{"id":2704,"date":"2024-01-25T17:03:31","date_gmt":"2024-01-25T17:03:31","guid":{"rendered":"https:\/\/cwsisecurity.com\/?p=2704"},"modified":"2025-12-02T13:53:33","modified_gmt":"2025-12-02T13:53:33","slug":"unleashing-the-power-of-ai-for-cyber-security","status":"publish","type":"post","link":"https:\/\/cwsisecurity.com\/nl\/unleashing-the-power-of-ai-for-cyber-security\/","title":{"rendered":"Unleashing the Power of AI for Cyber Security."},"content":{"rendered":"\n<p><strong>By the end of 2024 cyber-crime is predicted to cost the global economy $10.5 trillion.<\/strong><sup data-fn=\"fd8073c0-cced-49c9-ae86-92060cfe5bcc\" class=\"fn\"><a href=\"\/#fd8073c0-cced-49c9-ae86-92060cfe5bcc\" id=\"fd8073c0-cced-49c9-ae86-92060cfe5bcc-link\">1<\/a><\/sup><\/p>\n\n\n\n<div style=\"height:27px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>In the rapidly evolving field of cyber security, it is imperative for organisations to stay ahead of threat actors, ensuring that their defences are up to scratch to protect their digital assets and sensitive data. Within a myriad of new innovations, <a href=\"https:\/\/cwsisecurity.com\/enterprise-ai-adoption\/\" target=\"_blank\" rel=\"noreferrer noopener\">Artificial Intelligence<\/a> is emerging as a beacon of hope, promising to revolutionise the way cyber <a href=\"https:\/\/cwsisecurity.com\/security-and-threat-intelligence\/\" target=\"_blank\" rel=\"noreferrer noopener\">security<\/a> has been approached. According to Forbes <strong>76% of enterprises have prioritised AI machine learning into their IT budgets<\/strong><sup data-fn=\"f73a5431-1e53-48c4-bbbe-f56dfffcc2f4\" class=\"fn\"><a href=\"\/#f73a5431-1e53-48c4-bbbe-f56dfffcc2f4\" id=\"f73a5431-1e53-48c4-bbbe-f56dfffcc2f4-link\">2<\/a><\/sup>, highlighting the industry\u2019s recognition to the powerful potential of AI.<\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div style=\"height:34px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Within this blog, we explore the synergies between cyber security and AI, delving into how AI technologies can empower IT teams to automate and augment critical aspects of cyber security operations.<\/p>\n\n\n\n<p>AI has the potential to unlock new capabilities and opportunities, including the ability to generate natural language insights and recommendations from complex data using Large Language Models (LLMs). This not only enhances the effectiveness of junior analysts more effective but also gives them new learning opportunities.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" src=\"https:\/\/cwsisecurity.com\/wp-content\/uploads\/2024\/01\/Untitled-design-2024-01-04T120130.261.png\" alt=\"\" class=\"wp-image-2465\" style=\"width:365px;height:auto\"\/><\/figure>\n<\/div>\n<\/div>\n\n\n\n<div style=\"height:23px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-large-language-models-llms-explained\">Large Language Models (LLMs) Explained<\/h2>\n\n\n\n<p>Large Language Models (LLMs) have the potential to greatly enhance certain aspects of cyber defence. Below we delve into the intricacies of LLMs and uncover the capabilities they bring to the world of cyber security.<\/p>\n\n\n\n<div style=\"height:21px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#52a6db\" class=\"has-inline-color\">Threat Intelligence and analysis:<\/mark><\/h3>\n\n\n\n<p>LLMs gather and analyse data to identify patterns and trends in cyber threats across your network. They offer recommendations and alerts to your IT team, whilst alleviating the burden on workloads by identifying false positives, enhancing the accuracy of reporting. LLMs add context to <a href=\"https:\/\/cwsisecurity.com\/what-does-a-threat-intelligence-analyst-do\/\" target=\"_blank\" rel=\"noreferrer noopener\">threat intelligence<\/a> by using information from different analysed sources. Additionally, they perform technical tasks like reverse engineering and malware analysis.<\/p>\n\n\n\n<div style=\"height:21px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#52a6db\" class=\"has-inline-color\">Security incident response and recovery:<\/mark><\/h3>\n\n\n\n<p>LLMs contribute to automating response and recovery activities, providing a concise summary of the malicious activity incidents. They help IT teams learn from incidents and provide valuable insights and improved suggestions for prevention and mitigation.<\/p>\n\n\n\n<div style=\"height:21px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#52a6db\" class=\"has-inline-color\">Security monitoring and detection:<\/mark><\/h3>\n\n\n\n<p>LLMs aid IT Teams in monitoring and detecting security events and incidents spanning networks, systems, applications, and data. They possess the capability to analyse data from multiple sources, generate prioritised alerts, and provide contextual information for investigation and response. LLMs offer valuable insights within analysing the posture of multi-cloud environments, where they can create comprehensive maps of resources, estimate potential impacts, and offer risk mitigation suggestions. Furthermore, LLMs provide understanding into phishing detection by analysing email content, links, anomalies, or suspicious language indicative of phishing attempts.<\/p>\n\n\n\n<div style=\"height:21px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#52a6db\" class=\"has-inline-color\">Security testing and validation:<\/mark><\/h3>\n\n\n\n<p>LLMs have the capability to automate and enhance security testing and validation activities such as penetration testing, vulnerability scanning, code analysis, and configuration auditing. They generate and execute test cases, evaluate and report results, and offer remediation suggestions. LLMs can create custom apps and tools for specific scenarios, automate repetitive tasks, and handle occasional or ad hoc tasks that require manual intervention.<\/p>\n\n\n\n<div style=\"height:21px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#52a6db\" class=\"has-inline-color\">Security awareness and education:<\/mark><\/h3>\n\n\n\n<p>LLMs contribute to employee education and mitigate insider threats. They can generate realistic phishing emails to simulate attacks and access your organisations susceptibility to phishing threats.<\/p>\n\n\n\n<div style=\"height:21px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#52a6db\" class=\"has-inline-color\">Security governance, risk and compliance (GRC):<\/mark><\/h3>\n\n\n\n<p>LLMs play a pivotal role in automating <a href=\"https:\/\/cwsisecurity.com\/governance-risk-and-compliance\/\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#52a6db\" class=\"has-inline-color\">security governance, risk, and compliance (GRC)<\/mark><\/a> activities including policy development and enforcement, risk assessment\/ management, audit and assurance, and compliance and reporting.<\/p>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>In the current digital landscape, LLMs are emerging with significant importance , with these models representing not just a technological advancement but as an essential pillar in our defense against the relentless tide of cyber threats. As we continue to see the rise of AI every organisation must take care to implement it responsibly and ethically. Watch our webinar on \u2018<strong><a href=\"https:\/\/youtu.be\/AcgTjrGGhvI?si=1wQlRDoEb0MEEjug\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#52a6db\" class=\"has-inline-color\">Preparing for Generative AI<\/mark><\/a><\/strong>\u2019, where CWSI Client Solutions Director, Paul Conaty and Microsoft Enterprise Modern Workplace Specialist, Mirna Atef Youssef delve into the capabilities of Microsoft CoPilot as well as addressing the risks of adopting AI and how to mitigate these.<\/p>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"Webinar | Preparing Your Organisation for Generative AI\" width=\"640\" height=\"360\" src=\"https:\/\/www.youtube.com\/embed\/AcgTjrGGhvI?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n<ol class=\"wp-block-footnotes\"><li id=\"fd8073c0-cced-49c9-ae86-92060cfe5bcc\"><a href=\"https:\/\/www.forbes.com\/sites\/bernardmarr\/2023\/10\/11\/the-10-biggest-cyber-security-trends-in-2024-everyone-must-be-ready-for-now\/\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#52a6db\" class=\"has-inline-color\">The 10 Biggest Cyber Security Trends In 2024 Everyone Must Be Ready For Now (forbes.com)<\/mark><\/a> <a href=\"#fd8073c0-cced-49c9-ae86-92060cfe5bcc-link\" aria-label=\"Ga naar voetnoot referentie 1\">\u21a9\ufe0e<\/a><\/li><li id=\"f73a5431-1e53-48c4-bbbe-f56dfffcc2f4\"><a href=\"https:\/\/www.forbes.com\/sites\/forbestechcouncil\/2023\/03\/15\/how-ai-is-disrupting-and-transforming-the-cybersecurity-landscape\/\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#52a6db\" class=\"has-inline-color\">How AI Is Disrupting And Transforming The Cybersecurity Landscape (forbes.com)<\/mark><\/a> <a href=\"#f73a5431-1e53-48c4-bbbe-f56dfffcc2f4-link\" aria-label=\"Ga naar voetnoot referentie 2\">\u21a9\ufe0e<\/a><\/li><\/ol>\n\n\n<p>Content originated from the <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/security-insider\/microsoft-digital-defense-report-2023\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#52a6db\" class=\"has-inline-color\">Microsoft 2023 Digital Defence Report<\/mark><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>By the end of 2024 cyber-crime is predicted to cost the global economy $10.5 trillion. In the rapidly evolving field of cyber security, it is imperative for organisations to stay ahead of threat actors, ensuring that their defences are up to scratch to protect their digital assets and sensitive data. Within a myriad of new [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":497,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":"[{\"content\":\"<a href=\\\"https:\/\/www.forbes.com\/sites\/bernardmarr\/2023\/10\/11\/the-10-biggest-cyber-security-trends-in-2024-everyone-must-be-ready-for-now\/\\\"><mark style=\\\"background-color:rgba(0, 0, 0, 0);color:#52a6db\\\" class=\\\"has-inline-color\\\">The 10 Biggest Cyber Security Trends In 2024 Everyone Must Be Ready For Now (forbes.com)<\/mark><\/a>\",\"id\":\"fd8073c0-cced-49c9-ae86-92060cfe5bcc\"},{\"content\":\"<a href=\\\"https:\/\/www.forbes.com\/sites\/forbestechcouncil\/2023\/03\/15\/how-ai-is-disrupting-and-transforming-the-cybersecurity-landscape\/\\\"><mark style=\\\"background-color:rgba(0, 0, 0, 0);color:#52a6db\\\" class=\\\"has-inline-color\\\">How AI Is Disrupting And Transforming The Cybersecurity Landscape (forbes.com)<\/mark><\/a>\",\"id\":\"f73a5431-1e53-48c4-bbbe-f56dfffcc2f4\"}]"},"categories":[93,4,1,9],"tags":[],"class_list":["post-2704","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-insights","category-our-voice","category-uncategorised","category-video"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Unleashing the Power of AI for Cyber Security. - CWSI<\/title>\n<meta name=\"description\" content=\"Within this blog, we explore the synergies between cyber security and AI, delving into how AI technologies can empower IT teams.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cwsisecurity.com\/nl\/unleashing-the-power-of-ai-for-cyber-security\/\" \/>\n<meta property=\"og:locale\" content=\"nl_NL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Unleashing the Power of AI for Cyber Security.\" \/>\n<meta property=\"og:description\" content=\"Security made human. Compliance made simple. Protect your business without slowing it down.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cwsisecurity.com\/nl\/unleashing-the-power-of-ai-for-cyber-security\/\" \/>\n<meta property=\"og:site_name\" content=\"CWSI\" \/>\n<meta property=\"article:published_time\" content=\"2024-01-25T17:03:31+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-02T13:53:33+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Geschreven door\" \/>\n\t<meta name=\"twitter:data1\" content=\"fluroltd\" \/>\n\t<meta name=\"twitter:label2\" content=\"Geschatte leestijd\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/unleashing-the-power-of-ai-for-cyber-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/unleashing-the-power-of-ai-for-cyber-security\\\/\"},\"headline\":\"Unleashing the Power of AI for Cyber Security.\",\"datePublished\":\"2024-01-25T17:03:31+00:00\",\"dateModified\":\"2025-12-02T13:53:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/unleashing-the-power-of-ai-for-cyber-security\\\/\"},\"wordCount\":669,\"publisher\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/unleashing-the-power-of-ai-for-cyber-security\\\/#primaryimage\"},\"thumbnailUrl\":\"\",\"articleSection\":[\"Insights\",\"Our Voice\",\"Uncategorised\",\"Video\"],\"inLanguage\":\"nl-NL\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/unleashing-the-power-of-ai-for-cyber-security\\\/\",\"url\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/unleashing-the-power-of-ai-for-cyber-security\\\/\",\"name\":\"Unleashing the Power of AI for Cyber Security. - CWSI\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/unleashing-the-power-of-ai-for-cyber-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/unleashing-the-power-of-ai-for-cyber-security\\\/#primaryimage\"},\"thumbnailUrl\":\"\",\"datePublished\":\"2024-01-25T17:03:31+00:00\",\"dateModified\":\"2025-12-02T13:53:33+00:00\",\"description\":\"Within this blog, we explore the synergies between cyber security and AI, delving into how AI technologies can empower IT teams.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/unleashing-the-power-of-ai-for-cyber-security\\\/#breadcrumb\"},\"inLanguage\":\"nl-NL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/unleashing-the-power-of-ai-for-cyber-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/unleashing-the-power-of-ai-for-cyber-security\\\/#primaryimage\",\"url\":\"\",\"contentUrl\":\"\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/unleashing-the-power-of-ai-for-cyber-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Unleashing the Power of AI for Cyber Security.\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#website\",\"url\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/\",\"name\":\"CWSI\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"nl-NL\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#organization\",\"name\":\"CWSI\",\"url\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cwsisecurity.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/cwsi-logo-1.svg\",\"contentUrl\":\"https:\\\/\\\/cwsisecurity.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/cwsi-logo-1.svg\",\"width\":125,\"height\":30,\"caption\":\"CWSI\"},\"image\":{\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/cwsi\\\/\",\"https:\\\/\\\/www.youtube.com\\\/@cwsimobileandcloudsecurity361\"],\"description\":\"Security made human. Compliance made simple. Protect your business without slowing it down.\",\"email\":\"info.uk@cwsisecurity.com\",\"telephone\":\"+44 1189 344 300\",\"legalName\":\"CWSI Security\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"51\",\"maxValue\":\"200\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/cwsisecurity.com\\\/nl\\\/#\\\/schema\\\/person\\\/870becf0b1e6869361f9510f90f8ce2a\",\"name\":\"fluroltd\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0492477e307cc28ed8761cab1677dce42cc40ae7f2916d59342459994fc75bc6?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0492477e307cc28ed8761cab1677dce42cc40ae7f2916d59342459994fc75bc6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0492477e307cc28ed8761cab1677dce42cc40ae7f2916d59342459994fc75bc6?s=96&d=mm&r=g\",\"caption\":\"fluroltd\"},\"sameAs\":[\"https:\\\/\\\/cwsisecurity.com\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Unleashing the Power of AI for Cyber Security. - CWSI","description":"Within this blog, we explore the synergies between cyber security and AI, delving into how AI technologies can empower IT teams.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cwsisecurity.com\/nl\/unleashing-the-power-of-ai-for-cyber-security\/","og_locale":"nl_NL","og_type":"article","og_title":"Unleashing the Power of AI for Cyber Security.","og_description":"Security made human. Compliance made simple. Protect your business without slowing it down.","og_url":"https:\/\/cwsisecurity.com\/nl\/unleashing-the-power-of-ai-for-cyber-security\/","og_site_name":"CWSI","article_published_time":"2024-01-25T17:03:31+00:00","article_modified_time":"2025-12-02T13:53:33+00:00","twitter_card":"summary_large_image","twitter_misc":{"Geschreven door":"fluroltd","Geschatte leestijd":"4 minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cwsisecurity.com\/nl\/unleashing-the-power-of-ai-for-cyber-security\/#article","isPartOf":{"@id":"https:\/\/cwsisecurity.com\/nl\/unleashing-the-power-of-ai-for-cyber-security\/"},"headline":"Unleashing the Power of AI for Cyber Security.","datePublished":"2024-01-25T17:03:31+00:00","dateModified":"2025-12-02T13:53:33+00:00","mainEntityOfPage":{"@id":"https:\/\/cwsisecurity.com\/nl\/unleashing-the-power-of-ai-for-cyber-security\/"},"wordCount":669,"publisher":{"@id":"https:\/\/cwsisecurity.com\/nl\/#organization"},"image":{"@id":"https:\/\/cwsisecurity.com\/nl\/unleashing-the-power-of-ai-for-cyber-security\/#primaryimage"},"thumbnailUrl":"","articleSection":["Insights","Our Voice","Uncategorised","Video"],"inLanguage":"nl-NL"},{"@type":"WebPage","@id":"https:\/\/cwsisecurity.com\/nl\/unleashing-the-power-of-ai-for-cyber-security\/","url":"https:\/\/cwsisecurity.com\/nl\/unleashing-the-power-of-ai-for-cyber-security\/","name":"Unleashing the Power of AI for Cyber Security. - CWSI","isPartOf":{"@id":"https:\/\/cwsisecurity.com\/nl\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cwsisecurity.com\/nl\/unleashing-the-power-of-ai-for-cyber-security\/#primaryimage"},"image":{"@id":"https:\/\/cwsisecurity.com\/nl\/unleashing-the-power-of-ai-for-cyber-security\/#primaryimage"},"thumbnailUrl":"","datePublished":"2024-01-25T17:03:31+00:00","dateModified":"2025-12-02T13:53:33+00:00","description":"Within this blog, we explore the synergies between cyber security and AI, delving into how AI technologies can empower IT teams.","breadcrumb":{"@id":"https:\/\/cwsisecurity.com\/nl\/unleashing-the-power-of-ai-for-cyber-security\/#breadcrumb"},"inLanguage":"nl-NL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cwsisecurity.com\/nl\/unleashing-the-power-of-ai-for-cyber-security\/"]}]},{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/cwsisecurity.com\/nl\/unleashing-the-power-of-ai-for-cyber-security\/#primaryimage","url":"","contentUrl":""},{"@type":"BreadcrumbList","@id":"https:\/\/cwsisecurity.com\/nl\/unleashing-the-power-of-ai-for-cyber-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cwsisecurity.com\/nl\/"},{"@type":"ListItem","position":2,"name":"Unleashing the Power of AI for Cyber Security."}]},{"@type":"WebSite","@id":"https:\/\/cwsisecurity.com\/nl\/#website","url":"https:\/\/cwsisecurity.com\/nl\/","name":"CWSI","description":"","publisher":{"@id":"https:\/\/cwsisecurity.com\/nl\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cwsisecurity.com\/nl\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"nl-NL"},{"@type":"Organization","@id":"https:\/\/cwsisecurity.com\/nl\/#organization","name":"CWSI","url":"https:\/\/cwsisecurity.com\/nl\/","logo":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/cwsisecurity.com\/nl\/#\/schema\/logo\/image\/","url":"https:\/\/cwsisecurity.com\/wp-content\/uploads\/2026\/03\/cwsi-logo-1.svg","contentUrl":"https:\/\/cwsisecurity.com\/wp-content\/uploads\/2026\/03\/cwsi-logo-1.svg","width":125,"height":30,"caption":"CWSI"},"image":{"@id":"https:\/\/cwsisecurity.com\/nl\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/cwsi\/","https:\/\/www.youtube.com\/@cwsimobileandcloudsecurity361"],"description":"Security made human. Compliance made simple. Protect your business without slowing it down.","email":"info.uk@cwsisecurity.com","telephone":"+44 1189 344 300","legalName":"CWSI Security","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"51","maxValue":"200"}},{"@type":"Person","@id":"https:\/\/cwsisecurity.com\/nl\/#\/schema\/person\/870becf0b1e6869361f9510f90f8ce2a","name":"fluroltd","image":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/secure.gravatar.com\/avatar\/0492477e307cc28ed8761cab1677dce42cc40ae7f2916d59342459994fc75bc6?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/0492477e307cc28ed8761cab1677dce42cc40ae7f2916d59342459994fc75bc6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0492477e307cc28ed8761cab1677dce42cc40ae7f2916d59342459994fc75bc6?s=96&d=mm&r=g","caption":"fluroltd"},"sameAs":["https:\/\/cwsisecurity.com"]}]}},"_links":{"self":[{"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/posts\/2704","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/comments?post=2704"}],"version-history":[{"count":0,"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/posts\/2704\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/media?parent=2704"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/categories?post=2704"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cwsisecurity.com\/nl\/wp-json\/wp\/v2\/tags?post=2704"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}