{"id":240749,"date":"2026-03-27T09:45:00","date_gmt":"2026-03-27T13:45:00","guid":{"rendered":"https:\/\/ibkrcampus.com\/campus\/?p=240749"},"modified":"2026-03-30T04:26:34","modified_gmt":"2026-03-30T08:26:34","slug":"ai-security-emerges-as-the-next-cybersecurity-theme","status":"publish","type":"post","link":"https:\/\/www.interactivebrokers.com\/campus\/traders-insight\/securities\/macro\/ai-security-emerges-as-the-next-cybersecurity-theme\/","title":{"rendered":"\u2018AI Security\u2019 emerges as the next cybersecurity theme"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\" id=\"h-key-takeaways\">Key Takeaways<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.wisdomtree.eu\/en-gb\/blog\/2026-03-20\/ai-security-emerges-as-the-next-cybersecurity-theme#section1\">The WisdomTree Team8 Cybersecurity Index dynamically evolves its key cyber themes to remain aligned with structural shifts in the cybersecurity landscape.<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.wisdomtree.eu\/en-gb\/blog\/2026-03-20\/ai-security-emerges-as-the-next-cybersecurity-theme#section2\">Cloud security is no longer a differentiator, as capabilities are now embedded across most cybersecurity platforms.<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.wisdomtree.eu\/en-gb\/blog\/2026-03-20\/ai-security-emerges-as-the-next-cybersecurity-theme#section2\">The Cloud Security theme is retired to better reflect the maturity and ubiquity of cloud protection.<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.wisdomtree.eu\/en-gb\/blog\/2026-03-20\/ai-security-emerges-as-the-next-cybersecurity-theme#section3\">AI adoption is creating new attack surfaces, including model manipulation, data poisoning, and sensitive data leakage.<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.wisdomtree.eu\/en-gb\/blog\/2026-03-20\/ai-security-emerges-as-the-next-cybersecurity-theme#section4\">AI Security is emerging as a distinct, high-growth category, driven by new risks and specialized solutions.<\/a><\/li>\n<\/ul>\n\n\n\n<p>Cybersecurity is evolving rapidly as new technologies, threat vectors and enterprise architectures reshape how organisations defend their systems and data. The WisdomTree Team8 Cybersecurity Index was designed to track how these developments are shaping the future of cybersecurity through key cybersecurity themes. As cybersecurity innovation continues to accelerate, periodic updates to these themes help ensure the Index remains aligned with how modern cybersecurity is being built, deployed and adopted across the industry.<\/p>\n\n\n\n<p>This is not the first time we have adjusted; for example, in 2023, we introduced the Layer 8 theme focused on human risk. Today, to reflect the latest developments in the cybersecurity landscape, particularly the maturation of cloud security and the rapid rise of artificial intelligence, we are again making updates to the index\u2019s key cybersecurity themes (Figure 1 and Table 1).<\/p>\n\n\n\n<p><strong>Figure 1: Exposure of companies across cyber themes in the WisdomTree Team8 Cybersecurity Index<\/strong><\/p>\n\n\n\n<p><em>Exposure to each theme is presented from darker blue (high exposure) to white (no product in the space).<\/em><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1100\" height=\"575\" data-src=\"https:\/\/www.interactivebrokers.com\/campus\/wp-content\/uploads\/sites\/2\/2026\/03\/image-110-1100x575.png\" alt=\"\" class=\"wp-image-240753 lazyload\" data-srcset=\"https:\/\/ibkrcampus.com\/campus\/wp-content\/uploads\/sites\/2\/2026\/03\/image-110-1100x575.png 1100w, https:\/\/ibkrcampus.com\/campus\/wp-content\/uploads\/sites\/2\/2026\/03\/image-110-700x366.png 700w, https:\/\/ibkrcampus.com\/campus\/wp-content\/uploads\/sites\/2\/2026\/03\/image-110-300x157.png 300w, https:\/\/ibkrcampus.com\/campus\/wp-content\/uploads\/sites\/2\/2026\/03\/image-110-768x401.png 768w, https:\/\/ibkrcampus.com\/campus\/wp-content\/uploads\/sites\/2\/2026\/03\/image-110.png 1408w\" data-sizes=\"(max-width: 1100px) 100vw, 1100px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 1100px; aspect-ratio: 1100\/575;\" \/><\/figure>\n\n\n\n<p>Source: WisdomTree, Team8. The classification presented will take effect after the close of business on 20 March 2026.&nbsp;<strong>You cannot invest directly in an index. Historical performance is not an indication of future performance and any investments may go down in value.<\/strong><\/p>\n\n\n\n<p><strong>Table 1: Description of cyber themes in the WisdomTree Team8 Cybersecurity Index<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"884\" height=\"664\" data-src=\"https:\/\/www.interactivebrokers.com\/campus\/wp-content\/uploads\/sites\/2\/2026\/03\/image-111.png\" alt=\"\" class=\"wp-image-240755 lazyload\" data-srcset=\"https:\/\/ibkrcampus.com\/campus\/wp-content\/uploads\/sites\/2\/2026\/03\/image-111.png 884w, https:\/\/ibkrcampus.com\/campus\/wp-content\/uploads\/sites\/2\/2026\/03\/image-111-700x526.png 700w, https:\/\/ibkrcampus.com\/campus\/wp-content\/uploads\/sites\/2\/2026\/03\/image-111-300x225.png 300w, https:\/\/ibkrcampus.com\/campus\/wp-content\/uploads\/sites\/2\/2026\/03\/image-111-768x577.png 768w\" data-sizes=\"(max-width: 884px) 100vw, 884px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 884px; aspect-ratio: 884\/664;\" \/><\/figure>\n\n\n\n<p>Source: Team8, WisdomTree. You cannot invest directly in an index.&nbsp;<strong>Historical performance is not an indication of future performance and any investments may go down in value.<\/strong><\/p>\n\n\n\n<p id=\"section2\">&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-retiring-the-cloud-security-theme\"><strong>Retiring the Cloud Security theme<\/strong><\/h2>\n\n\n\n<p>The Cloud Security theme was originally designed to capture companies focused on protecting cloud infrastructure and environments. This included technologies such as Cloud Workload Protection Platforms (CWPP), Cloud Infrastructure Entitlement Management (CIEM), Cloud Security Posture Management (CSPM), SaaS Security Posture Management (SSPM), Cloud-Native Application Protection Platforms (CNAPP), Container Security, and Cloud Access Security Brokers (CASB).<\/p>\n\n\n\n<p>However, as cloud adoption has become universal across enterprises, cloud security capabilities have also become widely embedded across the cybersecurity landscape. Today, most cybersecurity vendors offer products that address cloud environments in some capacity. As a result, in our view, cloud security is no longer a meaningful differentiator between cybersecurity vendors, nor does it serve as a strong proxy for identifying companies aligned with emerging cybersecurity growth themes. Reflecting this shift, the Cloud Security theme is being retired as a distinct category within the index.<\/p>\n\n\n\n<p>While the Cloud Security theme is being discontinued, the Index is introducing Artificial Intelligence (AI) Security as the next cybersecurity theme, driven by the rapid adoption of AI systems, the expansion of the AI attack surface, and the emergence of specialised AI security solutions.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-introducing-ai-security-as-a-distinct-cybersecurity-theme\"><strong>Introducing AI Security as a distinct cybersecurity theme<\/strong><\/h2>\n\n\n\n<p>Artificial intelligence is rapidly becoming embedded across enterprise software, infrastructure and workflows. While AI is transforming productivity and enabling new capabilities spanning industries, it is also introducing new security risks and attack surfaces that create unique opportunities for attackers. Several major drivers are accelerating the evolution of the AI security market:<\/p>\n\n\n\n<p id=\"section3\">&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-explosion-in-the-adoption-of-ai-systems\"><strong>Explosion in the adoption of AI systems<\/strong><\/h2>\n\n\n\n<p>Enterprises are rapidly deploying AI tools across software development, knowledge management, customer support and internal workflows. What began as experimentation with generative AI is increasingly moving into production environments and becoming embedded in core enterprise software systems. Organisations are also deploying AI agents that autonomously interact with applications, data sources and external systems, further expanding the operational role of AI within enterprise environments.<\/p>\n\n\n\n<p id=\"section4\">&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-new-attack-surfaces-in-ai-infrastructure\"><strong>New attack surfaces in AI infrastructure<\/strong><\/h2>\n\n\n\n<p>Since AI systems rely on data pipelines, training environments, model repositories, and inference infrastructure, each component represents a potential entry point for attackers. Moreover, the growing use of AI agents introduces new security considerations that make them attractive targets. As a result, security teams are increasingly confronting risks that did not exist until recently. These risks include manipulation attacks, where adversaries craft malicious inputs to bypass safeguards or produce unintended outputs; infection attacks, where attackers poison training data or manipulate model behaviour to influence system outputs; and exfiltration attacks, which attempt to extract sensitive information such as training data, model parameters, or proprietary algorithms from AI systems.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-rapid-emergence-of-specialised-ai-security-solutions\"><strong>Rapid emergence of specialised AI security solutions<\/strong><\/h2>\n\n\n\n<p>Over the past year, a new generation of security companies has emerged, focused specifically on the unique security needs of AI systems and AI-native environments. These solutions are designed to secure AI models and training environments, protect data pipelines and model supply chains, monitor and control AI system behaviour, detect vulnerabilities and misuse in AI applications, and enforce governance, compliance, and security controls for enterprise AI deployments.<\/p>\n\n\n\n<p>As these risks and technologies continue to evolve, the cybersecurity market is beginning to recognise AI Security as a distinct category within the broader cybersecurity ecosystem, and for these reasons, the WisdomTree Team8 Cybersecurity Index will now formally recognise AI Security as its own dedicated theme.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-positioning-the-index-for-the-future\"><strong>Positioning the Index for the future<\/strong><\/h2>\n\n\n\n<p>The WisdomTree Team8 Cybersecurity Index was designed to track key cybersecurity themes emerging across the industry, and as the industry evolves, so do key themes shaping its future. By retiring the Cloud Security theme and introducing the AI Security theme, the index continues to reflect key structural developments in the cybersecurity market, helping ensure it remains aligned with the technologies and themes shaping the future of cybersecurity.<\/p>\n\n\n\n<p>&#8212;<\/p>\n\n\n\n<p>Originally Posted on March 20, 2026 &#8211; <a href=\"https:\/\/www.wisdomtree.eu\/en-gb\/blog\/2026-03-20\/ai-security-emerges-as-the-next-cybersecurity-theme\" target=\"_blank\" rel=\"noreferrer noopener\">\u2018AI Security\u2019 emerges as the next cybersecurity theme<\/a><\/p>\n\n\n\n<p><strong>Team8 disclaimer:<\/strong><br>This Article represents the opinions of Team8 Labs Inc. (\u201cTeam8\u201d) and is for informational purposes only. You should not treat any opinion expressed by Team8 as a specific inducement to make an investment in any security, but only as an expression of Team8\u2019s opinions. Team8\u2019s statements and opinions are subject to change without notice. Team8 is not registered as an investment adviser under the Investment Advisers Act of 1940, as amended (the \u201cAdvisers Act\u201d), and relies upon the \u201cpublishers\u2019 exclusion\u201d from the definition of investment adviser under Section 202(a)(11) of the Advisers Act. As such, the information contained in this Article does not take into account any particular investment objectives, financial situation or needs and is not intended to be, and should not be construed in any manner whatsoever as, personalized investment advice. The information in this Article is provided for informational and discussion purposes only and is not intended to be, and shall not be regarded or construed as, a recommendation for a transaction or investment or financial, tax, investment or other advice of any kind by Team8. You should determine on your own whether you agree with the information contained in this Article. Certain of the securities referenced in this Article may currently, or from time to time, be constituents of an index developed and maintained by WisdomTree Investments, Inc. using data provided by Team8, which has been or will be licensed for a fee to one or more investment funds. In addition, certain officers or employees of Team8 or funds or other persons or entities affiliated or associated with Team8 may hold shares of, be officers or directors of, or otherwise be associated with some or all of the issuers of the securities referenced in this Article or included in such index. Team8 expressly disclaims all liability with respect to any act or omission taken based on, and makes no warranty or representation regarding, any of the information included in this Article.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity is evolving rapidly as new technologies, threat vectors and enterprise architectures reshape how organisations defend their systems and data. <\/p>\n","protected":false},"author":1130,"featured_media":239192,"comment_status":"open","ping_status":"closed","sticky":true,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[18,6,8,9,26,3],"tags":[],"contributors-categories":[13714],"class_list":{"0":"post-240749","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-macro","8":"category-north-america","9":"category-region","10":"category-securities","11":"category-text-articles","12":"category-traders-insight","13":"contributors-categories-wisdomtree-europe"},"pp_statuses_selecting_workflow":false,"pp_workflow_action":"current","pp_status_selection":"publish","acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.9 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>\u2018AI Security\u2019 emerges as the next cybersecurity theme<\/title>\n<meta name=\"description\" content=\"Cybersecurity is evolving rapidly as new technologies, threat vectors and enterprise architectures reshape how organisations defend their systems and data.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.interactivebrokers.com\/campus\/wp-json\/wp\/v2\/posts\/240749\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u2018AI Security\u2019 emerges as the next cybersecurity theme | IBKR Campus US\" \/>\n<meta property=\"og:description\" content=\"Cybersecurity is evolving rapidly as new technologies, threat vectors and enterprise architectures reshape how organisations defend their systems and data.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.interactivebrokers.com\/campus\/traders-insight\/securities\/macro\/ai-security-emerges-as-the-next-cybersecurity-theme\/\" \/>\n<meta property=\"og:site_name\" content=\"IBKR Campus US\" \/>\n<meta property=\"article:published_time\" content=\"2026-03-27T13:45:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-30T08:26:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.interactivebrokers.com\/campus\/wp-content\/uploads\/sites\/2\/2026\/02\/ai-brain-featured-img.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"563\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Elvira Kuramshina\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Elvira Kuramshina\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\n\t    \"@context\": \"https:\\\/\\\/schema.org\",\n\t    \"@graph\": [\n\t        {\n\t            \"@type\": \"NewsArticle\",\n\t            \"@id\": \"https:\\\/\\\/ibkrcampus.com\\\/campus\\\/traders-insight\\\/securities\\\/macro\\\/ai-security-emerges-as-the-next-cybersecurity-theme\\\/#article\",\n\t            \"isPartOf\": {\n\t                \"@id\": \"https:\\\/\\\/ibkrcampus.com\\\/campus\\\/traders-insight\\\/securities\\\/macro\\\/ai-security-emerges-as-the-next-cybersecurity-theme\\\/\"\n\t            },\n\t            \"author\": {\n\t                \"name\": \"Elvira Kuramshina\",\n\t                \"@id\": \"https:\\\/\\\/ibkrcampus.com\\\/campus\\\/#\\\/schema\\\/person\\\/f6d61b1b768b2174e6b4cf64492c604b\"\n\t            },\n\t            \"headline\": \"\u2018AI Security\u2019 emerges as the next cybersecurity theme\",\n\t            \"datePublished\": \"2026-03-27T13:45:00+00:00\",\n\t            \"dateModified\": \"2026-03-30T08:26:34+00:00\",\n\t            \"mainEntityOfPage\": {\n\t                \"@id\": \"https:\\\/\\\/ibkrcampus.com\\\/campus\\\/traders-insight\\\/securities\\\/macro\\\/ai-security-emerges-as-the-next-cybersecurity-theme\\\/\"\n\t            },\n\t            \"wordCount\": 1306,\n\t            \"commentCount\": 0,\n\t            \"publisher\": {\n\t                \"@id\": \"https:\\\/\\\/ibkrcampus.com\\\/campus\\\/#organization\"\n\t            },\n\t            \"image\": {\n\t                \"@id\": \"https:\\\/\\\/ibkrcampus.com\\\/campus\\\/traders-insight\\\/securities\\\/macro\\\/ai-security-emerges-as-the-next-cybersecurity-theme\\\/#primaryimage\"\n\t            },\n\t            \"thumbnailUrl\": \"https:\\\/\\\/www.interactivebrokers.com\\\/campus\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2026\\\/02\\\/ai-brain-featured-img.jpg\",\n\t            \"articleSection\": [\n\t                \"Macro\",\n\t                \"North America\",\n\t                \"Region\",\n\t                \"Securities\",\n\t                \"Text Articles\",\n\t                \"Traders' Insight\"\n\t            ],\n\t            \"inLanguage\": \"en-US\",\n\t            \"potentialAction\": [\n\t                {\n\t                    \"@type\": \"CommentAction\",\n\t                    \"name\": \"Comment\",\n\t                    \"target\": [\n\t                        \"https:\\\/\\\/ibkrcampus.com\\\/campus\\\/traders-insight\\\/securities\\\/macro\\\/ai-security-emerges-as-the-next-cybersecurity-theme\\\/#respond\"\n\t                    ]\n\t                }\n\t            ]\n\t        },\n\t        {\n\t            \"@type\": \"WebPage\",\n\t            \"@id\": \"https:\\\/\\\/ibkrcampus.com\\\/campus\\\/traders-insight\\\/securities\\\/macro\\\/ai-security-emerges-as-the-next-cybersecurity-theme\\\/\",\n\t            \"url\": \"https:\\\/\\\/ibkrcampus.com\\\/campus\\\/traders-insight\\\/securities\\\/macro\\\/ai-security-emerges-as-the-next-cybersecurity-theme\\\/\",\n\t            \"name\": \"\u2018AI Security\u2019 emerges as the next cybersecurity theme | IBKR Campus US\",\n\t            \"isPartOf\": {\n\t                \"@id\": \"https:\\\/\\\/ibkrcampus.com\\\/campus\\\/#website\"\n\t            },\n\t            \"primaryImageOfPage\": {\n\t                \"@id\": \"https:\\\/\\\/ibkrcampus.com\\\/campus\\\/traders-insight\\\/securities\\\/macro\\\/ai-security-emerges-as-the-next-cybersecurity-theme\\\/#primaryimage\"\n\t            },\n\t            \"image\": {\n\t                \"@id\": \"https:\\\/\\\/ibkrcampus.com\\\/campus\\\/traders-insight\\\/securities\\\/macro\\\/ai-security-emerges-as-the-next-cybersecurity-theme\\\/#primaryimage\"\n\t            },\n\t            \"thumbnailUrl\": \"https:\\\/\\\/www.interactivebrokers.com\\\/campus\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2026\\\/02\\\/ai-brain-featured-img.jpg\",\n\t            \"datePublished\": \"2026-03-27T13:45:00+00:00\",\n\t            \"dateModified\": \"2026-03-30T08:26:34+00:00\",\n\t            \"description\": \"Cybersecurity is evolving rapidly as new technologies, threat vectors and enterprise architectures reshape how organisations defend their systems and data.\",\n\t            \"inLanguage\": \"en-US\",\n\t            \"potentialAction\": [\n\t                {\n\t                    \"@type\": \"ReadAction\",\n\t                    \"target\": [\n\t                        \"https:\\\/\\\/ibkrcampus.com\\\/campus\\\/traders-insight\\\/securities\\\/macro\\\/ai-security-emerges-as-the-next-cybersecurity-theme\\\/\"\n\t                    ]\n\t                }\n\t            ]\n\t        },\n\t        {\n\t            \"@type\": \"ImageObject\",\n\t            \"inLanguage\": \"en-US\",\n\t            \"@id\": \"https:\\\/\\\/ibkrcampus.com\\\/campus\\\/traders-insight\\\/securities\\\/macro\\\/ai-security-emerges-as-the-next-cybersecurity-theme\\\/#primaryimage\",\n\t            \"url\": \"https:\\\/\\\/www.interactivebrokers.com\\\/campus\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2026\\\/02\\\/ai-brain-featured-img.jpg\",\n\t            \"contentUrl\": \"https:\\\/\\\/www.interactivebrokers.com\\\/campus\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2026\\\/02\\\/ai-brain-featured-img.jpg\",\n\t            \"width\": 1000,\n\t            \"height\": 563\n\t        },\n\t        {\n\t            \"@type\": \"WebSite\",\n\t            \"@id\": \"https:\\\/\\\/ibkrcampus.com\\\/campus\\\/#website\",\n\t            \"url\": \"https:\\\/\\\/ibkrcampus.com\\\/campus\\\/\",\n\t            \"name\": \"IBKR Campus US\",\n\t            \"description\": \"Financial Education from Interactive Brokers\",\n\t            \"publisher\": {\n\t                \"@id\": \"https:\\\/\\\/ibkrcampus.com\\\/campus\\\/#organization\"\n\t            },\n\t            \"potentialAction\": [\n\t                {\n\t                    \"@type\": \"SearchAction\",\n\t                    \"target\": {\n\t                        \"@type\": \"EntryPoint\",\n\t                        \"urlTemplate\": \"https:\\\/\\\/ibkrcampus.com\\\/campus\\\/?s={search_term_string}\"\n\t                    },\n\t                    \"query-input\": {\n\t                        \"@type\": \"PropertyValueSpecification\",\n\t                        \"valueRequired\": true,\n\t                        \"valueName\": \"search_term_string\"\n\t                    }\n\t                }\n\t            ],\n\t            \"inLanguage\": \"en-US\"\n\t        },\n\t        {\n\t            \"@type\": \"Organization\",\n\t            \"@id\": \"https:\\\/\\\/ibkrcampus.com\\\/campus\\\/#organization\",\n\t            \"name\": \"Interactive Brokers\",\n\t            \"alternateName\": \"IBKR\",\n\t            \"url\": \"https:\\\/\\\/ibkrcampus.com\\\/campus\\\/\",\n\t            \"logo\": {\n\t                \"@type\": \"ImageObject\",\n\t                \"inLanguage\": \"en-US\",\n\t                \"@id\": \"https:\\\/\\\/ibkrcampus.com\\\/campus\\\/#\\\/schema\\\/logo\\\/image\\\/\",\n\t                \"url\": \"https:\\\/\\\/www.interactivebrokers.com\\\/campus\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2024\\\/05\\\/ibkr-campus-logo.jpg\",\n\t                \"contentUrl\": \"https:\\\/\\\/www.interactivebrokers.com\\\/campus\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2024\\\/05\\\/ibkr-campus-logo.jpg\",\n\t                \"width\": 669,\n\t                \"height\": 669,\n\t                \"caption\": \"Interactive Brokers\"\n\t            },\n\t            \"image\": {\n\t                \"@id\": \"https:\\\/\\\/ibkrcampus.com\\\/campus\\\/#\\\/schema\\\/logo\\\/image\\\/\"\n\t            },\n\t            \"publishingPrinciples\": \"https:\\\/\\\/www.interactivebrokers.com\\\/campus\\\/about-ibkr-campus\\\/\",\n\t            \"ethicsPolicy\": \"https:\\\/\\\/www.interactivebrokers.com\\\/campus\\\/cyber-security-notice\\\/\"\n\t        },\n\t        {\n\t            \"@type\": \"Person\",\n\t            \"@id\": \"https:\\\/\\\/ibkrcampus.com\\\/campus\\\/#\\\/schema\\\/person\\\/f6d61b1b768b2174e6b4cf64492c604b\",\n\t            \"name\": \"Elvira Kuramshina\",\n\t            \"url\": \"https:\\\/\\\/www.interactivebrokers.com\\\/campus\\\/author\\\/elvira-kuramshina\\\/\"\n\t        }\n\t    ]\n\t}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"\u2018AI Security\u2019 emerges as the next cybersecurity theme","description":"Cybersecurity is evolving rapidly as new technologies, threat vectors and enterprise architectures reshape how organisations defend their systems and data.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.interactivebrokers.com\/campus\/wp-json\/wp\/v2\/posts\/240749\/","og_locale":"en_US","og_type":"article","og_title":"\u2018AI Security\u2019 emerges as the next cybersecurity theme | IBKR Campus US","og_description":"Cybersecurity is evolving rapidly as new technologies, threat vectors and enterprise architectures reshape how organisations defend their systems and data.","og_url":"https:\/\/www.interactivebrokers.com\/campus\/traders-insight\/securities\/macro\/ai-security-emerges-as-the-next-cybersecurity-theme\/","og_site_name":"IBKR Campus US","article_published_time":"2026-03-27T13:45:00+00:00","article_modified_time":"2026-03-30T08:26:34+00:00","og_image":[{"width":1000,"height":563,"url":"https:\/\/www.interactivebrokers.com\/campus\/wp-content\/uploads\/sites\/2\/2026\/02\/ai-brain-featured-img.jpg","type":"image\/jpeg"}],"author":"Elvira Kuramshina","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Elvira Kuramshina","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"NewsArticle","@id":"https:\/\/ibkrcampus.com\/campus\/traders-insight\/securities\/macro\/ai-security-emerges-as-the-next-cybersecurity-theme\/#article","isPartOf":{"@id":"https:\/\/ibkrcampus.com\/campus\/traders-insight\/securities\/macro\/ai-security-emerges-as-the-next-cybersecurity-theme\/"},"author":{"name":"Elvira Kuramshina","@id":"https:\/\/ibkrcampus.com\/campus\/#\/schema\/person\/f6d61b1b768b2174e6b4cf64492c604b"},"headline":"\u2018AI Security\u2019 emerges as the next cybersecurity theme","datePublished":"2026-03-27T13:45:00+00:00","dateModified":"2026-03-30T08:26:34+00:00","mainEntityOfPage":{"@id":"https:\/\/ibkrcampus.com\/campus\/traders-insight\/securities\/macro\/ai-security-emerges-as-the-next-cybersecurity-theme\/"},"wordCount":1306,"commentCount":0,"publisher":{"@id":"https:\/\/ibkrcampus.com\/campus\/#organization"},"image":{"@id":"https:\/\/ibkrcampus.com\/campus\/traders-insight\/securities\/macro\/ai-security-emerges-as-the-next-cybersecurity-theme\/#primaryimage"},"thumbnailUrl":"https:\/\/www.interactivebrokers.com\/campus\/wp-content\/uploads\/sites\/2\/2026\/02\/ai-brain-featured-img.jpg","articleSection":["Macro","North America","Region","Securities","Text Articles","Traders' Insight"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/ibkrcampus.com\/campus\/traders-insight\/securities\/macro\/ai-security-emerges-as-the-next-cybersecurity-theme\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/ibkrcampus.com\/campus\/traders-insight\/securities\/macro\/ai-security-emerges-as-the-next-cybersecurity-theme\/","url":"https:\/\/ibkrcampus.com\/campus\/traders-insight\/securities\/macro\/ai-security-emerges-as-the-next-cybersecurity-theme\/","name":"\u2018AI Security\u2019 emerges as the next cybersecurity theme | IBKR Campus US","isPartOf":{"@id":"https:\/\/ibkrcampus.com\/campus\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ibkrcampus.com\/campus\/traders-insight\/securities\/macro\/ai-security-emerges-as-the-next-cybersecurity-theme\/#primaryimage"},"image":{"@id":"https:\/\/ibkrcampus.com\/campus\/traders-insight\/securities\/macro\/ai-security-emerges-as-the-next-cybersecurity-theme\/#primaryimage"},"thumbnailUrl":"https:\/\/www.interactivebrokers.com\/campus\/wp-content\/uploads\/sites\/2\/2026\/02\/ai-brain-featured-img.jpg","datePublished":"2026-03-27T13:45:00+00:00","dateModified":"2026-03-30T08:26:34+00:00","description":"Cybersecurity is evolving rapidly as new technologies, threat vectors and enterprise architectures reshape how organisations defend their systems and data.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ibkrcampus.com\/campus\/traders-insight\/securities\/macro\/ai-security-emerges-as-the-next-cybersecurity-theme\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ibkrcampus.com\/campus\/traders-insight\/securities\/macro\/ai-security-emerges-as-the-next-cybersecurity-theme\/#primaryimage","url":"https:\/\/www.interactivebrokers.com\/campus\/wp-content\/uploads\/sites\/2\/2026\/02\/ai-brain-featured-img.jpg","contentUrl":"https:\/\/www.interactivebrokers.com\/campus\/wp-content\/uploads\/sites\/2\/2026\/02\/ai-brain-featured-img.jpg","width":1000,"height":563},{"@type":"WebSite","@id":"https:\/\/ibkrcampus.com\/campus\/#website","url":"https:\/\/ibkrcampus.com\/campus\/","name":"IBKR Campus US","description":"Financial Education from Interactive Brokers","publisher":{"@id":"https:\/\/ibkrcampus.com\/campus\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ibkrcampus.com\/campus\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/ibkrcampus.com\/campus\/#organization","name":"Interactive Brokers","alternateName":"IBKR","url":"https:\/\/ibkrcampus.com\/campus\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ibkrcampus.com\/campus\/#\/schema\/logo\/image\/","url":"https:\/\/www.interactivebrokers.com\/campus\/wp-content\/uploads\/sites\/2\/2024\/05\/ibkr-campus-logo.jpg","contentUrl":"https:\/\/www.interactivebrokers.com\/campus\/wp-content\/uploads\/sites\/2\/2024\/05\/ibkr-campus-logo.jpg","width":669,"height":669,"caption":"Interactive Brokers"},"image":{"@id":"https:\/\/ibkrcampus.com\/campus\/#\/schema\/logo\/image\/"},"publishingPrinciples":"https:\/\/www.interactivebrokers.com\/campus\/about-ibkr-campus\/","ethicsPolicy":"https:\/\/www.interactivebrokers.com\/campus\/cyber-security-notice\/"},{"@type":"Person","@id":"https:\/\/ibkrcampus.com\/campus\/#\/schema\/person\/f6d61b1b768b2174e6b4cf64492c604b","name":"Elvira Kuramshina","url":"https:\/\/www.interactivebrokers.com\/campus\/author\/elvira-kuramshina\/"}]}},"jetpack_featured_media_url":"https:\/\/www.interactivebrokers.com\/campus\/wp-content\/uploads\/sites\/2\/2026\/02\/ai-brain-featured-img.jpg","_links":{"self":[{"href":"https:\/\/ibkrcampus.com\/campus\/wp-json\/wp\/v2\/posts\/240749","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ibkrcampus.com\/campus\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ibkrcampus.com\/campus\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ibkrcampus.com\/campus\/wp-json\/wp\/v2\/users\/1130"}],"replies":[{"embeddable":true,"href":"https:\/\/ibkrcampus.com\/campus\/wp-json\/wp\/v2\/comments?post=240749"}],"version-history":[{"count":0,"href":"https:\/\/ibkrcampus.com\/campus\/wp-json\/wp\/v2\/posts\/240749\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ibkrcampus.com\/campus\/wp-json\/wp\/v2\/media\/239192"}],"wp:attachment":[{"href":"https:\/\/ibkrcampus.com\/campus\/wp-json\/wp\/v2\/media?parent=240749"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ibkrcampus.com\/campus\/wp-json\/wp\/v2\/categories?post=240749"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ibkrcampus.com\/campus\/wp-json\/wp\/v2\/tags?post=240749"},{"taxonomy":"contributors-categories","embeddable":true,"href":"https:\/\/ibkrcampus.com\/campus\/wp-json\/wp\/v2\/contributors-categories?post=240749"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}