 
{"id":101420,"date":"2024-10-17T08:19:00","date_gmt":"2024-10-17T08:19:00","guid":{"rendered":"https:\/\/www.globallogic.com\/in\/?post_type=news&#038;p=101420"},"modified":"2024-11-21T08:20:26","modified_gmt":"2024-11-21T08:20:26","slug":"ai-in-cybersecurity-a-double-edged-tool-for-modern-threats","status":"publish","type":"news","link":"https:\/\/www.globallogic.com\/in\/about\/press-room\/media-coverage\/ai-in-cybersecurity-a-double-edged-tool-for-modern-threats\/","title":{"rendered":"AI in cybersecurity: A double-edged tool for modern threats"},"content":{"rendered":"\n<p>The story titled, \u201cAI in cybersecurity: A double-edged tool for modern threats\u201d highlights how artificial intelligence (AI) is revolutionizing cybersecurity by enhancing threat detection and response strategies.<\/p>\n\n\n\n<p>Artificial intelligence has become a cornerstone of modern cybersecurity strategies, offering new ways to predict and respond to threats that were previously unimaginable.<\/p>\n\n\n\n<p>Sanjeev Azad discussed the growing impact of AI on cybersecurity, highlighting both its potential and its challenges. AI&#8217;s ability to analyze massive datasets, detect novel attack patterns, and respond in real time is reshaping how organizations protect their digital assets.<\/p>\n\n\n\n<p>Find the snapshots of the exclusive coverage by PCQuest below for the exclusive coverage<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/www.globallogic.com\/in\/wp-content\/uploads\/sites\/21\/2024\/10\/image002-2-300x213.jpg\" alt=\"\" class=\"wp-image-89250\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/www.globallogic.com\/in\/wp-content\/uploads\/sites\/21\/2024\/10\/image006-1-300x205.jpg\" alt=\"\" class=\"wp-image-89249\" \/><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>The story titled, \u201cAI in cybersecurity: A double-edged tool for modern threats\u201d highlights how artificial intelligence (AI) is revolutionizing cybersecurity by enhancing threat detection and response strategies.<\/p>\n","protected":false},"featured_media":101421,"parent":0,"menu_order":0,"template":"","meta":{"_acf_changed":false,"footnotes":""},"news-category":[758],"embedded-category":[],"class_list":["post-101420","news","type-news","status-publish","has-post-thumbnail","hentry","news-category-media-coverage"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.globallogic.com\/in\/wp-json\/wp\/v2\/news\/101420","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.globallogic.com\/in\/wp-json\/wp\/v2\/news"}],"about":[{"href":"https:\/\/www.globallogic.com\/in\/wp-json\/wp\/v2\/types\/news"}],"version-history":[{"count":1,"href":"https:\/\/www.globallogic.com\/in\/wp-json\/wp\/v2\/news\/101420\/revisions"}],"predecessor-version":[{"id":101422,"href":"https:\/\/www.globallogic.com\/in\/wp-json\/wp\/v2\/news\/101420\/revisions\/101422"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.globallogic.com\/in\/wp-json\/wp\/v2\/media\/101421"}],"wp:attachment":[{"href":"https:\/\/www.globallogic.com\/in\/wp-json\/wp\/v2\/media?parent=101420"}],"wp:term":[{"taxonomy":"news-category","embeddable":true,"href":"https:\/\/www.globallogic.com\/in\/wp-json\/wp\/v2\/news-category?post=101420"},{"taxonomy":"embedded-category","embeddable":true,"href":"https:\/\/www.globallogic.com\/in\/wp-json\/wp\/v2\/embedded-category?post=101420"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}