{"id":4005,"date":"2025-09-01T09:09:06","date_gmt":"2025-09-01T07:09:06","guid":{"rendered":"https:\/\/enthec.com\/?p=4005"},"modified":"2025-09-01T17:14:50","modified_gmt":"2025-09-01T15:14:50","slug":"ai-vs-ai-the-duel-between-artificial-intelligences-in-the-cybersecurity-war","status":"publish","type":"post","link":"https:\/\/enthec.com\/en\/ai-vs-ai-the-duel-between-artificial-intelligences-in-the-cybersecurity-war\/","title":{"rendered":"AI vs. AI: The duel between artificial intelligences in the cybersecurity war"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">.<\/span><b>Artificial intelligence <\/b> <span style=\"font-weight: 400;\">not only makes our daily tasks easier, but it also wages invisible battles on the internet. Until recently, cyberattacks were carried out by human hackers; we&#8217;re now entering a new, much more complex scenario:  <\/span><b>IA vs IA<\/b><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">On this new front, <\/span><b>artificial intelligences face each other. <\/b><span style=\"font-weight: 400;\">. On the one hand, we have malicious artificial intelligence, trained to discover vulnerabilities, evade security controls, or automate cyberattacks. On the other hand, defensive AI works to detect, analyze, and neutralize these threats. And all this happens in milliseconds.  <\/span><\/p>\n<p><span style=\"font-weight: 400;\">In the midst of this silent struggle, companies need tools that not only react but also<\/span> <b>anticipate the opponent&#8217;s moves. <\/b><span style=\"font-weight: 400;\">. And that&#8217;s where Kartos comes in, the solution designed by <\/span><a href=\"https:\/\/enthec.com\/en\/\"><span style=\"font-weight: 400;\">Enthec<\/span><\/a> <span style=\"font-weight: 400;\">for companies that want to be one step ahead.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><b>What is Kartos, and why does it stand out in this war?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Kartos is a cyber-surveillance solution developed by Enthec, designed to <\/span><b>help organizations continuously manage their threat exposure.<\/b><span style=\"font-weight: 400;\">. The objective is clear: to offer a detailed, accurate, and up-to-date view of the cyber risk that companies face from the outside in\u2014that is, from the attacker&#8217;s perspective.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Using advanced technology and an AI-based architecture, Kartos analyzes, detects, and alerts on exposed assets, security breaches, data leaks, and other key indicators that cybercriminals could exploit.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It&#8217;s not just about monitoring. <\/span><b>Kartos interprets information and helps prioritize actions<\/b><span style=\"font-weight: 400;\">so that cybersecurity leaders can make informed and rapid decisions in an environment where every second counts. These types of solutions help us stay protected and avoid falling victim to the next automated attack. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Discover how Kartos can help you protect your business right now. <\/span><b>Request a free demo and see how it works in your real-life environment.<\/b><\/p>\n<p>&nbsp;<\/p>\n<h2><b>AI vs. AI: A real-life battle or science fiction?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">What a few years ago might have sounded like a futuristic movie script is now a reality in the digital world. On this new game board,  <\/span><b>Artificial intelligences compete against each other, with a speed and precision that surpasses human intervention<\/b><span style=\"font-weight: 400;\">.<\/span><\/p>\n<h3><b>The new dynamics of automated cybercrime<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">For years, cyberattacks were mainly the work of individuals or organized groups. Today, thanks to the accessibility of specific algorithms and platforms,  <\/span><b>attackers use artificial intelligence to automate their strategies<\/b><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">From <\/span><a href=\"https:\/\/enthec.com\/en\/phishing-what-is-it-and-how-many-types-are-there\/\"><span style=\"font-weight: 400;\">phishing<\/span><\/a> <span style=\"font-weight: 400;\">to more sophisticated tools that test thousands of passwords per second, AI has become a dangerous weapon in the wrong hands.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">At the same time, cybersecurity teams have not been left behind. They are developing systems that use  <\/span><b>machine learning and predictive analytics<\/b> <span style=\"font-weight: 400;\">to detect suspicious patterns, anticipate movements, and close doors before they are opened.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The battle of<\/span> <b>IA vs IA<\/b> <span style=\"font-weight: 400;\">is already underway.<\/span><\/p>\n<h3><b>Why is offensive AI so difficult to detect?<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">One of the reasons this war is so complex is that the<\/span> <b>AI \u200b\u200bused by attackers learns and evolves rapidly. <\/b><span style=\"font-weight: 400;\">. They can modify their behavior, disguise themselves as legitimate traffic, or replicate user habits to avoid suspicion.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">According to a<\/span> <a href=\"https:\/\/www.capgemini.com\/co-es\/news\/press-releases\/la-ia-y-la-ia-generativa-estan-transformando-la-ciberseguridad-de-la-mayoria-de-las-organizaciones\/\"><span style=\"font-weight: 400;\">study by the consulting firm Capgemini<\/span><\/a><span style=\"font-weight: 400;\">,<\/span> <i><span style=\"font-weight: 400;\">97% of companies say they have suffered<\/span><\/i> <a href=\"https:\/\/enthec.com\/en\/security-breach-what-it-is-types-and-how-to-find-it\/\"><i><span style=\"font-weight: 400;\">security breaches<\/span><\/i><\/a> <i><span style=\"font-weight: 400;\">related to artificial intelligence,<\/span><\/i><span style=\"font-weight: 400;\">. which shows that <\/span><b>defense against AI is no longer a luxury but a necessity<\/b><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: center;\"><img decoding=\"async\" class=\"alignnone size-full wp-image-3999\" src=\"https:\/\/enthec.com\/wp-content\/uploads\/2025\/08\/ia-vs-ia.jpg\" alt=\"IA vs IA\" width=\"650\" height=\"358\" srcset=\"https:\/\/enthec.com\/wp-content\/uploads\/2025\/08\/ia-vs-ia.jpg 650w, https:\/\/enthec.com\/wp-content\/uploads\/2025\/08\/ia-vs-ia-300x165.jpg 300w, https:\/\/enthec.com\/wp-content\/uploads\/2025\/08\/ia-vs-ia-350x193.jpg 350w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/p>\n<p>&nbsp;<\/p>\n<h2><b>From prevention to continuous management: the role of CTEM<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Now,<\/span> <b>traditional prevention falls short,<\/b><span style=\"font-weight: 400;\">and it&#8217;s necessary to adopt models that operate continuously and automatically. The CTEM approach has become an essential tool for companies that want to maintain control in an environment where attackers learn and adapt faster than ever. <\/span><\/p>\n<h3><b>What is CTEM, and why is it so important?<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Continuous Threat Exposure Management (CTEM) is an approach that is <\/span><b>proactive and adaptive, <\/b><span style=\"font-weight: 400;\"> allowing organizations to continuously and automatically understand, assess, and reduce their exposure to cyber risk. In today&#8217;s environment, where cyberattacks can be directed and executed by artificial intelligence, having a static system is no longer an option. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Unlike traditional methods, which rely on periodic reviews or manual audits, the<\/span> <b>CTEM model evolves in real time<\/b><span style=\"font-weight: 400;\"> and adapts to the pace set by offensive AI. Threats no longer wait; they are generated, learned, and mutated with the same algorithmic logic that should defend us. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">And in an environment where intelligences attack and defend, <\/span><b>the key is to detect the unknown before the attacking AI does.<\/b><span style=\"font-weight: 400;\">. Continuous threat exposure monitoring (CTEM) enables defenses to not only react to, but also anticipate adversary movements with a constant, live data-driven approach.<\/span><\/p>\n<h3><b>How does Kartos fit into this approach?<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Kartos not only detects exposed assets (such as open domains, servers, or services) but also<\/span> <b>classifies and assesses their criticality and puts them in context with real-world data.<\/b><span style=\"font-weight: 400;\">. The AI \u200b\u200bbuilt into the tool learns from the environment, analyzes behaviors, and improves its alerting capabilities over time.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This continuous focus results in a<\/span> <b>lower probability of incidents and greater response capacity <\/b><span style=\"font-weight: 400;\"> when something unexpected happens. Instead of putting out fires, companies can anticipate and make decisions before a problem erupts. <\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><b>AI vs. AI and the future of cybersecurity<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">The evolution of cybersecurity is closely linked to the evolution of AI. As  <\/span><b>threats are becoming more intelligent and more autonomous,<\/b><span style=\"font-weight: 400;\">defenses must be equally dynamic. The future points to collaborative artificial intelligence, which will play a key role in anticipating, containing, and neutralizing attacks before they materialize. <\/span><\/p>\n<h3><b>Are we prepared for what&#8217;s coming?<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">The good news is that most organizations are already beginning to understand that the traditional cybersecurity model is becoming obsolete. But the bad news is that  <\/span><b>attackers are always looking for ways to get ahead, <\/b><span style=\"font-weight: 400;\">and in many cases, they succeed.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In this scenario, the key is to <\/span><b>combine technology, processes, and human talent.<\/b><span style=\"font-weight: 400;\">. AI doesn&#8217;t replace professionals, but it does enhance their response and analysis capabilities. Tools like Kartos allow security teams to focus their efforts where it really matters. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Furthermore, in the not-too-distant future, we are likely to see<\/span> <b>collaborative AI,<\/b><span style=\"font-weight: 400;\">which will not only react but also work in a network with other defenses to stop attacks in real time and on a large scale, a collective artificial intelligence at the service of global cybersecurity. <\/span><\/p>\n<p><b>The AI \u200b\u200bvs. AI war is not a distant threat; it is the present of cybersecurity.<\/b><span style=\"font-weight: 400;\"> Every day, thousands of attacks are launched and stopped without our knowledge, thanks to systems that learn, adapt, and respond autonomously.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For companies, the best strategy is not to wait to be attacked, but<\/span> <b>to prepare before it happens<\/b><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Enthec, with its innovative approach to cyber-surveillance and commitment to continuous threat management, is an essential ally in this new digital era for achieving maximum security thanks to artificial intelligence.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>.Artificial intelligence not only makes our daily tasks easier, but it also wages invisible battles on the internet. Until recently, [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":4002,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[44],"tags":[32,34],"class_list":["post-4005","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-en","tag-kartos-en","tag-ai"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>\u25b7 AI vs. AI: The Cybersecurity Battle | Enthec<\/title>\n<meta name=\"description\" content=\"In the fight between AI and AI, are you prepared? \u27a1\ufe0f Ensure your cybersecurity with Kartos and confront automated attacks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/enthec.com\/ia-vs-ia\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u25b7 AI vs. AI: The Cybersecurity Battle | Enthec\" \/>\n<meta property=\"og:description\" content=\"In the fight between AI and AI, are you prepared? \u27a1\ufe0f Ensure your cybersecurity with Kartos and confront automated attacks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/enthec.com\/ia-vs-ia\/\" \/>\n<meta property=\"og:site_name\" content=\"ENTHEC \u00b7 Kartos \u00b7 Qondar\" \/>\n<meta property=\"article:published_time\" content=\"2025-09-01T07:09:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-01T15:14:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/enthec.com\/wp-content\/uploads\/2025\/08\/IA-versus-IA-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1435\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Enthec\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Enthec\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/enthec.com\/ia-vs-ia\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/enthec.com\/ia-vs-ia\/\"},\"author\":{\"name\":\"Enthec\",\"@id\":\"https:\/\/enthec.com\/#\/schema\/person\/3ee5632ff6252f2a608293472d04f1a1\"},\"headline\":\"AI vs. AI: The duel between artificial intelligences in the cybersecurity war\",\"datePublished\":\"2025-09-01T07:09:06+00:00\",\"dateModified\":\"2025-09-01T15:14:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/enthec.com\/ia-vs-ia\/\"},\"wordCount\":1103,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/enthec.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/enthec.com\/ia-vs-ia\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/enthec.com\/wp-content\/uploads\/2025\/08\/IA-versus-IA-scaled.jpg\",\"keywords\":[\"Kartos\",\"AI\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/enthec.com\/ia-vs-ia\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/enthec.com\/ia-vs-ia\/\",\"url\":\"https:\/\/enthec.com\/ia-vs-ia\/\",\"name\":\"\u25b7 AI vs. AI: The Cybersecurity Battle | Enthec\",\"isPartOf\":{\"@id\":\"https:\/\/enthec.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/enthec.com\/ia-vs-ia\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/enthec.com\/ia-vs-ia\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/enthec.com\/wp-content\/uploads\/2025\/08\/IA-versus-IA-scaled.jpg\",\"datePublished\":\"2025-09-01T07:09:06+00:00\",\"dateModified\":\"2025-09-01T15:14:50+00:00\",\"description\":\"In the fight between AI and AI, are you prepared? \u27a1\ufe0f Ensure your cybersecurity with Kartos and confront automated attacks.\",\"breadcrumb\":{\"@id\":\"https:\/\/enthec.com\/ia-vs-ia\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/enthec.com\/ia-vs-ia\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/enthec.com\/ia-vs-ia\/#primaryimage\",\"url\":\"https:\/\/enthec.com\/wp-content\/uploads\/2025\/08\/IA-versus-IA-scaled.jpg\",\"contentUrl\":\"https:\/\/enthec.com\/wp-content\/uploads\/2025\/08\/IA-versus-IA-scaled.jpg\",\"width\":2560,\"height\":1435,\"caption\":\"IA versus IA\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/enthec.com\/ia-vs-ia\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/enthec.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"AI vs. AI: The duel between artificial intelligences in the cybersecurity war\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/enthec.com\/#website\",\"url\":\"https:\/\/enthec.com\/\",\"name\":\"ENTHEC\",\"description\":\"Advanced AI-driven Cyber-Surveillance Platform\",\"publisher\":{\"@id\":\"https:\/\/enthec.com\/#organization\"},\"alternateName\":\"ENTHEC \u00b7 Kartos \u00b7 Qondar\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/enthec.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/enthec.com\/#organization\",\"name\":\"ENTHEC\",\"alternateName\":\"ENTHEC \u00b7 Kartos \u00b7 Qondar\",\"url\":\"https:\/\/enthec.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/enthec.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/enthec.com\/wp-content\/uploads\/2024\/08\/Fondo-blanco_1.png\",\"contentUrl\":\"https:\/\/enthec.com\/wp-content\/uploads\/2024\/08\/Fondo-blanco_1.png\",\"width\":667,\"height\":131,\"caption\":\"ENTHEC\"},\"image\":{\"@id\":\"https:\/\/enthec.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/enthec.com\/#\/schema\/person\/3ee5632ff6252f2a608293472d04f1a1\",\"name\":\"Enthec\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/93ca4c2a26bdadca49595a5b6c3ff31e89454d39aea2d10350e023c219d1adef?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/93ca4c2a26bdadca49595a5b6c3ff31e89454d39aea2d10350e023c219d1adef?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/93ca4c2a26bdadca49595a5b6c3ff31e89454d39aea2d10350e023c219d1adef?s=96&d=mm&r=g\",\"caption\":\"Enthec\"},\"url\":\"https:\/\/enthec.com\/en\/author\/enthec\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u25b7 AI vs. AI: The Cybersecurity Battle | Enthec","description":"In the fight between AI and AI, are you prepared? \u27a1\ufe0f Ensure your cybersecurity with Kartos and confront automated attacks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/enthec.com\/ia-vs-ia\/","og_locale":"en_US","og_type":"article","og_title":"\u25b7 AI vs. AI: The Cybersecurity Battle | Enthec","og_description":"In the fight between AI and AI, are you prepared? \u27a1\ufe0f Ensure your cybersecurity with Kartos and confront automated attacks.","og_url":"https:\/\/enthec.com\/ia-vs-ia\/","og_site_name":"ENTHEC \u00b7 Kartos \u00b7 Qondar","article_published_time":"2025-09-01T07:09:06+00:00","article_modified_time":"2025-09-01T15:14:50+00:00","og_image":[{"width":2560,"height":1435,"url":"https:\/\/enthec.com\/wp-content\/uploads\/2025\/08\/IA-versus-IA-scaled.jpg","type":"image\/jpeg"}],"author":"Enthec","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Enthec","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/enthec.com\/ia-vs-ia\/#article","isPartOf":{"@id":"https:\/\/enthec.com\/ia-vs-ia\/"},"author":{"name":"Enthec","@id":"https:\/\/enthec.com\/#\/schema\/person\/3ee5632ff6252f2a608293472d04f1a1"},"headline":"AI vs. AI: The duel between artificial intelligences in the cybersecurity war","datePublished":"2025-09-01T07:09:06+00:00","dateModified":"2025-09-01T15:14:50+00:00","mainEntityOfPage":{"@id":"https:\/\/enthec.com\/ia-vs-ia\/"},"wordCount":1103,"commentCount":0,"publisher":{"@id":"https:\/\/enthec.com\/#organization"},"image":{"@id":"https:\/\/enthec.com\/ia-vs-ia\/#primaryimage"},"thumbnailUrl":"https:\/\/enthec.com\/wp-content\/uploads\/2025\/08\/IA-versus-IA-scaled.jpg","keywords":["Kartos","AI"],"articleSection":["Cybersecurity"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/enthec.com\/ia-vs-ia\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/enthec.com\/ia-vs-ia\/","url":"https:\/\/enthec.com\/ia-vs-ia\/","name":"\u25b7 AI vs. AI: The Cybersecurity Battle | Enthec","isPartOf":{"@id":"https:\/\/enthec.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/enthec.com\/ia-vs-ia\/#primaryimage"},"image":{"@id":"https:\/\/enthec.com\/ia-vs-ia\/#primaryimage"},"thumbnailUrl":"https:\/\/enthec.com\/wp-content\/uploads\/2025\/08\/IA-versus-IA-scaled.jpg","datePublished":"2025-09-01T07:09:06+00:00","dateModified":"2025-09-01T15:14:50+00:00","description":"In the fight between AI and AI, are you prepared? \u27a1\ufe0f Ensure your cybersecurity with Kartos and confront automated attacks.","breadcrumb":{"@id":"https:\/\/enthec.com\/ia-vs-ia\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/enthec.com\/ia-vs-ia\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/enthec.com\/ia-vs-ia\/#primaryimage","url":"https:\/\/enthec.com\/wp-content\/uploads\/2025\/08\/IA-versus-IA-scaled.jpg","contentUrl":"https:\/\/enthec.com\/wp-content\/uploads\/2025\/08\/IA-versus-IA-scaled.jpg","width":2560,"height":1435,"caption":"IA versus IA"},{"@type":"BreadcrumbList","@id":"https:\/\/enthec.com\/ia-vs-ia\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/enthec.com\/en\/"},{"@type":"ListItem","position":2,"name":"AI vs. AI: The duel between artificial intelligences in the cybersecurity war"}]},{"@type":"WebSite","@id":"https:\/\/enthec.com\/#website","url":"https:\/\/enthec.com\/","name":"ENTHEC","description":"Advanced AI-driven Cyber-Surveillance Platform","publisher":{"@id":"https:\/\/enthec.com\/#organization"},"alternateName":"ENTHEC \u00b7 Kartos \u00b7 Qondar","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/enthec.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/enthec.com\/#organization","name":"ENTHEC","alternateName":"ENTHEC \u00b7 Kartos \u00b7 Qondar","url":"https:\/\/enthec.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/enthec.com\/#\/schema\/logo\/image\/","url":"https:\/\/enthec.com\/wp-content\/uploads\/2024\/08\/Fondo-blanco_1.png","contentUrl":"https:\/\/enthec.com\/wp-content\/uploads\/2024\/08\/Fondo-blanco_1.png","width":667,"height":131,"caption":"ENTHEC"},"image":{"@id":"https:\/\/enthec.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/enthec.com\/#\/schema\/person\/3ee5632ff6252f2a608293472d04f1a1","name":"Enthec","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/93ca4c2a26bdadca49595a5b6c3ff31e89454d39aea2d10350e023c219d1adef?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/93ca4c2a26bdadca49595a5b6c3ff31e89454d39aea2d10350e023c219d1adef?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/93ca4c2a26bdadca49595a5b6c3ff31e89454d39aea2d10350e023c219d1adef?s=96&d=mm&r=g","caption":"Enthec"},"url":"https:\/\/enthec.com\/en\/author\/enthec\/"}]}},"_links":{"self":[{"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/posts\/4005","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/comments?post=4005"}],"version-history":[{"count":0,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/posts\/4005\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/media\/4002"}],"wp:attachment":[{"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/media?parent=4005"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/categories?post=4005"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/tags?post=4005"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}