{"id":56654,"date":"2019-03-22T07:00:18","date_gmt":"2019-03-22T06:00:18","guid":{"rendered":"http:\/\/e3mag.com\/?p=56654"},"modified":"2020-02-09T14:40:22","modified_gmt":"2020-02-09T13:40:22","slug":"this-is-it-security-trends-2019","status":"publish","type":"post","link":"https:\/\/e3mag.com\/es\/this-is-it-security-trends-2019\/","title":{"rendered":"Estas son las tendencias en seguridad inform\u00e1tica para 2019"},"content":{"rendered":"<p>Para el experto en seguridad y miembro de la junta directiva de Eco, Norbert Pohlmann, las cuestiones de ciberseguridad en relaci\u00f3n con la inteligencia artificial son el tema de tendencia dominante en 2019.<\/p>\n<p><em>\"Los sistemas de ciberseguridad que tienen en cuenta la inteligencia artificial (IA) ayudar\u00e1n a detectar mucho mejor a los hackers inteligentes y sus ataques en el futuro. Esto minimiza los riesgos en el deseado proceso de digitalizaci\u00f3n\".<\/em><\/p>\n<p>afirma Pohlmann. Con la ayuda de la inteligencia artificial, la tasa de detecci\u00f3n de ataques en la red y en dispositivos finales de TI como smartphones, port\u00e1tiles, servidores o el Internet de las Cosas podr\u00eda aumentar considerablemente.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-56655\" src=\"https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/Pohlmann-Norbert.jpg\" alt=\"Pohlmann Norbert\" width=\"800\" height=\"800\" srcset=\"https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/Pohlmann-Norbert.jpg 800w, https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/Pohlmann-Norbert-150x150.jpg 150w, https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/Pohlmann-Norbert-768x768.jpg 768w, https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/Pohlmann-Norbert-100x100.jpg 100w, https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/Pohlmann-Norbert-480x480.jpg 480w, https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/Pohlmann-Norbert-640x640.jpg 640w, https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/Pohlmann-Norbert-720x720.jpg 720w, https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/Pohlmann-Norbert-24x24.jpg 24w, https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/Pohlmann-Norbert-48x48.jpg 48w, https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/Pohlmann-Norbert-96x96.jpg 96w, https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/Pohlmann-Norbert-300x300.jpg 300w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/p>\n<p>La mayor\u00eda de los responsables de la toma de decisiones empresariales en Alemania lo ven de forma similar.<\/p>\n<p><em>\"La IA y el aprendizaje autom\u00e1tico pueden ayudar a los responsables de ciberseguridad con tareas rutinarias, como evaluar correctamente las alertas de seguridad\".<\/em><\/p>\n<p>Con esta afirmaci\u00f3n coincidieron alrededor del 72% de los 541 responsables de la toma de decisiones empresariales encuestados por el instituto de investigaci\u00f3n de mercado y opini\u00f3n YouGov en nombre de Eco a finales de 2018.<\/p>\n<p>El 65% de los encuestados afirma que los m\u00e9todos de IA deber\u00edan utilizarse ya hoy para defenderse de los ciberataques. El 59 por ciento cree incluso que, en unos a\u00f1os, los sistemas de IA asumir\u00e1n la defensa contra los ciberataques de forma en gran medida aut\u00f3noma.<\/p>\n<h3>Los ciberdelincuentes se apoyar\u00e1n cada vez m\u00e1s en la IA en 2019<\/h3>\n<p>Oliver Dehning, Jefe del Grupo de Competencia de Seguridad de la Asociaci\u00f3n Eco, est\u00e1 de acuerdo, porque los ciberdelincuentes tambi\u00e9n se est\u00e1n armando en consecuencia con la inteligencia artificial.<\/p>\n<p><em>\"Hoy en d\u00eda se utilizan cada vez m\u00e1s m\u00e9todos de IA por parte de los atacantes; s\u00f3lo por esta raz\u00f3n tenemos que hacerle frente\"<\/em><\/p>\n<p>dice Dehning y, al mismo tiempo, pone en perspectiva las expectativas de los responsables empresariales encuestados.<\/p>\n<p><em><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-56656\" src=\"https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/Dehning-Oliver.jpg\" alt=\"Dehning Oliver\" width=\"800\" height=\"800\" srcset=\"https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/Dehning-Oliver.jpg 800w, https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/Dehning-Oliver-150x150.jpg 150w, https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/Dehning-Oliver-768x768.jpg 768w, https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/Dehning-Oliver-100x100.jpg 100w, https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/Dehning-Oliver-480x480.jpg 480w, https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/Dehning-Oliver-640x640.jpg 640w, https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/Dehning-Oliver-720x720.jpg 720w, https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/Dehning-Oliver-24x24.jpg 24w, https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/Dehning-Oliver-48x48.jpg 48w, https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/Dehning-Oliver-96x96.jpg 96w, https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/Dehning-Oliver-300x300.jpg 300w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/em><\/p>\n<p><em>\"Actualmente, la IA aparece para muchos como un arma milagrosa, pero todav\u00eda no se puede responder de forma inequ\u00edvoca si la IA estar\u00e1 plenamente a la altura de las grandes expectativas ya este a\u00f1o.\"<\/em><\/p>\n<p>Dehning cita la seguridad para el Internet de las Cosas (IoT) como otra tendencia de seguridad inform\u00e1tica de 2019.<\/p>\n<p><em>\"Los dispositivos IoT se est\u00e1n convirtiendo cada vez m\u00e1s en el objetivo de los ataques, a menudo no para atacar el dispositivo en s\u00ed o su funci\u00f3n, sino para utilizar el dispositivo como parte de una red de bots para lanzar ataques masivos contra otras infraestructuras.\"<\/em><\/p>\n<p>dice Dehning.<\/p>","protected":false},"excerpt":{"rendered":"<p>La mayor\u00eda de los responsables de la toma de decisiones en las empresas creen que la IA puede contribuir a la ciberseguridad, y dan en el clavo.<\/p>","protected":false},"author":38,"featured_media":56657,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pmpro_default_level":"","footnotes":""},"categories":[2,27969],"tags":[26082,369,624,18159],"coauthors":[19920],"class_list":["post-56654","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sap-nachrichten","category-mag-1902","tag-cybersicherheit","tag-it","tag-ki-joule","tag-kuenstlicher-intelligenz","pmpro-has-access"],"acf":[],"featured_image_urls_v2":{"full":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/shutterstock_1090002608.jpg",1000,450,false],"thumbnail":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/shutterstock_1090002608-150x150.jpg",150,150,true],"medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/shutterstock_1090002608.jpg",400,180,false],"medium_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/shutterstock_1090002608-768x346.jpg",768,346,true],"large":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/shutterstock_1090002608.jpg",1000,450,false],"image-100":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/shutterstock_1090002608-100x45.jpg",100,45,true],"image-480":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/shutterstock_1090002608-480x216.jpg",480,216,true],"image-640":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/shutterstock_1090002608-640x288.jpg",640,288,true],"image-720":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/shutterstock_1090002608-720x324.jpg",720,324,true],"image-960":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/shutterstock_1090002608-960x432.jpg",960,432,true],"image-1168":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/shutterstock_1090002608.jpg",1000,450,false],"image-1440":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/shutterstock_1090002608.jpg",1000,450,false],"image-1920":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/shutterstock_1090002608.jpg",1000,450,false],"1536x1536":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/shutterstock_1090002608.jpg",1000,450,false],"2048x2048":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/shutterstock_1090002608.jpg",1000,450,false],"trp-custom-language-flag":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/shutterstock_1090002608.jpg",18,8,false],"bricks_large_16x9":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/shutterstock_1090002608.jpg",1000,450,false],"bricks_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/shutterstock_1090002608.jpg",1000,450,false],"bricks_large_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/shutterstock_1090002608.jpg",1000,450,false],"bricks_medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/shutterstock_1090002608.jpg",600,270,false],"bricks_medium_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/shutterstock_1090002608.jpg",600,270,false],"profile_24":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/shutterstock_1090002608-24x24.jpg",24,24,true],"profile_48":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/shutterstock_1090002608-48x48.jpg",48,48,true],"profile_96":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/shutterstock_1090002608-96x96.jpg",96,96,true],"profile_150":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/shutterstock_1090002608-150x150.jpg",150,150,true],"profile_300":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/01\/shutterstock_1090002608-300x300.jpg",300,300,true]},"post_excerpt_stackable_v2":"<p>KI kann Cyber-Security unterst\u00fctzen, glaubt die Mehrheit der Unternehmensentscheider \u2013 und liegt damit goldrichtig.<\/p>\n","category_list_v2":"<a href=\"https:\/\/e3mag.com\/es\/categoria\/noticias-sap\/\" rel=\"category tag\">Community Nachrichten<\/a>, <a href=\"https:\/\/e3mag.com\/es\/categoria\/mag-1902\/\" rel=\"category tag\">MAG 19-02<\/a>","author_info_v2":{"name":"Revista E-3","url":"https:\/\/e3mag.com\/es\/author\/e-3-magazin\/"},"comments_num_v2":"0 comentarios","_links":{"self":[{"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/posts\/56654","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/users\/38"}],"replies":[{"embeddable":true,"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/comments?post=56654"}],"version-history":[{"count":0,"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/posts\/56654\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/media\/56657"}],"wp:attachment":[{"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/media?parent=56654"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/categories?post=56654"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/tags?post=56654"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/e3mag.com\/es\/wp-json\/wp\/v2\/coauthors?post=56654"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}