{"version":"1.0","provider_name":"Revue Internationale d&#039;Intelligence Economique","provider_url":"https:\/\/www.r2ie.org","author_name":"Revue Internationale d&#039;Intelligence Economique","author_url":"https:\/\/www.r2ie.org","title":"IA et cybers\u00e9curit\u00e9 : opportunit\u00e9 ou menace ? - Revue Internationale d&#039;Intelligence Economique","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"LvHpP8KD6k\"><a href=\"https:\/\/www.r2ie.org\/index.php\/2025\/04\/29\/ia-et-cybersecurite-opportunite-ou-menace\/\">IA et cybers\u00e9curit\u00e9 : opportunit\u00e9 ou menace ?<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.r2ie.org\/index.php\/2025\/04\/29\/ia-et-cybersecurite-opportunite-ou-menace\/embed\/#?secret=LvHpP8KD6k\" width=\"600\" height=\"338\" title=\"\u00ab\u00a0IA et cybers\u00e9curit\u00e9 : opportunit\u00e9 ou menace ?\u00a0\u00bb &#8212; Revue Internationale d&#039;Intelligence Economique\" data-secret=\"LvHpP8KD6k\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.r2ie.org\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","description":"Lors d\u2019une \u00e9tude de 2024,\u00a0 66% des organisations interrog\u00e9es ont d\u00e9clar\u00e9 que l\u2019utilisation de l\u2019Intelligence Artificielle dans la cybers\u00e9curit\u00e9 \u00e9tait pour eux d\u2019une haute priorit\u00e9. Cette technologie est \u00e0 double tranchant, repr\u00e9sentant tant une opportunit\u00e9 pour les cybercriminels que\u00a0 pour les d\u00e9fenseurs.\u00a0 L\u2019article IA et cybers\u00e9curit\u00e9 : opportunit\u00e9 ou menace ? est apparu en premier..."}