Logo
    • Hardware - Overview
      • Mobile Computing - Overview
      • Notebooks
      • Mobile Workstations
      • Mobile Thin Clients
      • Tablets
      • Smartphones & Mobile Phones
      • Wearables
      • Mobile Computing Warranties & Services
      • Mobile Computing Accessories
      • Mobile Computing Spare Parts
      • Communication & Conferencing - Overview
      • Conference Systems
      • VoIP Telephony
      • Headsets
      • Webcams
      • Communication Warranties & Services
      • Communication Accessories
      • IT Infrastructure - Overview
      • Servers
      • Storage
      • Uninterruptible Power Supply
      • Network
      • Security
      • Racks
      • IT Infrastructure Warranties & Services
      • IT Infrastructure Accessories
      • IT Infrastructure Spare Parts
      • Computing - Overview
      • PCs
      • Workstations
      • Thin Clients
      • All-in-One PCs
      • Point of Sale & Point of Information
      • Computing Warranties & Services
      • Computing Accessories
      • Peripherals - Overview
      • Monitors
      • Public Displays
      • Projectors
      • Input Devices
      • Audio, Photo & Video
      • Peripherals Warranties & Services
      • Peripherals Accessories
      • Printers & Scanners - Overview
      • Printers
      • Label Printers
      • Disc Duplicators
      • Scanners
      • Barcode Scanners
      • Mobile Data Collection
      • Consumables
      • Warranties & Services
      • Printer & Scanner Accessories
      • Printer Spare Parts
      • Components - Overview
      • SSDs & HDDs
      • Memory
      • Graphics Cards
      • Drives & Enclosures
      • Interfaces & Controllers
      • Storage Media
      • Power Supplies
      • Processors
      • Component Accessories
      • Connectivity - Overview
      • Network Connectivity
      • PC Connectivity
      • USB Connectivity
      • Power Connectivity
      • Phone Connectivity
      • Device Servers
      • Extenders & Splitters
      • Connectivity Accessories
      • Office Equipment - Overview
      • Organisation & Ergonomics
      • Smart Home
      • Cleaning Products
      • Safety, Security & Protection
      • Office Appliances
      • Mounting Solutions
      • Office Furniture
      • Batteries
      • Office Equipment Accessories
    • Software - Overview
      • Storage, Backup & Recovery - Overview
      • Client Backup & Recovery
      • Backup, Recovery & Archiving
      • Security Software - Overview
      • Endpoint Security
      • E-mail Security
      • Security Suites
      • Mobile Security
      • Cloud Security
      • Gateway Security
      • Management & Training
      • Development Software - Overview
      • Project Management & Collaboration
      • Collaboration Software - Overview
      • Communication
      • Document Management
      • File Sharing
      • Office Applications - Overview
      • Office Software & Add-ons
      • Creative Design & Publishing
      • Infrastructure Software - Overview
      • Operating Systems
      • Monitoring & Reporting
      • Print Management
      • Optimisation
      • Virtualisation - Overview
      • Desktop Virtualisation
      • Infrastructure & Management
    • IT solutions - Overview
      • Data Centre - Overview
      • Multi Cloud
      • Software Defined Data Centre
      • Modular Data Centre Competence
      • Networking - Overview
      • Data Centre Networking
      • Enterprise Networking
      • Software-Defined Networking
      • Bechtle Networking Services
      • Cloud-Based Networking
      • IT Security - Overview
      • IT & Cyber Security
      • Data centre Security
      • Cloud Security
      • Application Security
      • Data protection in the company
      • Infrastructure & Perimeter Security
      • Modern Workplace - Overview
      • Modern Meeting Room
      • Communication and Collaboration
      • Mobile Working
      • Workplace Security
      • Managed Workplace Services
  • Clouds
    • IT Services - Overview
    • Managed Services
    • Financial Services
      • E-Procurement - Overview
      • My Bechtle
      • ERP Connection
      • Digital business documents
      • Quotes
      • Framework agreements
      • Special conditions
    • News - Overview
    • Newsroom
      • Bechtle Blog FR - Overview
      • Modern Workplace
      • Security
      • Infrastructure
      • Everything as a Service
      • Procurement
      • Corporate Social Responsibility
      • Bechtle Life
      • Corporate news - Overview
      • Press Releases
      • Downloadservice
      • Press Contact
    • Press releases France
    • Careers - Overview
    • Working for Bechtle
    • Development
    • Application process
    • Career Contact
    • Jobs
    • About Bechtle - Overview
      • Company - Overview
      • Management
      • Locations
      • Bechtle Group Companies
      • Company Development
      • Vision 2030
      • Certifications
      • Investors - Overview
      • Bechtle Share
      • Publications
      • Financial Calendar
      • General Meeting
      • Corporate Governance
      • Investors Contact
      • Retail Investors
      • Software revenue according to IFRS 15
    • Sustainability
      • International business with Bechtle - Overview
      • Global IT Alliance
      • Events - Overview
      • Latest events
      • Secteur public - Overview
      • Références
      • OCRE with Bechtle
    • Bechtle France
    • Contact
News
Bechtle Blog FR
Security
Artificial intelligence has become a major cybersecurity challenge
Artificial intelligence and cybersecurity
Security - Apr 19, 2024

Artificial intelligence has become a major cybersecurity challenge

Artificial intelligence has become an essential pillar and major asset in the realm of cybersecurity. Moreover, the market for artificial intelligence cybersecurity is predicted to grow from $1 bn to $34.8 bn by 2025. While technologies are rapidly growing, however, organisations are confronted with ever more sophisticated attacks and cybercriminals with ever better tools. So while introducing AI is a real asset that can substantially bolster enterprise security, it also poses a real challenge that calls for a carefully planned and strategic approach.

Read our article to learn more about the cybersecurity challenges AI poses.

 

What are the cybersecurity benefits of AI?

Artificial intelligence (AI) in threat and incident management 

The many benefits. Quicker and more precise threat detection and recognition means AI can drastically reduce the impact of cyber attacks. It allows you to analyse large data volumes around the clock in real time and identify abnormal models and behaviour more quickly. Systems with AI are also able to recognise attacks before they cause any significant damage. The IBM study Global Security Operations Centre (March 2023) found that “using AI risk analysis accelerated alert classification and verification by 55% on average”.

Combining AI with automatic response technologies, organisations can address threats quicker and enable workers to react faster. This technology can also be used to automate tasks such as installing antivirus software, verifying registration keys, and updating firewall regulations—a major advantage, as this frees up time to concentrate on the core business.

AI will also be able to create user and system behaviour models to facilitate identification of suspicious activities and potential penetration attacks.
 

AI for data management

Data protection is crucial for companies. AI enables data to be efficiently mapped, referenced, secured, and encrypted to optimally employ them for the security process.

There are two types of measures that have to be considered to allow for development of governance and risk management tools while also allowing companies to conform with the GDPR. Firstly, technological measures including use of technologies to protect and arbitrate company IT system access and secondly organisational measures including control process for the people handling the company data, making AI a real asset in drastically boosting performance.

AI allows us to reduce the impact of cyberattacks and enhance operations efficiency while freeing up precious time and resources. We do, however, still have to ask ourselves what challenges and limitations we could be faced with when using AI, especially regarding the use of personal data.

 

What future challenges does AI pose for cybersecurity?

AI as a new playing field for cybercriminals

Cybercriminals employ AI to develop more sophisticated attacks capable of bypassing traditional defence systems by targeting their intended victims in a smarter and more personalised way. Generative AI, a branch of AI that revolves around autonomous content creation, can be used to generate realistic phishing e-mails or deploy malware or deepfakes. Studies have demonstrated how quickly and easily the generation of plausible malicious codes can be automated.

AI can also be leveraged for identity theft whereby facial recognition software receives corrupt data and is manipulated into processing them as authentic.

 

AI to limit compliance and transparency

While systems with AI can effectively detect threats, they can also create false positives or negatives that can reduce analysts’ confidence in these dedicated AI tools, throwing up questions of transparency and accountability of security.

Using AI in cybersecurity often requires access to large amounts of sensitive data which can lead to issues with data protection and compliance with legal regulations. So while automation can be useful in certain specific areas, it still seems necessary for humans to be involved in the decision-making process.

Faced with these challenges, we therefore urgently need to introduce advanced detection mechanisms such as machine learning powered anomaly detection, employ continuous monitoring technologies, and implement security technology dedicated to AI.

 


AI offers unparalleled opportunities to strengthen cybersecurity with quicker and more precise threat recognition. It doesn’t, however, come without substantial challenges in terms of trust, transparency, and data protection. To maximise the benefits of AI while simultaneously limiting its risks, it’s essential for organisations to adopt a balanced approach that combines human expertise with advanced AI capacities to effectively defend their systems from cyberthreats.
 

 

For more information or support with a cybersecurity project, feel free to visit our website our get in touch with us.

  CONTACT US    VISIT OUR WEBSITE  

    This post was published on Apr 19, 2024.
    Brand shop
    Company
    Bechtle Locations
    Career
    Press
    Investor Relations
    Events
    Professional Equality Index (French)
    Delivery and Payment
    Help Centre
    Newsletter

    Facebook Bechtle Facebook Bechtle direct

    YouTube Bechtle YouTube Bechtle direct

    LinkedIn Bechtle LinkedIn Bechtle direct

    Instagram Bechtle Instagram Bechtle direct

    Products are sold exclusively to commercial end customers and the public sector.

    Prices in Euro plus VAT.

    Legal Notice Privacy Policy T&Cs
    Support-ID: 0ec00bf7aa
    © 2025 Bechtle AG