{"id":11742,"date":"2024-08-04T15:48:05","date_gmt":"2024-08-04T10:18:05","guid":{"rendered":"https:\/\/reconcybersecurity.com\/blogs\/?post_type=web-story&#038;p=11742"},"modified":"2024-08-04T15:49:07","modified_gmt":"2024-08-04T10:19:07","slug":"detecting-cyber-threats-ais-impact-on-business-protection","status":"publish","type":"web-story","link":"https:\/\/reconcybersecurity.com\/blogs\/web-stories\/detecting-cyber-threats-ais-impact-on-business-protection\/","title":{"rendered":"Detecting Cyber Threats: AI&#8217;s Impact on Business Protection"},"content":{"rendered":"<p><html amp=\"\" lang=\"en\"><head><meta charSet=\"utf-8\"\/><meta name=\"viewport\" content=\"width=device-width,minimum-scale=1,initial-scale=1\"\/><script async=\"\" src=\"https:\/\/cdn.ampproject.org\/v0.js\"><\/script><script async=\"\" src=\"https:\/\/cdn.ampproject.org\/v0\/amp-story-1.0.js\" custom-element=\"amp-story\"><\/script><link href=\"https:\/\/fonts.googleapis.com\/css2?display=swap&amp;family=Roboto%3Awght%40700\" rel=\"stylesheet\"\/><link href=\"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection.png\" rel=\"preload\" as=\"image\"\/>\n<style amp-boilerplate=\"\">body{-webkit-animation:-amp-start 8s steps(1,end) 0s 1 normal both;-moz-animation:-amp-start 8s steps(1,end) 0s 1 normal both;-ms-animation:-amp-start 8s steps(1,end) 0s 1 normal both;animation:-amp-start 8s steps(1,end) 0s 1 normal both}@-webkit-keyframes -amp-start{from{visibility:hidden}to{visibility:visible}}@-moz-keyframes -amp-start{from{visibility:hidden}to{visibility:visible}}@-ms-keyframes -amp-start{from{visibility:hidden}to{visibility:visible}}@-o-keyframes -amp-start{from{visibility:hidden}to{visibility:visible}}@keyframes -amp-start{from{visibility:hidden}to{visibility:visible}}<\/style>\n<p><noscript><\/p>\n<style amp-boilerplate=\"\">body{-webkit-animation:none;-moz-animation:none;-ms-animation:none;animation:none}<\/style>\n<p><\/noscript><\/p>\n<style amp-custom=\"\">\n              h1, h2, h3 { font-weight: normal; }<\/p>\n<p>              amp-story-page {\n                background-color: #131516;\n              }<\/p>\n<p>              amp-story-grid-layer {\n                overflow: visible;\n              }<\/p>\n<p>              @media (max-aspect-ratio: 9 \/ 16)  {\n                @media (min-aspect-ratio: 320 \/ 678) {\n                  amp-story-grid-layer.grid-layer {\n                    margin-top: calc((100% \/ 0.5625 - 100% \/ 0.6666666666666666) \/ 2);\n                  }\n                }\n              }<\/p>\n<p>              @media not all and (min-resolution:.001dpcm) {\n                @media {\n                  p.text-wrapper > span {\n                    font-size: calc(100% - 0.5px);\n                  }\n                }\n              }<\/p>\n<p>              .page-fullbleed-area,\n              .page-background-overlay-area {\n                position: absolute;\n                overflow: hidden;\n                width: 100%;\n                left: 0;\n                height: calc(1.1851851851851851 * 100%);\n                top: calc((1 - 1.1851851851851851) * 100% \/ 2);\n              }<\/p>\n<p>              .element-overlay-area {\n                position: absolute;\n                width: 100%;\n                height: 100%;\n                top: 0;\n                left: 0;\n              }<\/p>\n<p>              .page-safe-area {\n                overflow: visible;\n                position: absolute;\n                top: 0;\n                bottom: 0;\n                left: 0;\n                right: 0;\n                width: 100%;\n                height: calc(0.84375 * 100%);\n                margin: auto 0;\n              }<\/p>\n<p>              .mask {\n                position: absolute;\n                overflow: hidden;\n              }<\/p>\n<p>              .fill {\n                position: absolute;\n                top: 0;\n                left: 0;\n                right: 0;\n                bottom: 0;\n                margin: 0;\n              }<\/p>\n<p>              @media (prefers-reduced-motion: no-preference) {\n                .animation-wrapper {\n                  opacity: var(--initial-opacity);\n                  transform: var(--initial-transform);\n                }\n              }<\/p>\n<p>              amp-story-grid-layer.align-bottom {\n                align-content: end;\n                padding: 0;\n                \/*\n                  AMP CTA Layer will exactly occupy 74px regardless of any device.\n                  To space out captions 74px from the BOTTOM (AMP CTA Layer),\n                  74px from the TOP should also be spaced out and thus: 2 * 74px\n                  will be the desired max-height.\n                *\/\n                max-height: calc(100vh - (2 * 74px));\n              }<\/p>\n<p>              .captions-area {\n                padding: 0 32px 0;\n              }<\/p>\n<p>              amp-story-captions {\n                margin-bottom: 16px;\n                text-align: center;\n              }<\/p>\n<p>              amp-story-audio-sticker {\n                height: 100%;\n              }<\/p>\n<p>              .audio-sticker {\n                font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, Oxygen-Sans, Ubuntu, Cantarell, 'Helvetica Neue', sans-serif;\n              }\n              <\/style>\n<p><meta name=\"web-stories-replace-head-start\"\/><title>Detecting Cyber Threats: AI&#x27;s Impact on Business Protection<\/title><link rel=\"canonical\" href=\"https:\/\/reconcybersecurity.com\/blogs\/web-stories\/detecting-cyber-threats-ais-impact-on-business-protection\/\"\/><meta name=\"web-stories-replace-head-end\"\/><\/head><body><amp-story standalone=\"\" publisher=\"Recon Cyber security\" publisher-logo-src=\"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/Recon-Cyber-Security.jpeg\" title=\"Detecting Cyber Threats: AI&#x27;s Impact on Business Protection\" poster-portrait-src=\"\"><amp-story-page id=\"d2d710f7-c5d9-47c1-b68e-a8ee55994985\" auto-advance-after=\"10s\"><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\" style=\"background-color:#130c7b\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:0;top:-9.25926%;width:100%;height:118.51852%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0\" class=\"mask\" id=\"el-7cbdaca5-6964-4a89-b32d-ca8aea7db0a8\">\n<div style=\"position:absolute;width:316.04939%;height:100%;left:-108.02469%;top:0%\" data-leaf-element=\"true\"><amp-img layout=\"fill\" src=\"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection.png\" alt=\"Detecting Cyber Threats: AI&#x27;s Impact on Business Protection | recon cyber security\" srcSet=\"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection.png 1280w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection-1160x653.png 1160w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection-1024x576.png 1024w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection-800x450.png 800w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection-768x432.png 768w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection-380x214.png 380w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection-300x169.png 300w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection-150x84.png 150w\" sizes=\"(min-width: 1024px) 143vh, 317vw\" disable-inline-width=\"true\"><\/amp-img><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:11.65049%;top:-0.32362%;width:61.65049%;height:35.11327%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0;border-radius:0.7874015748031495% 0.7874015748031495% 0.7874015748031495% 0.7874015748031495% \/ 0.9216589861751152% 0.9216589861751152% 0.9216589861751152% 0.9216589861751152%\" id=\"el-185632da-dac6-4a84-a3c8-95bd39fdc80c\"><a href=\"https:\/\/reconcybersecurity.com\/blogs\/ai-in-cybersecurity-enhancing-threat-detection-business-protection\/\" data-tooltip-icon=\"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection.png\" data-tooltip-text=\"AI in Cybersecurity: Enhancing Threat Detection &amp; Business Protection\" target=\"_blank\" rel=\"noreferrer noopener\" style=\"width:100%;height:100%;display:block;position:absolute;top:0;left:0\"><\/p>\n<h2 id=\"detecting-cyber-threats-ais-impact-on-business-protection\" class=\"fill text-wrapper\" style=\"white-space:pre-line;overflow-wrap:break-word;word-break:break-word;margin:0;font-family:&quot;Roboto&quot;,sans-serif;font-size:0.485437em;line-height:calc(1.19em + 0.2666669413332729em);text-align:left;padding:0;color:#000000;background-color:#000;background:none\"><span style=\"display:block;position:relative;left:0;top:0;margin:-0.10703740157480231% 0;-webkit-box-decoration-break:clone;box-decoration-break:clone\"><span style=\"background-color:#000;-webkit-box-decoration-break:clone;box-decoration-break:clone;position:relative;padding:1.574803149606299% 3.149606299212598%;text-align:left;border-radius:2px 2px 2px 2px;color:transparent\"><span style=\"font-weight: 700\">Detecting Cyber Threats: AI&#8217;s Impact on Business Protection<\/span><\/span><\/span><\/h2>\n<h2 id=\"detecting-cyber-threats-ais-impact-on-business-protection-2\" class=\"fill text-wrapper\" style=\"white-space:pre-line;overflow-wrap:break-word;word-break:break-word;margin:0;font-family:&quot;Roboto&quot;,sans-serif;font-size:0.485437em;line-height:calc(1.19em + 0.2666669413332729em);text-align:left;padding:0;color:#000000;background-color:#000;background:none;position:absolute;top:0;left:0;right:0\" aria-hidden=\"true\"><span style=\"display:block;position:relative;left:0;top:0;margin:-0.10703740157480231% 0;-webkit-box-decoration-break:clone;box-decoration-break:clone\"><span style=\"background-color:#000;-webkit-box-decoration-break:clone;box-decoration-break:clone;position:relative;padding:1.574803149606299% 3.149606299212598%;text-align:left;border-radius:2px 2px 2px 2px;background:none\"><span style=\"font-weight: 700; color: #eee\">Detecting Cyber Threats: AI&#8217;s Impact on Business Protection<\/span><\/span><\/span><\/h2>\n<p><\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><\/amp-story-page><amp-story-page id=\"cd8f2688-1c65-4534-a646-12f7b30fc167\" auto-advance-after=\"10s\"><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\" style=\"background-color:#09121a\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:0;top:-9.25926%;width:100%;height:118.51852%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0\" class=\"mask\" id=\"el-4b050ce1-474a-4b93-9c07-e651dfda1494\">\n<div style=\"position:absolute;width:316.04939%;height:100%;left:-108.02469%;top:0%\" data-leaf-element=\"true\"><amp-img layout=\"fill\" src=\"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection-recon-cyber-security.png\" alt=\"\" srcSet=\"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection-recon-cyber-security.png 1280w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection-recon-cyber-security-1160x653.png 1160w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection-recon-cyber-security-1024x576.png 1024w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection-recon-cyber-security-800x450.png 800w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection-recon-cyber-security-768x432.png 768w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection-recon-cyber-security-380x214.png 380w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection-recon-cyber-security-300x169.png 300w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection-recon-cyber-security-150x84.png 150w\" sizes=\"(min-width: 1024px) 143vh, 317vw\" disable-inline-width=\"true\"><\/amp-img><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:27.42718%;top:69.41748%;width:52.6699%;height:26.3754%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0;border-radius:0.9216589861751152% 0.9216589861751152% 0.9216589861751152% 0.9216589861751152% \/ 1.2269938650306749% 1.2269938650306749% 1.2269938650306749% 1.2269938650306749%;background-clip:content-box;background-color:#000\" id=\"el-11b04b6e-9001-48ee-b538-03b911e21c75\"><a href=\"https:\/\/reconcybersecurity.com\/blogs\/ai-in-cybersecurity-enhancing-threat-detection-business-protection\/\" data-tooltip-icon=\"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection.png\" data-tooltip-text=\"AI in Cybersecurity: Enhancing Threat Detection &amp; Business Protection\" target=\"_blank\" rel=\"noreferrer noopener\" style=\"width:100%;height:100%;display:block;position:absolute;top:0;left:0\"><\/p>\n<h3 id=\"the-evolution-of-cyber-threat-detection-from-manual-to-ai-driven\" class=\"fill text-wrapper\" style=\"white-space:pre-line;overflow-wrap:break-word;word-break:break-word;margin:-0.1684907834101381% 0;font-family:&quot;Roboto&quot;,sans-serif;font-size:0.420712em;line-height:1.2;text-align:right;padding:1.8433179723502304% 3.686635944700461%;color:#000000\"><span><span style=\"font-weight: 700; color: #fff\">The Evolution of Cyber Threat Detection: From Manual to AI-Driven<\/span><\/span><\/h3>\n<p><\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><\/amp-story-page><\/amp-story><\/body><\/html><\/p>\n","protected":false},"excerpt":{"rendered":"Discover how AI is transforming cyber threat detection. Learn about AI&#8217;s impact on business protection, future trends, and ethical considerations. Enroll in the best cyber security courses in Delhi fo\n","protected":false},"author":1,"featured_media":0,"template":"","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"web_stories_publisher_logo":11731,"web_stories_poster":[],"web_stories_products":[],"footnotes":""},"web_story_category":[],"web_story_tag":[],"class_list":["post-11742","web-story","type-web-story","status-publish"],"story_data":{"version":47,"pages":[{"elements":[{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":false,"scale":100,"focalX":50,"focalY":50,"resource":{"type":"image","mimeType":"image\/png","width":1280,"height":720,"sizes":{"medium":{"file":"AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection-300x169.png","width":300,"height":169,"filesize":62668,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection-300x169.png"},"large":{"file":"AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection-1024x576.png","width":1024,"height":576,"filesize":545414,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection-1024x576.png"},"thumbnail":{"file":"AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection-150x150.png","width":150,"height":150,"filesize":36632,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection-150x150.png"},"medium_large":{"file":"AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection-768x432.png","width":768,"height":432,"filesize":335414,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection-768x432.png"},"cnvs-small":{"file":"AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection-80x80.png","width":80,"height":80,"filesize":11797,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection-80x80.png"},"cnvs-thumbnail":{"file":"AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection-300x225.png","width":300,"height":225,"filesize":91578,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection-300x225.png"},"pk-small":{"file":"AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection-80x80.png","width":80,"height":80,"filesize":11797,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection-80x80.png"},"pk-thumbnail":{"file":"AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection-300x225.png","width":300,"height":225,"filesize":91578,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection-300x225.png"},"csco-small":{"file":"AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection-80x80.png","width":80,"height":80,"filesize":11797,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection-80x80.png"},"csco-intermediate":{"file":"AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection-200x140.png","width":200,"height":140,"filesize":40531,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection-200x140.png"},"csco-thumbnail":{"file":"AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection-380x220.png","width":380,"height":220,"filesize":99870,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection-380x220.png"},"csco-thumbnail-alternative":{"file":"AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection-300x180.png","width":300,"height":180,"filesize":69445,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection-300x180.png"},"csco-thumbnail-uncropped":{"file":"AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection-380x214.png","width":380,"height":214,"filesize":96165,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection-380x214.png"},"csco-medium":{"file":"AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection-800x500.png","width":800,"height":500,"filesize":414376,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection-800x500.png"},"csco-medium-alternative":{"file":"AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection-560x336.png","width":560,"height":336,"filesize":210888,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection-560x336.png"},"csco-medium-uncropped":{"file":"AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection-800x450.png","width":800,"height":450,"filesize":358810,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection-800x450.png"},"csco-large":{"file":"AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection-1160x680.png","width":1160,"height":680,"filesize":710410,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection-1160x680.png"},"csco-large-uncropped":{"file":"AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection-1160x653.png","width":1160,"height":653,"filesize":672077,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection-1160x653.png"},"web-stories-poster-portrait":{"file":"AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection-640x720.png","width":640,"height":720,"filesize":562801,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection-640x720.png"},"web-stories-publisher-logo":{"file":"AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection-96x96.png","width":96,"height":96,"filesize":16458,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection-96x96.png"},"web-stories-thumbnail":{"file":"AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection-150x84.png","width":150,"height":84,"filesize":18170,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection-150x84.png"},"full":{"file":"AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection.png","width":1280,"height":720,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection.png"}},"isPlaceholder":false,"isExternal":false,"needsProxy":false,"baseColor":"#130c7b","blurHash":"U78:vB0JZL.TB@+taaXn0J-mtmi.:+KJXBRR","creationDate":"2024-08-04T10:01:57","src":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection.png","id":11739,"alt":"Detecting Cyber Threats: AI's Impact on Business Protection | recon cyber security","local":false,"provider":"local"},"type":"image","x":48,"y":0,"width":330,"height":185,"mask":{"type":"rectangle","showInLibrary":true,"name":"Rectangle","path":"M 0,0 1,0 1,1 0,1 0,0 Z","ratio":1,"supportsBorder":true},"id":"7cbdaca5-6964-4a89-b32d-ca8aea7db0a8","isBackground":true,"isHidden":false},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundTextMode":"HIGHLIGHT","font":{"family":"Roboto"},"fontSize":30,"backgroundColor":{"color":{"r":0,"g":0,"b":0}},"lineHeight":1.19,"textAlign":"left","padding":{"locked":true,"hasHiddenPadding":true,"horizontal":8,"vertical":4},"content":"<span style=\"font-weight: 700; color: #eee\">Detecting Cyber Threats: AI's Impact on Business Protection<\/span>","x":48,"y":-2,"width":254,"borderRadius":{"locked":true,"topLeft":2,"topRight":2,"bottomRight":2,"bottomLeft":2},"type":"text","height":217,"id":"185632da-dac6-4a84-a3c8-95bd39fdc80c","marginOffset":0.5437499999999957,"link":{"needsProxy":false,"url":"https:\/\/reconcybersecurity.com\/blogs\/ai-in-cybersecurity-enhancing-threat-detection-business-protection\/","rel":[],"type":"regular","pageId":null,"icon":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection.png","desc":"AI in Cybersecurity: Enhancing Threat Detection & Business Protection"}}],"backgroundColor":{"color":{"r":255,"g":255,"b":255}},"id":"d2d710f7-c5d9-47c1-b68e-a8ee55994985","defaultBackgroundElement":{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"x":1,"y":1,"width":1,"height":1,"mask":{"type":"rectangle"},"isBackground":true,"isDefaultBackground":true,"type":"shape","id":"9877c661-147a-4e75-a93e-c28e3c66e501"},"animations":[]},{"elements":[{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":false,"scale":100,"focalX":50,"focalY":50,"resource":{"type":"image","mimeType":"image\/png","width":1280,"height":720,"sizes":{"medium":{"file":"AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection-recon-cyber-security-300x169.png","width":300,"height":169,"filesize":60637,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection-recon-cyber-security-300x169.png"},"large":{"file":"AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection-recon-cyber-security-1024x576.png","width":1024,"height":576,"filesize":535176,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection-recon-cyber-security-1024x576.png"},"thumbnail":{"file":"AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection-recon-cyber-security-150x150.png","width":150,"height":150,"filesize":30572,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection-recon-cyber-security-150x150.png"},"medium_large":{"file":"AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection-recon-cyber-security-768x432.png","width":768,"height":432,"filesize":328937,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection-recon-cyber-security-768x432.png"},"cnvs-small":{"file":"AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection-recon-cyber-security-80x80.png","width":80,"height":80,"filesize":10388,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection-recon-cyber-security-80x80.png"},"cnvs-thumbnail":{"file":"AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection-recon-cyber-security-300x225.png","width":300,"height":225,"filesize":80171,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection-recon-cyber-security-300x225.png"},"pk-small":{"file":"AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection-recon-cyber-security-80x80.png","width":80,"height":80,"filesize":10388,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection-recon-cyber-security-80x80.png"},"pk-thumbnail":{"file":"AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection-recon-cyber-security-300x225.png","width":300,"height":225,"filesize":80171,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection-recon-cyber-security-300x225.png"},"csco-small":{"file":"AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection-recon-cyber-security-80x80.png","width":80,"height":80,"filesize":10388,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection-recon-cyber-security-80x80.png"},"csco-intermediate":{"file":"AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection-recon-cyber-security-200x140.png","width":200,"height":140,"filesize":36733,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection-recon-cyber-security-200x140.png"},"csco-thumbnail":{"file":"AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection-recon-cyber-security-380x220.png","width":380,"height":220,"filesize":94857,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection-recon-cyber-security-380x220.png"},"csco-thumbnail-alternative":{"file":"AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection-recon-cyber-security-300x180.png","width":300,"height":180,"filesize":65401,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection-recon-cyber-security-300x180.png"},"csco-thumbnail-uncropped":{"file":"AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection-recon-cyber-security-380x214.png","width":380,"height":214,"filesize":92193,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection-recon-cyber-security-380x214.png"},"csco-medium":{"file":"AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection-recon-cyber-security-800x500.png","width":800,"height":500,"filesize":388698,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection-recon-cyber-security-800x500.png"},"csco-medium-alternative":{"file":"AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection-recon-cyber-security-560x336.png","width":560,"height":336,"filesize":199057,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection-recon-cyber-security-560x336.png"},"csco-medium-uncropped":{"file":"AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection-recon-cyber-security-800x450.png","width":800,"height":450,"filesize":351887,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection-recon-cyber-security-800x450.png"},"csco-large":{"file":"AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection-recon-cyber-security-1160x680.png","width":1160,"height":680,"filesize":681942,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection-recon-cyber-security-1160x680.png"},"csco-large-uncropped":{"file":"AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection-recon-cyber-security-1160x653.png","width":1160,"height":653,"filesize":659009,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection-recon-cyber-security-1160x653.png"},"web-stories-poster-portrait":{"file":"AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection-recon-cyber-security-640x720.png","width":640,"height":720,"filesize":430318,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection-recon-cyber-security-640x720.png"},"web-stories-publisher-logo":{"file":"AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection-recon-cyber-security-96x96.png","width":96,"height":96,"filesize":14188,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection-recon-cyber-security-96x96.png"},"web-stories-thumbnail":{"file":"AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection-recon-cyber-security-150x84.png","width":150,"height":84,"filesize":18069,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection-recon-cyber-security-150x84.png"},"full":{"file":"AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection-recon-cyber-security.png","width":1280,"height":720,"mimeType":"image\/png","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection-recon-cyber-security.png"}},"isPlaceholder":false,"isExternal":false,"needsProxy":false,"baseColor":"#09121a","blurHash":"UB6ImYT}I9vKyXtmRPR48wvzxvK5MJMwtRtl","creationDate":"2024-08-04T10:01:03","src":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection-recon-cyber-security.png","id":11738,"alt":"","local":false},"type":"image","x":48,"y":0,"width":330,"height":185,"mask":{"type":"rectangle","showInLibrary":true,"name":"Rectangle","path":"M 0,0 1,0 1,1 0,1 0,0 Z","ratio":1,"supportsBorder":true},"id":"4b050ce1-474a-4b93-9c07-e651dfda1494","isBackground":true,"isHidden":false},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundTextMode":"FILL","font":{"family":"Roboto"},"fontSize":26,"backgroundColor":{"color":{"r":0,"g":0,"b":0}},"lineHeight":1.2,"textAlign":"right","padding":{"locked":true,"hasHiddenPadding":true,"horizontal":8,"vertical":4},"content":"<span style=\"font-weight: 700; color: #fff\">The Evolution of Cyber Threat Detection: From Manual to AI-Driven<\/span>","x":113,"y":429,"width":217,"borderRadius":{"locked":true,"topLeft":2,"topRight":2,"bottomRight":2,"bottomLeft":2},"type":"text","height":163,"id":"11b04b6e-9001-48ee-b538-03b911e21c75","marginOffset":0.7593749999999986,"link":{"needsProxy":false,"url":"https:\/\/reconcybersecurity.com\/blogs\/ai-in-cybersecurity-enhancing-threat-detection-business-protection\/","rel":[],"type":"regular","pageId":null,"icon":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/AI-in-Cybersecurity-Enhancing-Threat-Detection-Business-Protection.png","desc":"AI in Cybersecurity: Enhancing Threat Detection & Business Protection"}}],"backgroundColor":{"color":{"r":255,"g":255,"b":255}},"id":"cd8f2688-1c65-4534-a646-12f7b30fc167","defaultBackgroundElement":{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"x":1,"y":1,"width":1,"height":1,"mask":{"type":"rectangle"},"isBackground":true,"isDefaultBackground":true,"type":"shape","id":"d54b433e-9b34-4b10-9338-81cb7de86535"},"animations":[]}],"fonts":{"Roboto":{"family":"Roboto","fallbacks":["sans-serif"],"weights":[100,300,400,500,700,900],"styles":["italic","regular"],"variants":[[0,100],[1,100],[0,300],[1,300],[0,400],[1,400],[0,500],[1,500],[0,700],[1,700],[0,900],[1,900]],"service":"fonts.google.com","metrics":{"upm":2048,"asc":1900,"des":-500,"tAsc":1536,"tDes":-512,"tLGap":102,"wAsc":1946,"wDes":512,"xH":1082,"capH":1456,"yMin":-555,"yMax":2163,"hAsc":1900,"hDes":-500,"lGap":0}}},"autoAdvance":true,"defaultPageDuration":10,"currentStoryStyles":{"colors":[]}},"_links":{"self":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/web-stories\/v1\/web-story\/11742","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/web-stories\/v1\/web-story"}],"about":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/types\/web-story"}],"author":[{"embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/web-stories\/v1\/users\/1"}],"version-history":[{"count":2,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/web-stories\/v1\/web-story\/11742\/revisions"}],"predecessor-version":[{"id":11745,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/web-stories\/v1\/web-story\/11742\/revisions\/11745"}],"wp:attachment":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/web-stories\/v1\/media?parent=11742"}],"wp:term":[{"taxonomy":"web_story_category","embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/web-stories\/v1\/web_story_category?post=11742"},{"taxonomy":"web_story_tag","embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/web-stories\/v1\/web_story_tag?post=11742"}],"wp:lock":[{"embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/web-stories\/v1\/web-story\/11742\/lock"}],"wp:publisherlogo":[{"embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/web-stories\/v1\/media\/11731"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}