{"id":349978,"date":"2025-10-14T05:40:00","date_gmt":"2025-10-14T12:40:00","guid":{"rendered":"https:\/\/cms-articles.softonic.io\/es\/?p=398971"},"modified":"2025-10-14T06:00:12","modified_gmt":"2025-10-14T13:00:12","slug":"the-threats-of-ai-are-redefining-the-challenges-of-cybersecurity","status":"publish","type":"post","link":"https:\/\/cms-articles.softonic.io\/en\/the-threats-of-ai-are-redefining-the-challenges-of-cybersecurity\/","title":{"rendered":"The threats of AI are redefining the challenges of cybersecurity"},"content":{"rendered":"\n<p class=\"wp-block-paragraph\">AI-driven threats are transforming the cybersecurity landscape, posing a significant challenge for organizations. A recent study conducted by DarkTrace reveals that <strong>74% of cybersecurity professionals believe that these threats are a major challenge and 90% expect a considerable impact in the next one to two years.<\/strong> In this context, many companies still operate under defense models designed for a static environment, which limits their ability to adapt to the dynamic nature of current risks.<\/p>\n\n\n<h2 class=\"wp-block-heading\">CTEM Practices<\/h2>\n\n\n<p class=\"wp-block-paragraph\">Traditional defense models, which include annual penetration tests and semi-annual tabletop exercises, are insufficient. These approaches often focus on regulatory compliance and offer limited visibility into attack behaviors. For this reason, <strong>there is a push towards Continuous Threat Exposure Management, which emphasizes a daily practice informed by threats rather than ad hoc simulations.<\/strong> This transformation requires a more collaborative and resilient approach, where cybersecurity teams not only simulate attacks but also constantly adapt to adversaries&#8217; tactics.<\/p>\n\n\n<p class=\"wp-block-paragraph\">This differs from traditional methods not only by the frequency of the tests but also by the authenticity of the simulations. They must <strong>replicate the real behavior of adversaries, which helps teams develop stronger security reflexes<\/strong>. Additionally, post-simulation analysis is crucial for identifying systemic weaknesses and continuously improving response skills and processes.<\/p>\n\n\n<p class=\"wp-block-paragraph\">With an eye towards the future, the adoption of these practices is expected to be not just a matter of tools, but a <strong>discipline that becomes an integral part of the organizational culture,<\/strong> allowing companies to anticipate and respond more effectively to emerging threats.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>AI-driven threats are transforming the cybersecurity landscape, posing a significant challenge for organizations. A recent study conducted by DarkTrace reveals that 74% of cybersecurity professionals believe these threats are a major challenge, and 90% expect a considerable impact in the next one to two years. In this context, many companies still operate under defense models designed for a static environment, which limits their ability to adapt to the dynamic nature of current risks. CTEM practices Traditional defense models, which include [&#8230;]<\/p>\n","protected":false},"author":9317,"featured_media":350007,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wpcf-pageviews":0},"categories":[1015],"tags":[1401,17150,5605,3854],"usertag":[],"vertical":[],"content-category":[],"class_list":["post-349978","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","tag-ai","tag-amenazas-ciberseguridad","tag-ciberseguridad","tag-ia"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts\/349978","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/users\/9317"}],"replies":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/comments?post=349978"}],"version-history":[{"count":2,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts\/349978\/revisions"}],"predecessor-version":[{"id":350009,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts\/349978\/revisions\/350009"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/media\/350007"}],"wp:attachment":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/media?parent=349978"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/categories?post=349978"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/tags?post=349978"},{"taxonomy":"usertag","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/usertag?post=349978"},{"taxonomy":"vertical","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/vertical?post=349978"},{"taxonomy":"content-category","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/content-category?post=349978"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}