminbyrequest.com\/en\/author\/pocholo-editor#author","url":"https:\/\/www.adminbyrequest.com\/en\/author\/pocholo-editor","name":"Pocholo Legaspi"},{"@type":"WebPage","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/ai-in-cybersecurity-arms-both-sides-of-the-fight#webpage","url":"https:\/\/www.adminbyrequest.com\/en\/blogs\/ai-in-cybersecurity-arms-both-sides-of-the-fight","name":"AI in Cybersecurity Arms Both Sides of the Fight","description":"AI in cybersecurity is playing both sides, arming attackers and defenders with tools that get smarter every day. See how it's changing things across the board.","inLanguage":"en-US","isPartOf":{"@id":"https:\/\/www.adminbyrequest.com\/en\/#website"},"breadcrumb":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/ai-in-cybersecurity-arms-both-sides-of-the-fight#breadcrumblist"},"author":{"@id":"https:\/\/www.adminbyrequest.com\/en\/author\/pocholo-editor#author"},"creator":{"@id":"https:\/\/www.adminbyrequest.com\/en\/author\/pocholo-editor#author"},"image":{"@type":"ImageObject","url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/05\/main-2-scaled.jpg","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/ai-in-cybersecurity-arms-both-sides-of-the-fight\/#mainImage","width":2560,"height":1429,"caption":"Admin By Request blog post on AI in cybersecurity"},"primaryImageOfPage":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/ai-in-cybersecurity-arms-both-sides-of-the-fight#mainImage"},"datePublished":"2025-05-16T03:12:00+00:00","dateModified":"2026-01-24T23:04:06+00:00"},{"@type":"WebSite","@id":"https:\/\/www.adminbyrequest.com\/en\/#website","url":"https:\/\/www.adminbyrequest.com\/en\/","name":"Admin By Request","alternateName":"ABR","description":"Local Admin Rights, Managed.","inLanguage":"en-US","publisher":{"@id":"https:\/\/www.adminbyrequest.com\/en\/#organization"}}]},"og:locale":"en_US","og:site_name":"Admin By Request \u00bb Local Admin Rights, Managed.","og:type":"article","og:title":"AI in Cybersecurity Arms Both Sides of the Fight","og:description":"AI in cybersecurity is playing both sides, arming attackers and defenders with tools that get smarter every day. See how it's changing things across the board.","og:url":"https:\/\/www.adminbyrequest.com\/en\/blogs\/ai-in-cybersecurity-arms-both-sides-of-the-fight","og:image":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg","og:image:secure_url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg","article:published_time":"2025-05-16T03:12:00+00:00","article:modified_time":"2026-01-24T23:04:06+00:00","article:publisher":"https:\/\/www.facebook.com\/adminbyrequest","twitter:card":"summary_large_image","twitter:site":"@AdminByRequest","twitter:title":"AI in Cybersecurity Arms Both Sides of the Fight","twitter:description":"AI in cybersecurity is playing both sides, arming attackers and defenders with tools that get smarter every day. See how it's changing things across the board.","twitter:creator":"@AdminByRequest","twitter:image":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg"},"aioseo_meta_data":{"post_id":"23687","title":"#post_title","description":"#post_excerpt","keywords":null,"keyphrases":{"focus":{"keyphrase":"ai in cybersecurity","score":60,"analysis":{"keyphraseInTitle":{"score":9,"maxScore":9,"error":0},"keyphraseInDescription":{"score":9,"maxScore":9,"error":0},"keyphraseLength":{"score":9,"maxScore":9,"error":0,"length":3},"keyphraseInURL":{"score":5,"maxScore":5,"error":0},"keyphraseInIntroduction":{"score":3,"maxScore":9,"error":1},"keyphraseInSubHeadings":{"score":3,"maxScore":9,"error":1},"keyphraseInImageAlt":{"score":3,"maxScore":9,"error":1},"keywordDensity":{"score":0,"type":"low","maxScore":9,"error":1}}},"additional":[]},"primary_term":null,"canonical_url":null,"og_title":null,"og_description":null,"og_object_type":"default","og_image_type":"default","og_image_url":null,"og_image_width":null,"og_image_height":null,"og_image_custom_url":null,"og_image_custom_fields":null,"og_video":"","og_custom_url":null,"og_article_section":null,"og_article_tags":null,"twitter_use_og":false,"twitter_card":"default","twitter_image_type":"default","twitter_image_url":null,"twitter_image_custom_url":null,"twitter_image_custom_fields":null,"twitter_title":null,"twitter_description":null,"schema":{"blockGraphs":[],"customGraphs":[],"default":{"data":{"Article":[],"Course":[],"Dataset":[],"FAQPage":[],"Movie":[],"Person":[],"Product":[],"ProductReview":[],"Car":[],"Recipe":[],"Service":[],"SoftwareApplication":[],"WebPage":[]},"graphName":"BlogPosting","isEnabled":true},"graphs":[]},"schema_type":"default","schema_type_options":null,"pillar_content":false,"robots_default":true,"robots_noindex":false,"robots_noarchive":false,"robots_nosnippet":false,"robots_nofollow":false,"robots_noimageindex":false,"robots_noodp":false,"robots_notranslate":false,"robots_max_snippet":"-1","robots_max_videopreview":"-1","robots_max_imagepreview":"large","priority":null,"frequency":"default","local_seo":null,"seo_analyzer_scan_date":"2026-01-24 23:42:57","breadcrumb_settings":null,"limit_modified_date":false,"reviewed_by":null,"open_ai":"{\"title\":{\"suggestions\":[],\"usage\":0},\"description\":{\"suggestions\":[],\"usage\":0}}","ai":null,"created":"2025-05-15 01:33:05","updated":"2026-01-24 23:42:57"},"aioseo_breadcrumb":"<div class=\"aioseo-breadcrumbs\"><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.adminbyrequest.com\/en\" title=\"Home\">Home<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.adminbyrequest.com\/en\/category\/blogs\" title=\"Blogs\">Blogs<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\tAI in Cybersecurity Arms Both Sides of the Fight\n<\/span><\/div>","aioseo_breadcrumb_json":[{"label":"Home","link":"https:\/\/www.adminbyrequest.com\/en"},{"label":"Blogs","link":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs"},{"label":"AI in Cybersecurity Arms Both Sides of the Fight","link":"https:\/\/www.adminbyrequest.com\/en\/blogs\/ai-in-cybersecurity-arms-both-sides-of-the-fight"}],"authors":[{"term_id":428,"user_id":16,"is_guest":0,"slug":"pocholo-editor","display_name":"Pocholo Legaspi","avatar_url":{"url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/04\/Pocholo-Headshot.jpg","url2x":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2025\/04\/Pocholo-Headshot.jpg"},"author_category":"1","user_url":"","last_name":"Legaspi","first_name":"Pocholo","job_title":"","description":"Pocholo Legaspi is a seasoned content marketer and SEO specialist with over nine years of experience crafting digital content that drives engagement and growth. With a background in tech and a Master\u2019s in Business Informatics, he brings a data-driven approach to content strategy and storytelling."}],"_links":{"self":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts\/23687","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/comments?post=23687"}],"version-history":[{"count":3,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts\/23687\/revisions"}],"predecessor-version":[{"id":23704,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts\/23687\/revisions\/23704"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/media\/23701"}],"wp:attachment":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/media?parent=23687"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/categories?post=23687"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/tags?post=23687"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/ppma_author?post=23687"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}