Foreword: Untangle the AI & Cybersecurity equation Solving the AI + cybersecurity equation is not just any mathematical challenge. It is a multi-variable puzzle where AI and cybersecurity intersect, overlap, and diverge. If X equals AI and Y equals cybersecurity, Z is the unknown in this cubic equation with variables that refuse to stay constant. Z represents the unpredictable element that could either save us or set us off on a different trajectory: new technologies, new tactics by cybercriminals, and the ethical implications of AI decisions. Each solution we find seems to come with a new set of problems. But what if we could solve for X and Y, while keeping Z in check? We might just find a balance. It will require continuous adaptation, just like navigating a shifting maze that constantly changes its paths and obstacles. I would like to thank Vasco Gomes, Managing Editor of this new edition of our Digital Security Magazine, for his dedication and insights. I also want to express my gratitude to our experts and guest authors whose perspectives and expertise have enriched this publication. Indeed, this edition dives into the intricacies of securing AI platforms, evaluating AI as both an ally and adversary in the fight against cyber threats, and understanding how AI is weaponizing audio and images. We also explore the balance between the promises and pitfalls of automating analysis with AI, the trustworthiness of AI in armed forces, and the role of generative AI in identity and access management. Additionally, our articles cover emerging policies and legal frameworks for governing the use of generative AI in cybersecurity, how cloud services like AWS manage risks with GenAI, the rise of AI-powered cyber swarms, and the potential applications of AI agents in both offensive and defensive cybersecurity. Lastly, we discuss the strategic decisions around investing in GenAI security, whether in-house or outsourced. As we navigate the complexities of AI and cybersecurity, we recognize that the path forward is fraught with challenges. Yet, it is through these challenges that innovation is born. Together, we can decode this intricate equation and build a secure digital future. So, let’s get to work. The equations won’t untangle themselves. Sincerely, Editor-in-Chief Zeina Zakhour Zeina Zakhour Vice-President, Global CTO Digital Security, Eviden View profile Select a topic Digital Sovereignty Insights Regulations Technology Threats Transversal Trend Select a technology Application Security Artificial Intelligence Cloud security Data security OT and IoT Resilience Threat Detection and Response Trusted identities Zero Trust Navigating the GenAI Iceberg: How to get the basics right Focusing solely on specific GenAI threats would be missing the bigger picture. Secure the core GenAI elements like infrastructure, data, and models. Is AI our greatest ally or our worst enemy in the fight against cyber threats? Attackers weaponize AI for innovative attacks. But defenders also embrace AI to fight back with threat detection, response and even self-learning defenses. Synthetic nightmares: how AI is weaponizing audio and images AI-generated content like deepfakes is now so realistic it can be indistinguishable from reality. How can cybersecurity professionals adapt their strategy? Automating Analysis: Balancing the promises and pitfalls of AI in cybersecurity While AI and automation accelerate threat detection, they can also increase false positives or lack of explainability without the right methodology. Reasoning AI: Trusted AI for the Armed Forces How can reasoning AI support decision-making in the planning and conduct of military operations and what ethical and legal framework should you consider? Why can’t my users access this? – How Generative AI answers your toughest IAM questions GenAI will deeply impact the user experience when interacting with IAM tools. Explore the inner workings of such systems and AI-risk mitigation strategies. Prev1/2Next Get the new edition in your mailbox! We nurture you with our experts’ deep knowledge and insights. Register to our newsletter to be informed when a new edition of our Digital Security Magazine is released. Subscribe Thank you for your interest. You can download the report here. A member of our team will be in touch with you shortly