{"id":69424,"date":"2024-10-17T07:00:00","date_gmt":"2024-10-17T14:00:00","guid":{"rendered":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/?p=69424"},"modified":"2024-11-05T08:28:12","modified_gmt":"2024-11-05T16:28:12","slug":"embracing-ai-to-defend-against-cyberthreats","status":"publish","type":"post","link":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/security\/2024\/10\/17\/embracing-ai-to-defend-against-cyberthreats\/","title":{"rendered":"Embracing AI to defend against cyberthreats"},"content":{"rendered":"\n<p>In today\u2019s rapidly evolving digital world, AI is no longer a futuristic concept\u2014it\u2019s transforming industries right now. As industries and organizations worldwide accelerate their AI adoption, businesses are realizing productivity and efficiency gains that can fuel new growth and innovation. Securing the future of AI means acknowledging the dual nature of this technology: it brings new capabilities as well as new vulnerabilities, particularly for data&nbsp;security.&nbsp;<\/p>\n\n\n\n<p>As cyberattacks become more advanced, how can industries minimize risk while reaping the benefits of generative AI? It has never been more important to deploy and use AI securely. New security capabilities are helping businesses identify and defend against threats more quickly. Implementing these AI-driven security measures not only safeguards your data but also enhances customer trust and can drive business&nbsp;growth.&nbsp;<\/p>\n\n\n\n<p>A holistic security strategy based on the principles of responsible AI can accelerate your organization\u2019s digital transformation. Microsoft is committed to the advancement of AI driven by <a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/ai\/responsible-ai?ef_id=_k_b2a9903692941f081d8df6ecbd406ffc_k_&amp;OCID=AIDcmm1o1fzy5i_SEM__k_b2a9903692941f081d8df6ecbd406ffc_k_&amp;msclkid=b2a9903692941f081d8df6ecbd406ffc\" target=\"_blank\" rel=\"noreferrer noopener\">ethical principles<\/a> so businesses can implement best practices to augment existing workflows and still achieve a stronger overall security&nbsp;posture.&nbsp;<\/p>\n\n\n\n<p>As you embrace new security technologies and opportunities, consider the following aspects of AI and&nbsp;cybersecurity:&nbsp;<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"empowering-security-teams-with-ai\"><\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li><h4><a href=\"#bl1\">Navigating new cybersecurity challenges with comprehensive&nbsp;security<\/a><\/h4><\/li>\n\n\n\n<li><h4><a href=\"#bl2\">Using AI tools to stay ahead of evolving security&nbsp;risks<\/a><\/h4><\/li>\n\n\n\n<li><h4><a href=\"#bl3\">Augmenting security fundamentals with&nbsp;AI<\/a><\/h4><\/li>\n\n\n\n<li><h4><a href=\"#bl4\">Empowering security teams with&nbsp;AI<\/a><\/h4><\/li>\n<\/ul>\n\n\n\n<p><br><\/p>\n\n\n\n<div class=\"wp-block-media-text is-stacked-on-mobile is-image-fill has-white-color has-black-background-color has-text-color has-background\" style=\"grid-template-columns:38% auto\" id=\"bl1\"><figure class=\"wp-block-media-text__media\" style=\"background-image:url(https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/wp-content\/uploads\/sites\/28\/2024\/10\/SEC20_Security_006-1024x683.jpg);background-position:100% 44%\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/wp-content\/uploads\/sites\/28\/2024\/10\/SEC20_Security_006-1024x683.jpg\" alt=\"Worker with glasses sitting at a community table in common area reading on a laptop with other devices nearby.  \" class=\"wp-image-69427 size-full\" srcset=\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/wp-content\/uploads\/sites\/28\/2024\/10\/SEC20_Security_006-1024x683.jpg 1024w, https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/wp-content\/uploads\/sites\/28\/2024\/10\/SEC20_Security_006-300x200.jpg 300w, https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/wp-content\/uploads\/sites\/28\/2024\/10\/SEC20_Security_006-768x512.jpg 768w, https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/wp-content\/uploads\/sites\/28\/2024\/10\/SEC20_Security_006-1536x1024.jpg 1536w, https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/wp-content\/uploads\/sites\/28\/2024\/10\/SEC20_Security_006-2048x1366.jpg 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<h2 class=\"wp-block-heading\" id=\"navigating-new-cybersecurity-challenges-with-comprehensive-security-1\">Navigating new cybersecurity challenges with comprehensive security<\/h2>\n<\/div><\/div>\n\n\n\n<p><br>As AI reshapes the business environment, it is also changing the tactics and capabilities of malicious actors, creating an ever-evolving cyberthreat landscape. &nbsp;Adopting a security stack that manages, protects, and governs data, identities, endpoints, and cloud assets empowers businesses to deploy AI capabilities safely. Unlocking access to data with generative AI or other AI-powered tools must be done with care to help protect sensitive information from potential leaks or unauthorized access. Organizations in financial services, government, healthcare industries, and others face strict privacy and compliance regulations, with significant implications for AI-related security&nbsp;breaches.&nbsp;<\/p>\n\n\n\n<p>Fintech company <a href=\"https:\/\/customers.microsoft.com\/en-us\/story\/1747047183590598802-saphyre-azure-banking-and-capital-markets-en-united-states\" target=\"_blank\" rel=\"noreferrer noopener\">Saphyre<\/a> reduced manual processes by 75% when it used Microsoft Azure to create a cloud-based solution for investment firms and service providers seeking to perform trades efficiently. To strengthen its security posture and protect both financial institutions and clients, Saphyre relies on a comprehensive approach that uses Microsoft security solutions to safeguard data and manage their endpoint&nbsp;security.&nbsp;<\/p>\n\n\n\n<p>By sharing data more securely, clients can be ready to trade three to five times faster compared to manual onboarding, increasing revenue opportunities by completing trades more quickly and at better prices. \u201cIn addition to Azure, we layered on Microsoft security products,\u201d says Michael Brandi, Chief Information Officer of Saphyre. \u201cThese technologies help Saphyre serve global enterprises with a small&nbsp;team.\u201d&nbsp;<\/p>\n\n\n\n<p>For industries ready to accelerate their digital transformation, AI security solutions empower businesses with trust, transparency, and strong built-in security features. Every day, Microsoft synthesizes more than 78 trillion signals, using data analytics and AI to understand and help protect against digital threats, according to the <a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/security\/security-insider\/intelligence-reports\/microsoft-digital-defense-report-2024\" target=\"_blank\" rel=\"noreferrer noopener\">2024 Microsoft Digital Defense Report<\/a>. A robust security strategy can help your organization drive innovation and creativity with AI-powered capabilities while protecting your sensitive&nbsp;information.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"read-more-about-balancing-innovation-and-security\">Read more about balancing innovation and&nbsp;security&nbsp;<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Read how <a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/security\/blog\/2024\/04\/11\/how-microsoft-discovers-and-mitigates-evolving-attacks-against-ai-guardrails\/\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft discovers and mitigates evolving attacks against AI&nbsp;guardrails<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Get tips for <a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/security\/blog\/2024\/02\/14\/staying-ahead-of-threat-actors-in-the-age-of-ai\/\" target=\"_blank\" rel=\"noreferrer noopener\">staying ahead of threat actors using&nbsp;AI<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Learn how to <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/security-compliance-and-identity\/secure-your-ai-transformation-with-microsoft-security\/ba-p\/4126214\" target=\"_blank\" rel=\"noreferrer noopener\">prepare a secure foundation for AI&nbsp;adoption<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<p><br><\/p>\n\n\n\n<div class=\"wp-block-media-text has-media-on-the-right is-stacked-on-mobile is-image-fill has-white-color has-black-background-color has-text-color has-background\" style=\"grid-template-columns:auto 38%\" id=\"bl2\"><div class=\"wp-block-media-text__content\">\n<h2 class=\"wp-block-heading\" id=\"using-ai-tools-to-stay-ahead-of-evolving-security-risks-1\">Using AI tools to stay ahead of evolving security&nbsp;risks<\/h2>\n<\/div><figure class=\"wp-block-media-text__media\" style=\"background-image:url(https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/wp-content\/uploads\/sites\/28\/2024\/10\/SEC20_Security_029-1024x707.jpg);background-position:52% 32%\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"707\" src=\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/wp-content\/uploads\/sites\/28\/2024\/10\/SEC20_Security_029-1024x707.jpg\" alt=\"SEC20_Security_029\" class=\"wp-image-69428 size-full\" srcset=\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/wp-content\/uploads\/sites\/28\/2024\/10\/SEC20_Security_029-1024x707.jpg 1024w, https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/wp-content\/uploads\/sites\/28\/2024\/10\/SEC20_Security_029-300x207.jpg 300w, https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/wp-content\/uploads\/sites\/28\/2024\/10\/SEC20_Security_029-768x530.jpg 768w, https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/wp-content\/uploads\/sites\/28\/2024\/10\/SEC20_Security_029-1536x1060.jpg 1536w, https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/wp-content\/uploads\/sites\/28\/2024\/10\/SEC20_Security_029-2048x1413.jpg 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n\n<p><br>Security solutions that use AI defend against cyberthreats in several ways. Using AI-powered security solutions can speed up risk detection, help in blocking malicious access, and expand continuous monitoring at massive scales. With <a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/worklab\/work-trend-index\/copilots-earliest-users-teach-us-about-generative-ai-at-work\" target=\"_blank\" rel=\"noreferrer noopener\">3 million unfilled positions<\/a> worldwide, it is critical to have these capabilities bridge the skills gap in the cybersecurity&nbsp;workforce.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/security\/business\/ai-machine-learning\/microsoft-copilot-security\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Copilot for Security<\/a> is a generative AI\u2013powered assistant that helps protect your digital infrastructure at the speed and scale of AI. With Copilot for Security, organizations can gain key insights from large datasets, get critical guidance to security teams quickly, and receive practical tips for common security tasks in seconds. One <a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/worklab\/work-trend-index\/copilots-earliest-users-teach-us-about-generative-ai-at-work\" target=\"_blank\" rel=\"noreferrer noopener\">study<\/a> showed that new-in-career security analysts who used Copilot for Security were 44% more accurate and 26% faster across all tasks. Of those surveyed, 86% reported that it helped them improve the quality of their&nbsp;work.&nbsp;<\/p>\n\n\n\n<p>Businesses that adopt AI-powered security solutions are realizing the benefits of accelerated upskilling, step-by-step guidance for response, and faster threat remediation. Specialty materials manufacturer <a href=\"https:\/\/ms-f1-sites-03-ea.azurewebsites.net\/en-us\/story\/1802842951607118817-eastman-microsoft-defender-other-en-united-states\" target=\"_blank\" rel=\"noreferrer noopener\">Eastman<\/a> has a vast global network of contacts that drive its business, creating a significant attack surface for malicious actors. Incorporating Copilot for Security into the company\u2019s comprehensive security architecture helps junior analysts upskill more quickly and allows security teams to rapidly respond to potential&nbsp;threats.&nbsp;<\/p>\n\n\n\n<p>\u201cI enjoy the passion I see ignited in our teams,\u201d says Adam Keown, Chief Information Security Officer of Eastman. \u201cThat means a more productive, effective team. The speed at which we\u2019re able to use Copilot for Security to pull threat information across time zones and extensive geographies is a huge&nbsp;advantage.\u201d&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"explore-more-about-using-ai-for-proactive-security\">Explore more about using AI for proactive&nbsp;security&nbsp;<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Discover what tips Copilot users have for <a href=\"https:\/\/info.microsoft.com\/ww-thankyou-top-ten-prompts-for-copilot-for-security-blog.html?lcid=EN-US\" target=\"_blank\" rel=\"noreferrer noopener\">using generative AI at&nbsp;work<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Learn about <a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/security\/blog\/2024\/02\/14\/cyber-signals-navigating-cyberthreats-and-strengthening-defenses-in-the-era-of-ai\/\" target=\"_blank\" rel=\"noreferrer noopener\">strengthening defenses in the era of&nbsp;AI<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Explore the <a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/security\/blog\/2023\/11\/15\/microsoft-unveils-expansion-of-ai-for-security-and-security-for-ai-at-microsoft-ignite\/\" target=\"_blank\" rel=\"noreferrer noopener\">future of security<\/a> with Microsoft&nbsp;solutions&nbsp;<\/li>\n<\/ul>\n\n\n\n<p><br><\/p>\n\n\n\n<div class=\"wp-block-media-text is-stacked-on-mobile is-image-fill has-white-color has-black-background-color has-text-color has-background\" style=\"grid-template-columns:38% auto\" id=\"bl3\"><figure class=\"wp-block-media-text__media\" style=\"background-image:url(https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/wp-content\/uploads\/sites\/28\/2024\/10\/SEC20_Security_024-1024x683.jpg);background-position:56% 42%\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/wp-content\/uploads\/sites\/28\/2024\/10\/SEC20_Security_024-1024x683.jpg\" alt=\"\" class=\"wp-image-69430 size-full\" srcset=\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/wp-content\/uploads\/sites\/28\/2024\/10\/SEC20_Security_024-1024x683.jpg 1024w, https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/wp-content\/uploads\/sites\/28\/2024\/10\/SEC20_Security_024-300x200.jpg 300w, https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/wp-content\/uploads\/sites\/28\/2024\/10\/SEC20_Security_024-768x512.jpg 768w, https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/wp-content\/uploads\/sites\/28\/2024\/10\/SEC20_Security_024-1536x1025.jpg 1536w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<h2 class=\"wp-block-heading\" id=\"back-to-security-fundamentals-with-ai-1\">Back to security fundamentals with&nbsp;AI<\/h2>\n<\/div><\/div>\n\n\n\n<p><br>Although AI presents novel risks, understanding and applying updated security best practices is still critical to data protection. The steps you\u2019re taking to enhance data security can work alongside the new AI technologies that you adopt. For example, multifactor authentication and Zero Trust principles can reduce instances of unauthorized access and limit the impact of attacks by requiring explicit verification and using least-privilege&nbsp;access.&nbsp;<\/p>\n\n\n\n<p>Responsible AI practices are driven by underlying <a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/ai\/principles-and-approach\/\" target=\"_blank\" rel=\"noreferrer noopener\">ethical principles<\/a> to promote trust in how the capabilities are used. Security teams must approach AI with a full understanding of its benefits and limitations. Microsoft solutions that incorporate AI have built-in transparency, so organizations can understand how they work to help protect user data. Thus, teams can focus on defending against attacks, avoiding leaks, and guarding sensitive data. Organizations that incorporate <a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/security\/business\/microsoft-purview\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Purview<\/a> into their security stack can govern their entire data estate while meeting compliance&nbsp;regulations.&nbsp;<\/p>\n\n\n\n<p>One of Peru\u2019s leading insurance companies, Pac\u00edfico Seguros, <a href=\"https:\/\/customers.microsoft.com\/en-us\/story\/1761512190744606726-pacifico-microsoft-365-insurance-en-peru\" target=\"_blank\" rel=\"noreferrer noopener\">designed<\/a> a holistic security architecture where all security components operate together to increase cybersecurity. The company\u2019s strategy is based on the six core pillars of <a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/security\/business\/zero-trust\" target=\"_blank\" rel=\"noreferrer noopener\">Zero Trust<\/a>, and its combination of Microsoft security products has reduced low latency incidents related to security technology by&nbsp;95%.&nbsp;<\/p>\n\n\n\n<p>By adopting a strategic security outlook, Pac\u00edfico Seguros has become a leading expert for cybersecurity in the region. \u201cThis isn\u2019t a journey with a beginning and an end, but a radical mindset change,\u201d says Jos\u00e9 Carlos Vargas, IT Security Manager at Pac\u00edfico&nbsp;Seguros.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"learn-more-about-secure-implementation-of-ai\">Learn more about secure implementation of&nbsp;AI&nbsp;<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Learn how to <a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/security\/blog\/2024\/07\/30\/new-microsoft-whitepaper-shares-how-to-prepare-your-data-for-secure-ai-adoption\/\" target=\"_blank\" rel=\"noreferrer noopener\">prepare your data for secure AI&nbsp;adoption<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Get the latest tips for <a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/security\/blog\/2024\/01\/10\/5-ways-to-secure-identity-and-access-for-2024\/\" target=\"_blank\" rel=\"noreferrer noopener\">securing identity and&nbsp;access<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Discover new capabilities from <a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/security\/blog\/2024\/05\/06\/new-capabilities-to-help-you-secure-your-ai-transformation\/\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft solutions for secure AI&nbsp;use<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<p><br><\/p>\n\n\n\n<div class=\"wp-block-media-text has-media-on-the-right is-stacked-on-mobile is-image-fill has-white-color has-black-background-color has-text-color has-background\" style=\"grid-template-columns:auto 38%\" id=\"bl4\"><div class=\"wp-block-media-text__content\">\n<h2 class=\"wp-block-heading\" id=\"empowering-security-teams-with-ai-1\">Empowering security teams with&nbsp;AI<\/h2>\n<\/div><figure class=\"wp-block-media-text__media\" style=\"background-image:url(https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/wp-content\/uploads\/sites\/28\/2024\/10\/SEC20_Security_041-1024x683.jpg);background-position:100% 43%\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/wp-content\/uploads\/sites\/28\/2024\/10\/SEC20_Security_041-1024x683.jpg\" alt=\"IT team member inside a secure room looking at data displayed on a large monitor behind glass walls with reflections.\" class=\"wp-image-69426 size-full\" srcset=\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/wp-content\/uploads\/sites\/28\/2024\/10\/SEC20_Security_041-1024x683.jpg 1024w, https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/wp-content\/uploads\/sites\/28\/2024\/10\/SEC20_Security_041-300x200.jpg 300w, https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/wp-content\/uploads\/sites\/28\/2024\/10\/SEC20_Security_041-768x512.jpg 768w, https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/wp-content\/uploads\/sites\/28\/2024\/10\/SEC20_Security_041-1536x1025.jpg 1536w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n\n<p><br>Innovative technologies such as AI might present new vulnerabilities, but they also provide revolutionary tools to help protect against threats. You can empower your security team with AI to guard users\u2019 data in this rapidly changing security&nbsp;landscape.&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>To learn more about using AI-powered solutions from Microsoft to strengthen your organization\u2019s security posture, check out <a href=\"https:\/\/msevents.microsoft.com\/event?id=822908398&amp;wt.mc_id=AID3070718_QSG_SCL_656469\" target=\"_blank\" rel=\"noreferrer noopener\">Build a Security-First Culture in the Era of AI<\/a><\/li>\n\n\n\n<li>You can also keep <a href=\"https:\/\/newed.any0.dpdns.org\/en-us\/security\/blog\/\" target=\"_blank\" rel=\"noreferrer noopener\">reading about AI security practices here<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>In today\u2019s rapidly evolving digital world, AI is no longer a futuristic concept\u2014it\u2019s transforming industries right now. As industries and organizations worldwide accelerate their AI adoption, businesses are realizing productivity and efficiency gains that can fuel new growth and innovation.<\/p>\n","protected":false},"author":771,"featured_media":69432,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ep_exclude_from_search":false,"_classifai_error":"","_classifai_text_to_speech_error":"","footnotes":""},"categories":[1542],"post_tag":[1662,75],"content-type":[1079],"coauthors":[790],"class_list":["post-69424","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","tag-ai","tag-cybersecurity","content-type-thought-leadership","review-flag-ai-dr-1722376295-71","review-flag-ai-dr-1722376028-338"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Embracing AI to defend against cyberthreats - Microsoft in Business Blogs<\/title>\n<meta name=\"description\" content=\"Learn how AI-powered security solutions can help protect user data from rapidly evolving threats in this Microsoft in Business blog.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/security\/2024\/10\/17\/embracing-ai-to-defend-against-cyberthreats\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Embracing AI to defend against cyberthreats\" \/>\n<meta property=\"og:description\" content=\"Unregulated AI poses new cybersecurity risks, but companies are using AI-powered Microsoft solutions to prevent attacks and help protect user data from evolving vulnerabilities.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/security\/2024\/10\/17\/embracing-ai-to-defend-against-cyberthreats\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft in Business Blogs\" \/>\n<meta property=\"article:published_time\" content=\"2024-10-17T14:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-05T16:28:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/wp-content\/uploads\/sites\/28\/2024\/10\/8693_16x9_Security-Hero-FY25.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Microsoft in Business Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Embracing AI to defend against cyberthreats\" \/>\n<meta name=\"twitter:description\" content=\"Unregulated AI poses new cybersecurity risks, but companies are using AI-powered Microsoft solutions to prevent attacks and help protect user data from evolving vulnerabilities.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/wp-content\/uploads\/sites\/28\/2024\/10\/8693_16x9_Security-Hero-FY25.png\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Microsoft in Business Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 min read\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/security\/2024\/10\/17\/embracing-ai-to-defend-against-cyberthreats\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/security\/2024\/10\/17\/embracing-ai-to-defend-against-cyberthreats\/\"},\"author\":[{\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/author\/microsoft-in-business-team\/\",\"@type\":\"Person\",\"@name\":\"Microsoft in Business Team\"}],\"headline\":\"Embracing AI to defend against cyberthreats\",\"datePublished\":\"2024-10-17T14:00:00+00:00\",\"dateModified\":\"2024-11-05T16:28:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/security\/2024\/10\/17\/embracing-ai-to-defend-against-cyberthreats\/\"},\"wordCount\":1302,\"publisher\":{\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/#organization\"},\"image\":{\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/security\/2024\/10\/17\/embracing-ai-to-defend-against-cyberthreats\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/wp-content\/uploads\/sites\/28\/2024\/10\/MSC24-ASEAN-developer-Getty-1469706471-rgb-scaled.jpg\",\"keywords\":[\"AI\",\"Cybersecurity\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/security\/2024\/10\/17\/embracing-ai-to-defend-against-cyberthreats\/\",\"url\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/security\/2024\/10\/17\/embracing-ai-to-defend-against-cyberthreats\/\",\"name\":\"Embracing AI to defend against cyberthreats - Microsoft in Business Blogs\",\"isPartOf\":{\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/security\/2024\/10\/17\/embracing-ai-to-defend-against-cyberthreats\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/security\/2024\/10\/17\/embracing-ai-to-defend-against-cyberthreats\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/wp-content\/uploads\/sites\/28\/2024\/10\/MSC24-ASEAN-developer-Getty-1469706471-rgb-scaled.jpg\",\"datePublished\":\"2024-10-17T14:00:00+00:00\",\"dateModified\":\"2024-11-05T16:28:12+00:00\",\"description\":\"Learn how AI-powered security solutions can help protect user data from rapidly evolving threats in this Microsoft in Business blog.\",\"breadcrumb\":{\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/security\/2024\/10\/17\/embracing-ai-to-defend-against-cyberthreats\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/security\/2024\/10\/17\/embracing-ai-to-defend-against-cyberthreats\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/security\/2024\/10\/17\/embracing-ai-to-defend-against-cyberthreats\/#primaryimage\",\"url\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/wp-content\/uploads\/sites\/28\/2024\/10\/MSC24-ASEAN-developer-Getty-1469706471-rgb-scaled.jpg\",\"contentUrl\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/wp-content\/uploads\/sites\/28\/2024\/10\/MSC24-ASEAN-developer-Getty-1469706471-rgb-scaled.jpg\",\"width\":2560,\"height\":1707,\"caption\":\"Computer coding, programming and asian man in cybersecurity, software development and html script. Night person from china with information technology career, database code and monitor network safety\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/security\/2024\/10\/17\/embracing-ai-to-defend-against-cyberthreats\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Embracing AI to defend against cyberthreats\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/#website\",\"url\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/\",\"name\":\"Microsoft in Business Blogs\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/#organization\",\"name\":\"Microsoft in Business Blogs\",\"url\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/wp-content\/uploads\/sites\/28\/2018\/07\/R6wl9gWl_400x400.jpg\",\"contentUrl\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/wp-content\/uploads\/sites\/28\/2018\/07\/R6wl9gWl_400x400.jpg\",\"width\":400,\"height\":400,\"caption\":\"Microsoft in Business Blogs\"},\"image\":{\"@id\":\"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Embracing AI to defend against cyberthreats - Microsoft in Business Blogs","description":"Learn how AI-powered security solutions can help protect user data from rapidly evolving threats in this Microsoft in Business blog.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/security\/2024\/10\/17\/embracing-ai-to-defend-against-cyberthreats\/","og_locale":"en_US","og_type":"article","og_title":"Embracing AI to defend against cyberthreats","og_description":"Unregulated AI poses new cybersecurity risks, but companies are using AI-powered Microsoft solutions to prevent attacks and help protect user data from evolving vulnerabilities.","og_url":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/security\/2024\/10\/17\/embracing-ai-to-defend-against-cyberthreats\/","og_site_name":"Microsoft in Business Blogs","article_published_time":"2024-10-17T14:00:00+00:00","article_modified_time":"2024-11-05T16:28:12+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/wp-content\/uploads\/sites\/28\/2024\/10\/8693_16x9_Security-Hero-FY25.png","type":"image\/png"}],"author":"Microsoft in Business Team","twitter_card":"summary_large_image","twitter_title":"Embracing AI to defend against cyberthreats","twitter_description":"Unregulated AI poses new cybersecurity risks, but companies are using AI-powered Microsoft solutions to prevent attacks and help protect user data from evolving vulnerabilities.","twitter_image":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/wp-content\/uploads\/sites\/28\/2024\/10\/8693_16x9_Security-Hero-FY25.png","twitter_misc":{"Written by":"Microsoft in Business Team","Est. reading time":"5 min read"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/security\/2024\/10\/17\/embracing-ai-to-defend-against-cyberthreats\/#article","isPartOf":{"@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/security\/2024\/10\/17\/embracing-ai-to-defend-against-cyberthreats\/"},"author":[{"@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/author\/microsoft-in-business-team\/","@type":"Person","@name":"Microsoft in Business Team"}],"headline":"Embracing AI to defend against cyberthreats","datePublished":"2024-10-17T14:00:00+00:00","dateModified":"2024-11-05T16:28:12+00:00","mainEntityOfPage":{"@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/security\/2024\/10\/17\/embracing-ai-to-defend-against-cyberthreats\/"},"wordCount":1302,"publisher":{"@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/#organization"},"image":{"@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/security\/2024\/10\/17\/embracing-ai-to-defend-against-cyberthreats\/#primaryimage"},"thumbnailUrl":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/wp-content\/uploads\/sites\/28\/2024\/10\/MSC24-ASEAN-developer-Getty-1469706471-rgb-scaled.jpg","keywords":["AI","Cybersecurity"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/security\/2024\/10\/17\/embracing-ai-to-defend-against-cyberthreats\/","url":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/security\/2024\/10\/17\/embracing-ai-to-defend-against-cyberthreats\/","name":"Embracing AI to defend against cyberthreats - Microsoft in Business Blogs","isPartOf":{"@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/#website"},"primaryImageOfPage":{"@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/security\/2024\/10\/17\/embracing-ai-to-defend-against-cyberthreats\/#primaryimage"},"image":{"@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/security\/2024\/10\/17\/embracing-ai-to-defend-against-cyberthreats\/#primaryimage"},"thumbnailUrl":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/wp-content\/uploads\/sites\/28\/2024\/10\/MSC24-ASEAN-developer-Getty-1469706471-rgb-scaled.jpg","datePublished":"2024-10-17T14:00:00+00:00","dateModified":"2024-11-05T16:28:12+00:00","description":"Learn how AI-powered security solutions can help protect user data from rapidly evolving threats in this Microsoft in Business blog.","breadcrumb":{"@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/security\/2024\/10\/17\/embracing-ai-to-defend-against-cyberthreats\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/security\/2024\/10\/17\/embracing-ai-to-defend-against-cyberthreats\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/security\/2024\/10\/17\/embracing-ai-to-defend-against-cyberthreats\/#primaryimage","url":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/wp-content\/uploads\/sites\/28\/2024\/10\/MSC24-ASEAN-developer-Getty-1469706471-rgb-scaled.jpg","contentUrl":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/wp-content\/uploads\/sites\/28\/2024\/10\/MSC24-ASEAN-developer-Getty-1469706471-rgb-scaled.jpg","width":2560,"height":1707,"caption":"Computer coding, programming and asian man in cybersecurity, software development and html script. Night person from china with information technology career, database code and monitor network safety"},{"@type":"BreadcrumbList","@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/security\/2024\/10\/17\/embracing-ai-to-defend-against-cyberthreats\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/"},{"@type":"ListItem","position":2,"name":"Embracing AI to defend against cyberthreats"}]},{"@type":"WebSite","@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/#website","url":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/","name":"Microsoft in Business Blogs","description":"","publisher":{"@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/#organization","name":"Microsoft in Business Blogs","url":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/#\/schema\/logo\/image\/","url":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/wp-content\/uploads\/sites\/28\/2018\/07\/R6wl9gWl_400x400.jpg","contentUrl":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/wp-content\/uploads\/sites\/28\/2018\/07\/R6wl9gWl_400x400.jpg","width":400,"height":400,"caption":"Microsoft in Business Blogs"},"image":{"@id":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/#\/schema\/logo\/image\/"}}]}},"msxcm_animated_featured_image":null,"_links":{"self":[{"href":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/wp-json\/wp\/v2\/posts\/69424","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/wp-json\/wp\/v2\/users\/771"}],"replies":[{"embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/wp-json\/wp\/v2\/comments?post=69424"}],"version-history":[{"count":30,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/wp-json\/wp\/v2\/posts\/69424\/revisions"}],"predecessor-version":[{"id":69503,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/wp-json\/wp\/v2\/posts\/69424\/revisions\/69503"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/wp-json\/wp\/v2\/media\/69432"}],"wp:attachment":[{"href":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/wp-json\/wp\/v2\/media?parent=69424"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/wp-json\/wp\/v2\/categories?post=69424"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/wp-json\/wp\/v2\/post_tag?post=69424"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/wp-json\/wp\/v2\/content-type?post=69424"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/newed.any0.dpdns.org\/en-us\/industry\/microsoft-in-business\/wp-json\/wp\/v2\/coauthors?post=69424"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}