{"id":1000,"date":"2024-10-03T12:03:12","date_gmt":"2024-10-03T10:03:12","guid":{"rendered":"https:\/\/ayrilys.com\/?p=1000"},"modified":"2024-10-03T12:07:11","modified_gmt":"2024-10-03T10:07:11","slug":"entre-cybersecurite-et-cybermenaces-a-qui-profite-ia","status":"publish","type":"post","link":"https:\/\/ayrilys.com\/index.php\/entre-cybersecurite-et-cybermenaces-a-qui-profite-ia\/","title":{"rendered":"Entre cybers\u00e9curit\u00e9 et cybermenaces, \u00e0 qui profite l\u2019IA ?"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\" id=\"h-entre-cybersecurite-et-cybermenaces-a-qui-profite-l-ia\">Entre cybers\u00e9curit\u00e9 et cybermenaces, \u00e0 qui profite l\u2019IA ?<\/h2>\n\n\n\n<p>&nbsp;mercredi 02 octobre 2024<\/p>\n\n\n\n<p><strong>Dans <a href=\"https:\/\/www.vadesecure.com\/fr\/company\/news\/etude-opinionway-pour-vade-groupe-hornetsecurity\" target=\"_blank\" rel=\"noreferrer noopener\">sa derni\u00e8re \u00e9tude<\/a>, Vade r\u00e9v\u00e8le que l\u2019intelligence artificielle est, selon les r\u00e9pondants, autant b\u00e9n\u00e9fique et potentiellement utilis\u00e9e par les acteurs malveillants que pour des strat\u00e9gies de d\u00e9fense du c\u00f4t\u00e9 des entreprises.&nbsp;Dirigeants et d\u00e9cideurs fran\u00e7ais sont en effet autant \u00e0 penser que l\u2019IA facilite les cyberattaques (30 %), renforce la d\u00e9fense face \u00e0 celles-ci (28 %) et qu\u2019elle sert dans les deux camps \u00e0 part \u00e9gale (33 %).&nbsp;Ce rapport de force s\u2019\u00e9quilibre pourtant dans les grandes entreprises, pour lesquelles l\u2019usage de l\u2019IA faciliterait l\u2019attaque comme la d\u00e9fense \u00e0 part \u00e9gale \u00e0 46 %.<\/strong><\/p>\n\n\n\n<p>Si une large part des entreprises de 20 \u00e0 49 salari\u00e9s sont soumises \u00e0 plus forte pression (61 % ayant d\u00e9j\u00e0 subi au moins une fois une atteinte \u00e0 leur cybers\u00e9curit\u00e9, contre 50 % en moyenne pour l\u2019ensemble du panel), 37 % des r\u00e9pondants de cette cat\u00e9gorie d\u2019entreprises pensent que l\u2019IA donne l\u2019avantage aux attaquants. Ce taux atteint en effet seulement 30 % en moyenne, toutes tailles d\u2019entreprises confondues et descend \u00e0 24 % dans les plus grandes structures.<br>Pour les entreprises de 10 \u00e0 19 salari\u00e9s, 30 % des r\u00e9pondants voient l\u2019IA faciliter le travail des attaquants, quand 35 % consid\u00e8rent au contraire que le jeu s\u2019\u00e9quilibre entre l\u2019IA comme outil de menace et de renfort de la cybers\u00e9curit\u00e9.<\/p>\n\n\n\n<p><strong>L\u2019IA est utilis\u00e9e comme une arme par les cyberattaquants\u2026<\/strong><br>Pour pr\u00e8s des trois quarts des dirigeants interrog\u00e9s (73 %), l\u2019IA a rendu les cyberattaques plus sophistiqu\u00e9es. Ce taux atteint 79 % pour les entreprises d\u00e9j\u00e0 attaqu\u00e9es. Ils se d\u00e9clarent \u00e9galement pr\u00e9occup\u00e9s par le nombre d\u2019attaques, qui selon eux augmente significativement avec l\u2019IA, ainsi que par les capacit\u00e9s de l\u2019IA \u00e0 p\u00e9n\u00e9trer les syst\u00e8mes via emails notamment, avec l\u2019hame\u00e7onnage et la compromission des courriers \u00e9lectroniques (BEC).<\/p>\n\n\n\n<p><strong>\u2026 mais pas sur tous les domaines de cybers\u00e9curit\u00e9 c\u00f4t\u00e9 entreprise<\/strong><br>L&rsquo;enqu\u00eate r\u00e9v\u00e8le \u00e9galement que si la majorit\u00e9 d\u2019entre elles int\u00e8grent d\u00e9j\u00e0 l\u2019IA dans leur cybers\u00e9curit\u00e9 (81 %, et 93 % chez les entreprises d\u00e9j\u00e0 attaqu\u00e9es), elle n\u2019est pas encore appliqu\u00e9e \u00e0 tous les domaines de la cyber : elle l\u2019est d\u00e9j\u00e0 principalement pour le filtrage des mails (4 r\u00e9pondants sur 10), mais aussi pour la d\u00e9tection avanc\u00e9e des menaces, la d\u00e9tection du hame\u00e7onnage ou encore la mise en \u0153uvre de politique de s\u00e9curit\u00e9 (3 r\u00e9pondants sur 10 \u00e0 chaque fois). Pour deux tiers des entreprises utilisant l\u2019IA dans le cadre de leur cybers\u00e9curit\u00e9 (67 %), celle-ci a permis de r\u00e9duire les menaces.<\/p>\n\n\n\n<p><strong>En mati\u00e8re prospective, l\u2019IA = une priorit\u00e9 absolue !<\/strong><br>L\u2019am\u00e9lioration de la d\u00e9tection et l\u2019augmentation des capacit\u00e9s de r\u00e9action sont les deux principaux objectifs de l\u2019utilisation de l\u2019IA au sein des entreprises, devant la formation ou la recherche d\u2019incidents. Deux tiers des r\u00e9pondants d\u00e9cisionnaires (67 %) font de l\u2019IA une forte priorit\u00e9 d\u2019investissement, dont 3 sur 10 (27 %) en font une priorit\u00e9 absolue dans les 12 \u00e0 24 prochains mois, notamment pour contrer l\u2019utilisation de l\u2019IA lors des cyberattaques, qui selon eux, va faciliter davantage le travail des attaquants dans les 5 ans \u00e0 venir.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Entre cybers\u00e9curit\u00e9 et cybermenaces, \u00e0 qui profite l\u2019IA ? &nbsp;mercredi 02 octobre 2024 Dans sa derni\u00e8re \u00e9tude, Vade r\u00e9v\u00e8le que l\u2019intelligence artificielle est, selon les r\u00e9pondants, autant b\u00e9n\u00e9fique et potentiellement utilis\u00e9e par les acteurs malveillants que pour des strat\u00e9gies de d\u00e9fense du c\u00f4t\u00e9 des entreprises.&nbsp;Dirigeants et d\u00e9cideurs fran\u00e7ais sont en effet autant \u00e0 penser que&#8230;<\/p>\n","protected":false},"author":1,"featured_media":1004,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_kadence_starter_templates_imported_post":false,"_kad_post_transparent":"","_kad_post_title":"hide","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"_kad_post_classname":"","footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":true,"token":"eyJpbWciOiJodHRwczpcL1wvYXlyaWx5cy5jb21cL3dwLWNvbnRlbnRcL3VwbG9hZHNcLzIwMjRcLzEwXC9QQy1ldC1zZXJlbml0ZS1pc3RvY2twaG90by0xMzA1MjI3MDI3LTIwNDh4MjA0OC0xLTEwMjR4NjYzLmpwZyIsInR4dCI6IkVudHJlIGN5YmVyc1x1MDBlOWN1cml0XHUwMGU5IGV0IGN5YmVybWVuYWNlcywgXHUwMGUwIHF1aSBwcm9maXRlIGxcdTIwMTlJQSA_IiwidGVtcGxhdGUiOiJoaWdod2F5IiwiYmxvZ19pZCI6MjM1MzM1MDIzfQ.kqWsStdWElHkmQ1cVTExUlv_ZU0lFVAAqJfD-nMSkIMMQ"},"version":2}},"categories":[20,22],"tags":[],"class_list":["post-1000","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-accueil","category-securite-informatique"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.8 (Yoast SEO v26.0) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\r\n<title>Cybers\u00e9curit\u00e9 et Cybermenaces : L&#039;Intelligence Artificielle en question - Prestataire informatique Viroflay en r\u00e9gion parisienne depuis 2003 pour les PME\/PMI<\/title>\r\n<meta name=\"description\" content=\"D\u00e9couvrez l&#039;impact de l&#039;intelligence artificielle sur la cybers\u00e9curit\u00e9. Comment les entreprises utilisent-elles l&#039;IA pour se d\u00e9fendre contre les cybermenaces ?\" \/>\r\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\r\n<link rel=\"canonical\" href=\"https:\/\/ayrilys.com\/index.php\/entre-cybersecurite-et-cybermenaces-a-qui-profite-ia\/\" \/>\r\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\r\n<meta property=\"og:type\" content=\"article\" \/>\r\n<meta property=\"og:title\" content=\"Entre cybers\u00e9curit\u00e9 et cybermenaces, \u00e0 qui profite l\u2019IA ?\" \/>\r\n<meta property=\"og:description\" content=\"Entre cybers\u00e9curit\u00e9 et cybermenaces, \u00e0 qui profite l\u2019IA ? Prestataire informatique Viroflay en r\u00e9gion parisienne depuis 2003 pour les PME\/PMI\" \/>\r\n<meta property=\"og:url\" content=\"https:\/\/ayrilys.com\/index.php\/entre-cybersecurite-et-cybermenaces-a-qui-profite-ia\/\" \/>\r\n<meta property=\"og:site_name\" content=\"Prestataire informatique Viroflay en r\u00e9gion parisienne depuis 2003 pour les PME\/PMI\" \/>\r\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/profile.php?id=61563219240658\" \/>\r\n<meta property=\"article:published_time\" content=\"2024-10-03T10:03:12+00:00\" \/>\r\n<meta property=\"article:modified_time\" content=\"2024-10-03T10:07:11+00:00\" \/>\r\n<meta property=\"og:image\" content=\"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/10\/PC-et-serenite-istockphoto-1305227027-2048x2048-1.jpg\" \/>\r\n\t<meta property=\"og:image:width\" content=\"2048\" \/>\r\n\t<meta property=\"og:image:height\" content=\"1326\" \/>\r\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\r\n<meta name=\"author\" content=\"admin\" \/>\r\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\r\n<meta name=\"twitter:creator\" content=\"@Ayrilys165097\" \/>\r\n<meta name=\"twitter:site\" content=\"@Ayrilys165097\" \/>\r\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\r\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/ayrilys.com\/index.php\/entre-cybersecurite-et-cybermenaces-a-qui-profite-ia\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/ayrilys.com\/index.php\/entre-cybersecurite-et-cybermenaces-a-qui-profite-ia\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/ayrilys.com\/#\/schema\/person\/a0005f5083786553a31b7393beac4f94\"},\"headline\":\"Entre cybers\u00e9curit\u00e9 et cybermenaces, \u00e0 qui profite l\u2019IA ?\",\"datePublished\":\"2024-10-03T10:03:12+00:00\",\"dateModified\":\"2024-10-03T10:07:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/ayrilys.com\/index.php\/entre-cybersecurite-et-cybermenaces-a-qui-profite-ia\/\"},\"wordCount\":556,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/ayrilys.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/ayrilys.com\/index.php\/entre-cybersecurite-et-cybermenaces-a-qui-profite-ia\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/10\/PC-et-serenite-istockphoto-1305227027-2048x2048-1.jpg\",\"articleSection\":[\"Accueil\",\"S\u00e9curit\u00e9 informatique\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/ayrilys.com\/index.php\/entre-cybersecurite-et-cybermenaces-a-qui-profite-ia\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ayrilys.com\/index.php\/entre-cybersecurite-et-cybermenaces-a-qui-profite-ia\/\",\"url\":\"https:\/\/ayrilys.com\/index.php\/entre-cybersecurite-et-cybermenaces-a-qui-profite-ia\/\",\"name\":\"Cybers\u00e9curit\u00e9 et Cybermenaces : L'Intelligence Artificielle en question - Prestataire informatique Viroflay en r\u00e9gion parisienne depuis 2003 pour les PME\/PMI\",\"isPartOf\":{\"@id\":\"https:\/\/ayrilys.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/ayrilys.com\/index.php\/entre-cybersecurite-et-cybermenaces-a-qui-profite-ia\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/ayrilys.com\/index.php\/entre-cybersecurite-et-cybermenaces-a-qui-profite-ia\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/10\/PC-et-serenite-istockphoto-1305227027-2048x2048-1.jpg\",\"datePublished\":\"2024-10-03T10:03:12+00:00\",\"dateModified\":\"2024-10-03T10:07:11+00:00\",\"description\":\"D\u00e9couvrez l'impact de l'intelligence artificielle sur la cybers\u00e9curit\u00e9. Comment les entreprises utilisent-elles l'IA pour se d\u00e9fendre contre les cybermenaces ?\",\"breadcrumb\":{\"@id\":\"https:\/\/ayrilys.com\/index.php\/entre-cybersecurite-et-cybermenaces-a-qui-profite-ia\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ayrilys.com\/index.php\/entre-cybersecurite-et-cybermenaces-a-qui-profite-ia\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/ayrilys.com\/index.php\/entre-cybersecurite-et-cybermenaces-a-qui-profite-ia\/#primaryimage\",\"url\":\"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/10\/PC-et-serenite-istockphoto-1305227027-2048x2048-1.jpg\",\"contentUrl\":\"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/10\/PC-et-serenite-istockphoto-1305227027-2048x2048-1.jpg\",\"width\":2048,\"height\":1326,\"caption\":\"Young woman working on laptop in the nature . Leisure activities \/ Remote working concept.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ayrilys.com\/index.php\/entre-cybersecurite-et-cybermenaces-a-qui-profite-ia\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/ayrilys.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Entre cybers\u00e9curit\u00e9 et cybermenaces, \u00e0 qui profite l\u2019IA ?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ayrilys.com\/#website\",\"url\":\"https:\/\/ayrilys.com\/\",\"name\":\"Ayrilys prestataire informatique infog\u00e9rance PME TPE MSP depuis 2003 sur Viroflay\",\"description\":\"Prestataire informatique Viroflay en r\u00e9gion parisienne PME TPE  ile de France depuis plus de 20 ans\",\"publisher\":{\"@id\":\"https:\/\/ayrilys.com\/#organization\"},\"alternateName\":\"Ayriliys infog\u00e9rance fournisseur de services manag\u00e9s MSP PME TPE Viroflay\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ayrilys.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/ayrilys.com\/#organization\",\"name\":\"Ayrilys\",\"url\":\"https:\/\/ayrilys.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/ayrilys.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/07\/Ayrilys-Logo-V1.png\",\"contentUrl\":\"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/07\/Ayrilys-Logo-V1.png\",\"width\":119,\"height\":64,\"caption\":\"Ayrilys\"},\"image\":{\"@id\":\"https:\/\/ayrilys.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/profile.php?id=61563219240658\",\"https:\/\/x.com\/Ayrilys165097\"],\"description\":\"Prestataire informatique depuis plus de 20 ans pour les PME et TPE\",\"email\":\"ayrilys@ayrilys.com\",\"telephone\":\"+33139242197\",\"legalName\":\"Ayrilys\",\"foundingDate\":\"2003-01-01\",\"vatID\":\"FR90449159011\",\"taxID\":\"44915901100013\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"1\",\"maxValue\":\"10\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/ayrilys.com\/#\/schema\/person\/a0005f5083786553a31b7393beac4f94\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/ayrilys.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/673394efbb9f6f675f3aa2444209d504?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/673394efbb9f6f675f3aa2444209d504?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"http:\/\/ayrilys.com\"],\"url\":\"https:\/\/ayrilys.com\/index.php\/author\/admin\/\"}]}<\/script>\r\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cybers\u00e9curit\u00e9 et Cybermenaces : L'Intelligence Artificielle en question - Prestataire informatique Viroflay en r\u00e9gion parisienne depuis 2003 pour les PME\/PMI","description":"D\u00e9couvrez l'impact de l'intelligence artificielle sur la cybers\u00e9curit\u00e9. Comment les entreprises utilisent-elles l'IA pour se d\u00e9fendre contre les cybermenaces ?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ayrilys.com\/index.php\/entre-cybersecurite-et-cybermenaces-a-qui-profite-ia\/","og_locale":"fr_FR","og_type":"article","og_title":"Entre cybers\u00e9curit\u00e9 et cybermenaces, \u00e0 qui profite l\u2019IA ?","og_description":"Entre cybers\u00e9curit\u00e9 et cybermenaces, \u00e0 qui profite l\u2019IA ? Prestataire informatique Viroflay en r\u00e9gion parisienne depuis 2003 pour les PME\/PMI","og_url":"https:\/\/ayrilys.com\/index.php\/entre-cybersecurite-et-cybermenaces-a-qui-profite-ia\/","og_site_name":"Prestataire informatique Viroflay en r\u00e9gion parisienne depuis 2003 pour les PME\/PMI","article_publisher":"https:\/\/www.facebook.com\/profile.php?id=61563219240658","article_published_time":"2024-10-03T10:03:12+00:00","article_modified_time":"2024-10-03T10:07:11+00:00","og_image":[{"width":2048,"height":1326,"url":"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/10\/PC-et-serenite-istockphoto-1305227027-2048x2048-1.jpg","type":"image\/jpeg"}],"author":"admin","twitter_card":"summary_large_image","twitter_creator":"@Ayrilys165097","twitter_site":"@Ayrilys165097","twitter_misc":{"\u00c9crit par":"admin","Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ayrilys.com\/index.php\/entre-cybersecurite-et-cybermenaces-a-qui-profite-ia\/#article","isPartOf":{"@id":"https:\/\/ayrilys.com\/index.php\/entre-cybersecurite-et-cybermenaces-a-qui-profite-ia\/"},"author":{"name":"admin","@id":"https:\/\/ayrilys.com\/#\/schema\/person\/a0005f5083786553a31b7393beac4f94"},"headline":"Entre cybers\u00e9curit\u00e9 et cybermenaces, \u00e0 qui profite l\u2019IA ?","datePublished":"2024-10-03T10:03:12+00:00","dateModified":"2024-10-03T10:07:11+00:00","mainEntityOfPage":{"@id":"https:\/\/ayrilys.com\/index.php\/entre-cybersecurite-et-cybermenaces-a-qui-profite-ia\/"},"wordCount":556,"commentCount":0,"publisher":{"@id":"https:\/\/ayrilys.com\/#organization"},"image":{"@id":"https:\/\/ayrilys.com\/index.php\/entre-cybersecurite-et-cybermenaces-a-qui-profite-ia\/#primaryimage"},"thumbnailUrl":"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/10\/PC-et-serenite-istockphoto-1305227027-2048x2048-1.jpg","articleSection":["Accueil","S\u00e9curit\u00e9 informatique"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/ayrilys.com\/index.php\/entre-cybersecurite-et-cybermenaces-a-qui-profite-ia\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/ayrilys.com\/index.php\/entre-cybersecurite-et-cybermenaces-a-qui-profite-ia\/","url":"https:\/\/ayrilys.com\/index.php\/entre-cybersecurite-et-cybermenaces-a-qui-profite-ia\/","name":"Cybers\u00e9curit\u00e9 et Cybermenaces : L'Intelligence Artificielle en question - Prestataire informatique Viroflay en r\u00e9gion parisienne depuis 2003 pour les PME\/PMI","isPartOf":{"@id":"https:\/\/ayrilys.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ayrilys.com\/index.php\/entre-cybersecurite-et-cybermenaces-a-qui-profite-ia\/#primaryimage"},"image":{"@id":"https:\/\/ayrilys.com\/index.php\/entre-cybersecurite-et-cybermenaces-a-qui-profite-ia\/#primaryimage"},"thumbnailUrl":"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/10\/PC-et-serenite-istockphoto-1305227027-2048x2048-1.jpg","datePublished":"2024-10-03T10:03:12+00:00","dateModified":"2024-10-03T10:07:11+00:00","description":"D\u00e9couvrez l'impact de l'intelligence artificielle sur la cybers\u00e9curit\u00e9. Comment les entreprises utilisent-elles l'IA pour se d\u00e9fendre contre les cybermenaces ?","breadcrumb":{"@id":"https:\/\/ayrilys.com\/index.php\/entre-cybersecurite-et-cybermenaces-a-qui-profite-ia\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ayrilys.com\/index.php\/entre-cybersecurite-et-cybermenaces-a-qui-profite-ia\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/ayrilys.com\/index.php\/entre-cybersecurite-et-cybermenaces-a-qui-profite-ia\/#primaryimage","url":"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/10\/PC-et-serenite-istockphoto-1305227027-2048x2048-1.jpg","contentUrl":"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/10\/PC-et-serenite-istockphoto-1305227027-2048x2048-1.jpg","width":2048,"height":1326,"caption":"Young woman working on laptop in the nature . Leisure activities \/ Remote working concept."},{"@type":"BreadcrumbList","@id":"https:\/\/ayrilys.com\/index.php\/entre-cybersecurite-et-cybermenaces-a-qui-profite-ia\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/ayrilys.com\/"},{"@type":"ListItem","position":2,"name":"Entre cybers\u00e9curit\u00e9 et cybermenaces, \u00e0 qui profite l\u2019IA ?"}]},{"@type":"WebSite","@id":"https:\/\/ayrilys.com\/#website","url":"https:\/\/ayrilys.com\/","name":"Ayrilys prestataire informatique infog\u00e9rance PME TPE MSP depuis 2003 sur Viroflay","description":"Prestataire informatique Viroflay en r\u00e9gion parisienne PME TPE  ile de France depuis plus de 20 ans","publisher":{"@id":"https:\/\/ayrilys.com\/#organization"},"alternateName":"Ayriliys infog\u00e9rance fournisseur de services manag\u00e9s MSP PME TPE Viroflay","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ayrilys.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/ayrilys.com\/#organization","name":"Ayrilys","url":"https:\/\/ayrilys.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/ayrilys.com\/#\/schema\/logo\/image\/","url":"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/07\/Ayrilys-Logo-V1.png","contentUrl":"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/07\/Ayrilys-Logo-V1.png","width":119,"height":64,"caption":"Ayrilys"},"image":{"@id":"https:\/\/ayrilys.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/profile.php?id=61563219240658","https:\/\/x.com\/Ayrilys165097"],"description":"Prestataire informatique depuis plus de 20 ans pour les PME et TPE","email":"ayrilys@ayrilys.com","telephone":"+33139242197","legalName":"Ayrilys","foundingDate":"2003-01-01","vatID":"FR90449159011","taxID":"44915901100013","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"1","maxValue":"10"}},{"@type":"Person","@id":"https:\/\/ayrilys.com\/#\/schema\/person\/a0005f5083786553a31b7393beac4f94","name":"admin","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/ayrilys.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/673394efbb9f6f675f3aa2444209d504?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/673394efbb9f6f675f3aa2444209d504?s=96&d=mm&r=g","caption":"admin"},"sameAs":["http:\/\/ayrilys.com"],"url":"https:\/\/ayrilys.com\/index.php\/author\/admin\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/ayrilys.com\/wp-content\/uploads\/2024\/10\/PC-et-serenite-istockphoto-1305227027-2048x2048-1.jpg","jetpack_sharing_enabled":true,"jetpack_likes_enabled":true,"jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/ayrilys.com\/index.php\/wp-json\/wp\/v2\/posts\/1000","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ayrilys.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ayrilys.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ayrilys.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ayrilys.com\/index.php\/wp-json\/wp\/v2\/comments?post=1000"}],"version-history":[{"count":2,"href":"https:\/\/ayrilys.com\/index.php\/wp-json\/wp\/v2\/posts\/1000\/revisions"}],"predecessor-version":[{"id":1003,"href":"https:\/\/ayrilys.com\/index.php\/wp-json\/wp\/v2\/posts\/1000\/revisions\/1003"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ayrilys.com\/index.php\/wp-json\/wp\/v2\/media\/1004"}],"wp:attachment":[{"href":"https:\/\/ayrilys.com\/index.php\/wp-json\/wp\/v2\/media?parent=1000"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ayrilys.com\/index.php\/wp-json\/wp\/v2\/categories?post=1000"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ayrilys.com\/index.php\/wp-json\/wp\/v2\/tags?post=1000"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}