{"id":8662,"date":"2025-12-11T10:00:00","date_gmt":"2025-12-11T03:00:00","guid":{"rendered":"https:\/\/bluebik.com\/insight\/ai-poweredcybersecurity\/"},"modified":"2025-12-11T10:00:00","modified_gmt":"2025-12-11T03:00:00","slug":"ai-poweredcybersecurity","status":"publish","type":"insight","link":"https:\/\/bluebik.com\/vn\/insight\/ai-poweredcybersecurity\/","title":{"rendered":"AI-Powered Cybersecurity: Securing the Enterprise at AI Speed\u00a0"},"content":{"rendered":"\n<h4 class=\"wp-block-heading\"><strong>AI-Powered Cybersecurity: Securing the Enterprise When AI Is Both Value Creator and Vulnerability&nbsp;<\/strong><\/h4>\n\n\n\n<p><em>As AI creates both upside and downside risk,&nbsp;organizations must strengthen their cyber resilience with a modern, proactive&nbsp;framework\u2014one capable of defending against threats that now evolve, scale, and strike at AI speed.&nbsp;<\/em><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/bluebik.com\/wp-content\/uploads\/2025\/12\/Mockup1-TH-AI-powered-cyber-1024x576.jpg\" alt=\"\" class=\"wp-image-7742\" srcset=\"https:\/\/bluebik.com\/wp-content\/uploads\/2025\/12\/Mockup1-TH-AI-powered-cyber-1024x576.jpg 1024w, https:\/\/bluebik.com\/wp-content\/uploads\/2025\/12\/Mockup1-TH-AI-powered-cyber-300x169.jpg 300w, https:\/\/bluebik.com\/wp-content\/uploads\/2025\/12\/Mockup1-TH-AI-powered-cyber-768x432.jpg 768w, https:\/\/bluebik.com\/wp-content\/uploads\/2025\/12\/Mockup1-TH-AI-powered-cyber-1536x864.jpg 1536w, https:\/\/bluebik.com\/wp-content\/uploads\/2025\/12\/Mockup1-TH-AI-powered-cyber.jpg 1600w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>We are entering an era where AI is embedded across every core business process, expanding both operational capabilities and the surfaces attackers can exploit. Cyber threats can now penetrate deeply into data, AI models, and the AI supply chain\u2014with impacts that are more severe and far faster-scaling than in the past. This shift is pushing organizations to&nbsp;<em>modernize their security capabilities<\/em>\u2014from data and governance to recovery\u2014to withstand AI-driven attacks that are more complex, faster, and exponentially scalable.&nbsp;<\/p>\n\n\n\n<p>This shift is redefining the enterprise risk landscape, expanding exposure far beyond traditional IT boundaries. What was once contained within isolated systems now cascades across the entire enterprise ecosystem. AI-enabled attacks are increasingly precise and massively scalable, making it essential for organizations\u2014and&nbsp;people\u2014to understand the emerging wave of cyber risks. These are the Cyber Risk Trends now defining security in an AI-led landscape.&nbsp;<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Cyber Risk Trends: A More Complex Threat Landscape in an AI-Led World&nbsp;<\/strong><\/h4>\n\n\n\n<p>As AI reshapes the enterprise, organizations can no longer rely on traditional frameworks or legacy standards to assess their cyber maturity. Several powerful forces are now pushing leaders to reimagine and rebuild their security model from the ground up.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/bluebik.com\/wp-content\/uploads\/2025\/12\/Mockup2-EN-AI-powered-cyber-1-1024x576.png\" alt=\"AI-powered cybersecurity\" class=\"wp-image-7758\" srcset=\"https:\/\/bluebik.com\/wp-content\/uploads\/2025\/12\/Mockup2-EN-AI-powered-cyber-1-1024x576.png 1024w, https:\/\/bluebik.com\/wp-content\/uploads\/2025\/12\/Mockup2-EN-AI-powered-cyber-1-300x169.png 300w, https:\/\/bluebik.com\/wp-content\/uploads\/2025\/12\/Mockup2-EN-AI-powered-cyber-1-768x432.png 768w, https:\/\/bluebik.com\/wp-content\/uploads\/2025\/12\/Mockup2-EN-AI-powered-cyber-1-1536x864.png 1536w, https:\/\/bluebik.com\/wp-content\/uploads\/2025\/12\/Mockup2-EN-AI-powered-cyber-1.png 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h5 class=\"wp-block-heading\"><strong>1. Regulatory Pressure: Tougher Rules, Higher Stakes&nbsp;<\/strong><\/h5>\n\n\n\n<p>Governments worldwide are enforcing stricter requirements on AI governance, transparency, and accountability. Organizations that&nbsp;fail to&nbsp;adapt will face rising operational, financial, and reputational risks.&nbsp;<\/p>\n\n\n\n<h5 class=\"wp-block-heading\"><strong>2.&nbsp;AI Security Talent Gaps: Skills Shortages That Accelerate Risk&nbsp;<\/strong><\/h5>\n\n\n\n<p>Most existing cybersecurity teams lack the specialized capabilities&nbsp;required&nbsp;to secure AI systems\u2014ranging from protecting AI pipelines and monitoring model behavior to detecting adversarial attacks. This gap is widening quickly: organizations cannot build or hire AI-security talent fast enough to match the pace at which AI-driven risks are expanding.&nbsp;<\/p>\n\n\n\n<h5 class=\"wp-block-heading\"><strong>3.&nbsp;Supply Chain &amp; Identity Compromise: Threats Expanding Across the Enterprise Ecosystem&nbsp;<\/strong><\/h5>\n\n\n\n<p>Supply-chain attacks and identity compromise&nbsp;remain&nbsp;primary attack vectors\u2014but AI is making them far more damaging. AI now enables adversaries to mimic human behavior with high precision and&nbsp;generates&nbsp;convincing fake identities, making these attacks increasingly difficult to detect and significantly more impactful across the enterprise ecosystem.&nbsp;<\/p>\n\n\n\n<h5 class=\"wp-block-heading\"><strong>4.&nbsp;AI-Assisted Attacks: Offence Accelerated by AI&nbsp;<\/strong><\/h5>\n\n\n\n<p>Cybercriminals are now weaponizing Generative AI to accelerate and amplify their attacks\u2014making them faster, more sophisticated, and significantly harder to detect. AI enables adversaries to automate highly convincing phishing campaigns, rapidly evolve malware, and generate realistic deepfakes that support seamless social engineering. What once&nbsp;required&nbsp;time,&nbsp;expertise, and manual effort can now be executed instantly and at&nbsp;a scale, dramatically increasing both the reach and impact of a single attack.&nbsp;<\/p>\n\n\n\n<h5 class=\"wp-block-heading\"><strong>5. Data Poisoning &amp; Model Manipulation: Targeting the Core of AI Systems&nbsp;<\/strong><\/h5>\n\n\n\n<p>Attackers are increasingly focusing on corrupting training data or compromising the model inference process\u2014causing models to make incorrect decisions or reveal sensitive information. Even subtle manipulations can distort model behavior in ways that are difficult to detect, creating risks that extend deep into the AI lifecycle.&nbsp;<\/p>\n\n\n\n<h5 class=\"wp-block-heading\"><strong>6. Shadow AI: Unseen Risks from Within&nbsp;<\/strong><\/h5>\n\n\n\n<p>Across many organizations, AI tools are being adopted without awareness of the new dependencies and hidden exposures they introduce. Unvetted API connections, unmanaged data flows, and unsanctioned AI usage create security vulnerabilities that often go&nbsp;unnoticed&nbsp;expanding&nbsp;the attack surface beyond the organization\u2019s formal governance and controls.&nbsp;<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>A Proactive Framework for AI-Era Cyber Defense: From Reactive Protection to Proactive Defense&nbsp;<\/strong><\/h4>\n\n\n\n<p>The speed and sophistication of AI-enabled attacks now exceed the response capacity of traditional security models. Organizations can no longer afford to wait for incidents before responding. AI-driven threats can mimic human behavior, corrupt training data, compromise AI models, or infiltrate the supply chain\u2014often within seconds\u2014making reactive security fundamentally insufficient.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/bluebik.com\/wp-content\/uploads\/2025\/12\/Mockup3-EN-AI-powered-cyber-1024x576.png\" alt=\"Mockup3 EN AI powered cyber\" class=\"wp-image-7752\" srcset=\"https:\/\/bluebik.com\/wp-content\/uploads\/2025\/12\/Mockup3-EN-AI-powered-cyber-1024x576.png 1024w, https:\/\/bluebik.com\/wp-content\/uploads\/2025\/12\/Mockup3-EN-AI-powered-cyber-300x169.png 300w, https:\/\/bluebik.com\/wp-content\/uploads\/2025\/12\/Mockup3-EN-AI-powered-cyber-768x432.png 768w, https:\/\/bluebik.com\/wp-content\/uploads\/2025\/12\/Mockup3-EN-AI-powered-cyber-1536x864.png 1536w, https:\/\/bluebik.com\/wp-content\/uploads\/2025\/12\/Mockup3-EN-AI-powered-cyber.png 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Three Strategic Pillars of AI-Powered Cyber Defense&nbsp;<\/strong><\/h4>\n\n\n\n<p>Effective cyber defense in the AI era depends on an organization\u2019s ability to elevate and integrate three core dimensions\u2014<strong>People, Process, and Technology<\/strong>\u2014in a balanced and coherent way. These pillars form the foundation for continuous, resilient, and sustainable protection.&nbsp;<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">1. People \u2014 Human Judgment as the Last Line of Defense&nbsp;<\/h5>\n\n\n\n<p>No matter how advanced the technology becomes,&nbsp;<strong>human judgment&nbsp;remains&nbsp;the final safeguard<\/strong>&nbsp;in AI-era cybersecurity. People act as decision-makers and controllers at critical points, ensuring that security measures function as intended.&nbsp;<br>Gaps in AI-security knowledge have now become&nbsp;<strong>systemic risks<\/strong>, limiting an organization\u2019s ability to assess, control, and respond to emerging threats.&nbsp;<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">Key Actions&nbsp;<\/h5>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Deliver targeted&nbsp;<strong>AI-security upskilling<\/strong>&nbsp;for cyber and risk teams&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Establish specialized units such as an&nbsp;<strong>AI Security Taskforce<\/strong>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Embed a&nbsp;<strong>Security-by-Design culture<\/strong>&nbsp;across teams and projects&nbsp;<\/li>\n<\/ul>\n\n\n\n<h5 class=\"wp-block-heading\">2. Process \u2014 Governance Is the New Perimeter&nbsp;<\/h5>\n\n\n\n<p>AI-driven cyber threats are elevating&nbsp;<strong>governance<\/strong>&nbsp;as the defining perimeter of modern security.&nbsp;<br>Organizations must&nbsp;identify&nbsp;and assess AI-related risks across the full lifecycle\u2014data preparation, model development, deployment, monitoring, and incident response.&nbsp;<br>Governance must be&nbsp;<strong>clear, auditable, and consistently applied<\/strong>&nbsp;across the enterprise.&nbsp;<\/p>\n\n\n\n<p>Cyber resilience also requires adopting an&nbsp;<strong>assume-breach<\/strong>&nbsp;mindset, supported by strong business-continuity plans and rapid recovery processes to minimize impact.&nbsp;<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">Key Actions&nbsp;<\/h5>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Develop an&nbsp;<strong>AI Governance Framework<\/strong>&nbsp;integrating data, models, and operations&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Create and regularly test&nbsp;<strong>Response &amp; Recovery playbooks<\/strong>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Embed&nbsp;<strong>AI-risk assessment<\/strong>&nbsp;into every phase of the model lifecycle&nbsp;<\/li>\n<\/ul>\n\n\n\n<h5 class=\"wp-block-heading\">3. Technology \u2014 Defense at Machine Speed&nbsp;<\/h5>\n\n\n\n<p>In today\u2019s landscape,&nbsp;<strong>AI acts as both&nbsp;a sword&nbsp;and&nbsp;a shield<\/strong>.&nbsp;Organizations must evolve their cyber capabilities to&nbsp;operate&nbsp;at machine speed, where AI-enabled attacks can escalate faster than manual defenses can respond.&nbsp;Modern architectures require both:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Defensive AI<\/strong>&nbsp;to detect anomalies rapidly and accurately&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Proactive\/offensive testing<\/strong>&nbsp;to&nbsp;identify&nbsp;weaknesses before attackers exploit them&nbsp;<\/li>\n<\/ul>\n\n\n\n<h5 class=\"wp-block-heading\">Key Actions&nbsp;<\/h5>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Invest in cybersecurity platforms enabling&nbsp;<strong>automated detection and response<\/strong>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Integrate automation, advanced analytics, and&nbsp;<strong>human-in-the-loop oversight<\/strong>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Conduct continuous proactive testing\u2014<strong>Red Teaming<\/strong>,&nbsp;<strong>Model Stress Testing<\/strong>, and other adversarial simulations&nbsp;<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Securing the Enterprise at AI Speed&nbsp;<\/strong><\/h4>\n\n\n\n<p>We are entering a world where AI is both a catalyst for business growth and a profound source of cyber risk. In this environment, the most prepared organizations are not those with the most advanced technology, but those that recognize their risks earlier, adapt faster, and orchestrate People, Process, and Technology in a cohesive, strategic way.&nbsp;<\/p>\n\n\n\n<p>This new standard of AI-era cybersecurity spans the full spectrum of defense\u2014prevention, detection, response, containment, continuity, and rapid recovery\u2014to preserve trust and sustain operational resilience.&nbsp;<\/p>\n\n\n\n<p>In a landscape where everything moves at AI speed, resilience belongs to organizations that can wield AI as both&nbsp;<strong>shield and sword<\/strong>, transforming cybersecurity from a defensive cost center into a&nbsp;<strong>strategic enabler of trusted, sustainable growth<\/strong>.&nbsp;<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>AI-Powered Cybersecurity: Securing the Enterprise When AI Is Both Value Creator and Vulnerability&nbsp; As AI creates both upside and downside risk,&nbsp;organizations must strengthen their cyber resilience with a modern, proactive&nbsp;framework\u2014one capable of defending against threats that now evolve, scale, and strike at AI speed.&nbsp; We are entering an era where AI is embedded across every [&hellip;]<\/p>\n","protected":false},"featured_media":8663,"template":"","featured_insight":[],"insight_topic":[304],"insight_industry":[],"insight_service":[323],"class_list":["post-8662","insight","type-insight","status-publish","has-post-thumbnail","hentry","insight_topic-cybersecurity","insight_service-cybersecurity-digital-trust"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>AI-Powered Cybersecurity: Securing the Enterprise at AI Speed\u00a0 - Bluebik<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/bluebik.com\/vn\/insight\/ai-poweredcybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"AI-Powered Cybersecurity: Securing the Enterprise at AI Speed\u00a0 - Bluebik\" \/>\n<meta property=\"og:description\" content=\"AI-Powered Cybersecurity: Securing the Enterprise When AI Is Both Value Creator and Vulnerability&nbsp; As AI creates both upside and downside risk,&nbsp;organizations must strengthen their cyber resilience with a modern, proactive&nbsp;framework\u2014one capable of defending against threats that now evolve, scale, and strike at AI speed.&nbsp; We are entering an era where AI is embedded across every [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/bluebik.com\/vn\/insight\/ai-poweredcybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"Bluebik\" \/>\n<meta property=\"og:image\" content=\"https:\/\/bluebik.com\/wp-content\/uploads\/2025\/12\/Mockup1-TH-AI-powered-cyber.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/bluebik.com\\\/vn\\\/insight\\\/ai-poweredcybersecurity\\\/\",\"url\":\"https:\\\/\\\/bluebik.com\\\/vn\\\/insight\\\/ai-poweredcybersecurity\\\/\",\"name\":\"AI-Powered Cybersecurity: Securing the Enterprise at AI Speed\u00a0 - Bluebik\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/bluebik.com\\\/vn\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/bluebik.com\\\/vn\\\/insight\\\/ai-poweredcybersecurity\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/bluebik.com\\\/vn\\\/insight\\\/ai-poweredcybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/bluebik.com\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/Thumbnail-TH-AI-powered-cyber.jpg\",\"datePublished\":\"2025-12-11T03:00:00+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/bluebik.com\\\/vn\\\/insight\\\/ai-poweredcybersecurity\\\/#breadcrumb\"},\"inLanguage\":\"vi-VN1\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/bluebik.com\\\/vn\\\/insight\\\/ai-poweredcybersecurity\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"vi-VN1\",\"@id\":\"https:\\\/\\\/bluebik.com\\\/vn\\\/insight\\\/ai-poweredcybersecurity\\\/#primaryimage\",\"url\":\"https:\\\/\\\/bluebik.com\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/Thumbnail-TH-AI-powered-cyber.jpg\",\"contentUrl\":\"https:\\\/\\\/bluebik.com\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/Thumbnail-TH-AI-powered-cyber.jpg\",\"width\":900,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/bluebik.com\\\/vn\\\/insight\\\/ai-poweredcybersecurity\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/bluebik.com\\\/vn\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Insights\",\"item\":\"https:\\\/\\\/bluebik.com\\\/vn\\\/insight\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"AI-Powered Cybersecurity: Securing the Enterprise at AI Speed\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/bluebik.com\\\/vn\\\/#website\",\"url\":\"https:\\\/\\\/bluebik.com\\\/vn\\\/\",\"name\":\"Bluebik\",\"description\":\"Bluebik\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/bluebik.com\\\/vn\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"vi-VN1\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"AI-Powered Cybersecurity: Securing the Enterprise at AI Speed\u00a0 - Bluebik","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/bluebik.com\/vn\/insight\/ai-poweredcybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"AI-Powered Cybersecurity: Securing the Enterprise at AI Speed\u00a0 - Bluebik","og_description":"AI-Powered Cybersecurity: Securing the Enterprise When AI Is Both Value Creator and Vulnerability&nbsp; As AI creates both upside and downside risk,&nbsp;organizations must strengthen their cyber resilience with a modern, proactive&nbsp;framework\u2014one capable of defending against threats that now evolve, scale, and strike at AI speed.&nbsp; We are entering an era where AI is embedded across every [&hellip;]","og_url":"https:\/\/bluebik.com\/vn\/insight\/ai-poweredcybersecurity\/","og_site_name":"Bluebik","og_image":[{"width":1600,"height":900,"url":"https:\/\/bluebik.com\/wp-content\/uploads\/2025\/12\/Mockup1-TH-AI-powered-cyber.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/bluebik.com\/vn\/insight\/ai-poweredcybersecurity\/","url":"https:\/\/bluebik.com\/vn\/insight\/ai-poweredcybersecurity\/","name":"AI-Powered Cybersecurity: Securing the Enterprise at AI Speed\u00a0 - Bluebik","isPartOf":{"@id":"https:\/\/bluebik.com\/vn\/#website"},"primaryImageOfPage":{"@id":"https:\/\/bluebik.com\/vn\/insight\/ai-poweredcybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/bluebik.com\/vn\/insight\/ai-poweredcybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/bluebik.com\/wp-content\/uploads\/2025\/12\/Thumbnail-TH-AI-powered-cyber.jpg","datePublished":"2025-12-11T03:00:00+00:00","breadcrumb":{"@id":"https:\/\/bluebik.com\/vn\/insight\/ai-poweredcybersecurity\/#breadcrumb"},"inLanguage":"vi-VN1","potentialAction":[{"@type":"ReadAction","target":["https:\/\/bluebik.com\/vn\/insight\/ai-poweredcybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"vi-VN1","@id":"https:\/\/bluebik.com\/vn\/insight\/ai-poweredcybersecurity\/#primaryimage","url":"https:\/\/bluebik.com\/wp-content\/uploads\/2025\/12\/Thumbnail-TH-AI-powered-cyber.jpg","contentUrl":"https:\/\/bluebik.com\/wp-content\/uploads\/2025\/12\/Thumbnail-TH-AI-powered-cyber.jpg","width":900,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/bluebik.com\/vn\/insight\/ai-poweredcybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/bluebik.com\/vn\/"},{"@type":"ListItem","position":2,"name":"Insights","item":"https:\/\/bluebik.com\/vn\/insight\/"},{"@type":"ListItem","position":3,"name":"AI-Powered Cybersecurity: Securing the Enterprise at AI Speed\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/bluebik.com\/vn\/#website","url":"https:\/\/bluebik.com\/vn\/","name":"Bluebik","description":"Bluebik","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/bluebik.com\/vn\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"vi-VN1"}]}},"_links":{"self":[{"href":"https:\/\/bluebik.com\/vn\/wp-json\/wp\/v2\/insight\/8662","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bluebik.com\/vn\/wp-json\/wp\/v2\/insight"}],"about":[{"href":"https:\/\/bluebik.com\/vn\/wp-json\/wp\/v2\/types\/insight"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/bluebik.com\/vn\/wp-json\/wp\/v2\/media\/8663"}],"wp:attachment":[{"href":"https:\/\/bluebik.com\/vn\/wp-json\/wp\/v2\/media?parent=8662"}],"wp:term":[{"taxonomy":"featured_insight","embeddable":true,"href":"https:\/\/bluebik.com\/vn\/wp-json\/wp\/v2\/featured_insight?post=8662"},{"taxonomy":"insight_topic","embeddable":true,"href":"https:\/\/bluebik.com\/vn\/wp-json\/wp\/v2\/insight_topic?post=8662"},{"taxonomy":"insight_industry","embeddable":true,"href":"https:\/\/bluebik.com\/vn\/wp-json\/wp\/v2\/insight_industry?post=8662"},{"taxonomy":"insight_service","embeddable":true,"href":"https:\/\/bluebik.com\/vn\/wp-json\/wp\/v2\/insight_service?post=8662"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}