{"id":1020122,"date":"2021-07-14T13:34:20","date_gmt":"2021-07-14T17:34:20","guid":{"rendered":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/the-10-hottest-ai-security-companies-you-need-to-know-crn\/"},"modified":"2021-07-14T13:34:20","modified_gmt":"2021-07-14T17:34:20","slug":"the-10-hottest-ai-security-companies-you-need-to-know-crn","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/ai\/the-10-hottest-ai-security-companies-you-need-to-know-crn\/","title":{"rendered":"The 10 Hottest AI Security Companies You Need To Know &#8211; CRN"},"content":{"rendered":"<p><p>    A Double-Edged Sword<\/p>\n<p>Artificial intelligence is a double-edged sword when it comes to cybersecurity, with defenders using it to respond to and predict threats and attackers using it to launch even more refined attacks. For example, AI algorithms can send spear phishing tweets (personalized tweets sent to targeted users to trick them into sharing sensitive information) six times faster than a human and with twice the success.<\/p>\n<p>The enlargement of attack surface and the increased sophistication of attacks has made AI a key weapon in thwarting cyberattacks, Capgemini found. Cyber analysts are finding it increasingly difficult to effectively monitor current levels of data volume, velocity, and variety across firewalls, prompting organizations to turn to artificial intelligence. <\/p>\n<p>    [RELATED: Artificial Intelligence Week 2021]<\/p>\n<p>In fact, Capgemini found that 61 percent of organizations acknowledge they wouldnt be able to identify critical threats without AI. The increases in cyberattacks that can quickly compromise critical operations within an enterprise also require enhanced capabilities that can best be provided through AI, according to Capgemini. <\/p>\n<p>From identifying fundamental traits that numerous threats share to classifying and responding to well-camouflaged malware to advising how organizations should allocate security resources, heres a look at how 10 AI security companies are making the world a safer place. <\/p>\n<\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read the rest here:<\/p>\n<p><a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/www.crn.com\/slide-shows\/security\/the-10-hottest-ai-security-companies-you-need-to-know\" title=\"The 10 Hottest AI Security Companies You Need To Know - CRN\">The 10 Hottest AI Security Companies You Need To Know - CRN<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> A Double-Edged Sword Artificial intelligence is a double-edged sword when it comes to cybersecurity, with defenders using it to respond to and predict threats and attackers using it to launch even more refined attacks. For example, AI algorithms can send spear phishing tweets (personalized tweets sent to targeted users to trick them into sharing sensitive information) six times faster than a human and with twice the success.  <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/ai\/the-10-hottest-ai-security-companies-you-need-to-know-crn\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":9,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[187743],"tags":[],"class_list":["post-1020122","post","type-post","status-publish","format-standard","hentry","category-ai"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/1020122"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=1020122"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/1020122\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=1020122"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=1020122"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=1020122"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}