Cybersecurity in the Age of The Cloud and Artificial Intelligence

28/10/2025

Cybersecurity in the Age of The Cloud and Artificial Intelligence

The rise of artificial intelligence marks another major turning point in the history of technology. Just as the sound of a dial-up modem once announced the arrival of the Internet in homes during the 1990s, AI has now quietly woven itself into our everyday lives—so seamlessly that many people can’t even recall when it first became part of their routines.

“It’s simply another tool, much like the Internet was in its time,” said Rüdiger Fogelbach, Systems Engineering Manager at Fortinet, during his presentation “Cybersecurity in the Age of Cloud and Artificial Intelligence,” held as part of LACNIC 44 LACNOG 2025.

From Hype to Productivity

Fogelbach referenced Gartner’s well-known “hype cycle,” which describes the maturity path of technologies—from the initial wave of excitement to their practical adoption. “Back in 2013, machine learning appeared on that curve as a promising yet uncertain technology. Ten years later, it’s no longer there; it has become a natural part of our lives, and its place has been taken by generative artificial intelligence,” he explained.

In a lively and interactive presentation, Fortinet’s Systems Engineering Manager used playful examples—such as identifying animals by their attributes—to illustrate how algorithms learn and how AI adds context, not just data.

“It’s not enough to know it has long ears and a short tail—you need to understand whether we’re talking about a real rabbit, a stuffed toy, or a cartoon character,” he joked, highlighting the difference between recognition and understanding—two abilities that AI is only beginning to master.

Attackers Are Learning Too

In the field of cybersecurity, the rise of artificial intelligence has two sides. On one hand, it allows manufacturers and experts to identify threats with greater speed and accuracy; on the other, it is also empowering attackers.

“Cybercriminals are using artificial intelligence to create more disruptive attacks, automate vulnerability scanning, and design phishing campaigns that are far more convincing,” warned Fogelbach. The era of the old “Nigerian prince” email is over —today’s scams are personalized messages generated by artificial intelligence that mimic the tone and writing style of a boss or coworker.

(Free access, no subscription required)

Deepfakes—AI-manipulated images, audio, or videos—mark a new frontier of deception. Fogelbach shared the case of an executive who nearly transferred funds after receiving a fake call featuring what seemed to be his superior’s voice. “We now have to ask questions that challenge artificial intelligence,” he advised. “If the conversation can’t recall something personal, it’s probably not real.”

According to estimates supported by AI-based tools, the effectiveness of phishing attacks has increased by 50% in recent years due to the use of these technologies.

The Enemy and the Weak Points

Drawing inspiration from The Art of War by Sun Tzu, Fogelbach encouraged the audience to view cybersecurity as a strategic battle. “The first step is knowing what we want to protect—our digital assets. The next is understanding the adversary and recognizing our own vulnerabilities,” he said.

0 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments