AI – Top-of-Mind in 2025
madhav
Thu, 01/30/2025 – 05:25
But the AI roller coaster is just one ride at the park. Also worth noting are impending advancements in quantum computing, a rise in deepfakes prompting a crack-down on identities, and data privacy conversations moving to priority one for many of the world’s largest stages.
Here’s a look at what we think is in store for artificial intelligence in 2025.
Where AI is heading in 2025
It’s hard to believe that ChatGPT was released just a little over 24 months ago (opening the floodgates for generative AI). Nothing has taken up so much mindshare in the security space since the internet became, well, the internet. Now we are here, grappling with the challenges and gearing up for whatever 2025 will bring.
And what is that exactly? We predict a few things:
- AI-based social engineering running rampant | Sophisticated, word-perfect AI-based phishing attacks will increase the number of breaches due to increasingly persuasive social engineering techniques. These include perfect spelling and grammar, the ability to communicate perfectly in virtually any language, and AI-generated profiles of users that analyze and copy their style of writing and speech, as well as voice-changing techniques and deepfake videos.
- New IAM tools to respond to AI-based threats | Synthetic AI-generated content will drive the adoption of identity and access management (IAM) tools like digital identity wallets, biometric identity verification, and AI/ML-powered document verification, especially in the financial sector.
- Enforcement of the EU AI Act | Countries grappling with the EU AI Act and other AI-based legislation as they struggle to meet mandated requirements for the safe and ethical use of artificial intelligence. Phased compliance deadlines range from 2 February 2025 to 2031, with at least one new metric to meet yearly.
- A Global AI legislative evolution | Other AI-based mandates will continue to emerge, such as a poten
[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.This article has been indexed from Security BoulevardRead the original article: