{"id":1900,"date":"2026-04-02T10:26:55","date_gmt":"2026-04-02T10:26:55","guid":{"rendered":"https:\/\/www.tsfactory.com\/forums\/?p=1900"},"modified":"2026-04-02T10:26:55","modified_gmt":"2026-04-02T10:26:55","slug":"ai-runs-on-trust-why-cybersecurity-will-decide-who-gets-to-deploy-artificial-intelligence","status":"publish","type":"post","link":"https:\/\/www.tsfactory.com\/forums\/blog\/ai-runs-on-trust-why-cybersecurity-will-decide-who-gets-to-deploy-artificial-intelligence\/","title":{"rendered":"AI runs on trust: Why cybersecurity will decide who gets to deploy artificial intelligence"},"content":{"rendered":"<p>Artificial intelligence (AI) is moving rapidly from experimentation into the operational core of the economy. Systems that once analyzed information are now guiding decisions, executing\u00a0tasks\u00a0and interacting with other digital systems with minimal human oversight. This shift is transforming not only how businesses\u00a0operate\u00a0but also how they must think about security, governance and risk.<\/p>\n<p class=\"yf-1fy9kyt\">A new national report released this week by the Canadian Cybersecurity Network,\u00a0<em>The\u00a0<\/em><i>State of AI, Cybersecurity and Digital Trust in Canada<\/i>, argues that the convergence of AI and cybersecurity will be one of the defining business challenges of the next decade. Launched at the NGen Advanced Manufacturing Conference in Toronto, the report makes clear that AI is reshaping the threat landscape on both sides of the equation,\u00a0fuelling\u00a0faster, more adaptive\u00a0cyberattacks\u00a0while also\u00a0emerging\u00a0as one of the most potent defensive technologies organizations have ever had at their disposal.<\/p>\n<p class=\"yf-1fy9kyt\"><b>AI\u00a0is\u00a0accelerating the\u00a0threat\u00a0landscape<\/b><\/p>\n<p class=\"yf-1fy9kyt\">Across sectors, organizations are embedding AI into products, workflows and decision making at unprecedented speed. At the same time, cybercriminals are using the same technology to increase the speed and sophistication of their attacks.<\/p>\n<p class=\"yf-1fy9kyt\">Generative AI can now produce convincing phishing campaigns, automate\u00a0reconnaissance\u00a0and even create deepfake impersonations of executives or employees. In many\u00a0cases,\u00a0the tactics themselves are not new. What has changed is the speed,\u00a0scale\u00a0and realism of the attacks.<\/p>\n<p class=\"yf-1fy9kyt\">Global incident data examined in the report shows that synthetic text used in malicious emails has doubled in recent years. Cybercriminal groups are also beginning to use large language models to support malware development, vulnerability\u00a0discovery\u00a0and increasingly sophisticated fraud campaigns.<\/p>\n<p><a href=\"https:\/\/ca.finance.yahoo.com\/news\/ai-runs-trust-why-cybersecurity-201522547.html\">Read the Full Story Here<\/a><\/p>\n<p>Source: Yahoo Finance<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Artificial intelligence (AI) is moving rapidly from experimentation into the operational core of the economy. Systems that once analyzed information are now guiding decisions, executing\u00a0tasks\u00a0and interacting with other digital systems with minimal human oversight. This shift is transforming not only how businesses\u00a0operate\u00a0but also how they must think about security, governance and risk. A new national [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":1901,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-1900","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>AI runs on trust: Why cybersecurity will decide who gets to deploy artificial intelligence - Community<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tsfactory.com\/forums\/blog\/ai-runs-on-trust-why-cybersecurity-will-decide-who-gets-to-deploy-artificial-intelligence\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"AI runs on trust: Why cybersecurity will decide who gets to deploy artificial intelligence - Community\" \/>\n<meta property=\"og:description\" content=\"Artificial intelligence (AI) is moving rapidly from experimentation into the operational core of the economy. Systems that once analyzed information are now guiding decisions, executing\u00a0tasks\u00a0and interacting with other digital systems with minimal human oversight. This shift is transforming not only how businesses\u00a0operate\u00a0but also how they must think about security, governance and risk. A new national [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tsfactory.com\/forums\/blog\/ai-runs-on-trust-why-cybersecurity-will-decide-who-gets-to-deploy-artificial-intelligence\/\" \/>\n<meta property=\"og:site_name\" content=\"Community\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/TSFactoryLLC\/\" \/>\n<meta property=\"article:published_time\" content=\"2026-04-02T10:26:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2026\/04\/airobottyping.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Chelsie Wyatt\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@TSFactoryLLC\" \/>\n<meta name=\"twitter:site\" content=\"@TSFactoryLLC\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chelsie Wyatt\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/ai-runs-on-trust-why-cybersecurity-will-decide-who-gets-to-deploy-artificial-intelligence\/\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/blog\/ai-runs-on-trust-why-cybersecurity-will-decide-who-gets-to-deploy-artificial-intelligence\/\",\"name\":\"AI runs on trust: Why cybersecurity will decide who gets to deploy artificial intelligence - Community\",\"isPartOf\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/ai-runs-on-trust-why-cybersecurity-will-decide-who-gets-to-deploy-artificial-intelligence\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/ai-runs-on-trust-why-cybersecurity-will-decide-who-gets-to-deploy-artificial-intelligence\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2026\/04\/airobottyping.jpg\",\"datePublished\":\"2026-04-02T10:26:55+00:00\",\"author\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/ai-runs-on-trust-why-cybersecurity-will-decide-who-gets-to-deploy-artificial-intelligence\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.tsfactory.com\/forums\/blog\/ai-runs-on-trust-why-cybersecurity-will-decide-who-gets-to-deploy-artificial-intelligence\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/ai-runs-on-trust-why-cybersecurity-will-decide-who-gets-to-deploy-artificial-intelligence\/#primaryimage\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2026\/04\/airobottyping.jpg\",\"contentUrl\":\"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2026\/04\/airobottyping.jpg\",\"width\":640,\"height\":800,\"caption\":\"airobot\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/ai-runs-on-trust-why-cybersecurity-will-decide-who-gets-to-deploy-artificial-intelligence\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.tsfactory.com\/forums\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"AI runs on trust: Why cybersecurity will decide who gets to deploy artificial intelligence\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#website\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/\",\"name\":\"Community\",\"description\":\"TSFactory\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.tsfactory.com\/forums\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f\",\"name\":\"Chelsie Wyatt\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g\",\"caption\":\"Chelsie Wyatt\"},\"url\":\"https:\/\/www.tsfactory.com\/forums\/blog\/author\/chelsie\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"AI runs on trust: Why cybersecurity will decide who gets to deploy artificial intelligence - Community","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tsfactory.com\/forums\/blog\/ai-runs-on-trust-why-cybersecurity-will-decide-who-gets-to-deploy-artificial-intelligence\/","og_locale":"en_US","og_type":"article","og_title":"AI runs on trust: Why cybersecurity will decide who gets to deploy artificial intelligence - Community","og_description":"Artificial intelligence (AI) is moving rapidly from experimentation into the operational core of the economy. Systems that once analyzed information are now guiding decisions, executing\u00a0tasks\u00a0and interacting with other digital systems with minimal human oversight. This shift is transforming not only how businesses\u00a0operate\u00a0but also how they must think about security, governance and risk. A new national [&hellip;]","og_url":"https:\/\/www.tsfactory.com\/forums\/blog\/ai-runs-on-trust-why-cybersecurity-will-decide-who-gets-to-deploy-artificial-intelligence\/","og_site_name":"Community","article_publisher":"https:\/\/www.facebook.com\/TSFactoryLLC\/","article_published_time":"2026-04-02T10:26:55+00:00","og_image":[{"width":640,"height":800,"url":"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2026\/04\/airobottyping.jpg","type":"image\/jpeg"}],"author":"Chelsie Wyatt","twitter_card":"summary_large_image","twitter_creator":"@TSFactoryLLC","twitter_site":"@TSFactoryLLC","twitter_misc":{"Written by":"Chelsie Wyatt","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.tsfactory.com\/forums\/blog\/ai-runs-on-trust-why-cybersecurity-will-decide-who-gets-to-deploy-artificial-intelligence\/","url":"https:\/\/www.tsfactory.com\/forums\/blog\/ai-runs-on-trust-why-cybersecurity-will-decide-who-gets-to-deploy-artificial-intelligence\/","name":"AI runs on trust: Why cybersecurity will decide who gets to deploy artificial intelligence - Community","isPartOf":{"@id":"https:\/\/www.tsfactory.com\/forums\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.tsfactory.com\/forums\/blog\/ai-runs-on-trust-why-cybersecurity-will-decide-who-gets-to-deploy-artificial-intelligence\/#primaryimage"},"image":{"@id":"https:\/\/www.tsfactory.com\/forums\/blog\/ai-runs-on-trust-why-cybersecurity-will-decide-who-gets-to-deploy-artificial-intelligence\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2026\/04\/airobottyping.jpg","datePublished":"2026-04-02T10:26:55+00:00","author":{"@id":"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f"},"breadcrumb":{"@id":"https:\/\/www.tsfactory.com\/forums\/blog\/ai-runs-on-trust-why-cybersecurity-will-decide-who-gets-to-deploy-artificial-intelligence\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tsfactory.com\/forums\/blog\/ai-runs-on-trust-why-cybersecurity-will-decide-who-gets-to-deploy-artificial-intelligence\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tsfactory.com\/forums\/blog\/ai-runs-on-trust-why-cybersecurity-will-decide-who-gets-to-deploy-artificial-intelligence\/#primaryimage","url":"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2026\/04\/airobottyping.jpg","contentUrl":"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2026\/04\/airobottyping.jpg","width":640,"height":800,"caption":"airobot"},{"@type":"BreadcrumbList","@id":"https:\/\/www.tsfactory.com\/forums\/blog\/ai-runs-on-trust-why-cybersecurity-will-decide-who-gets-to-deploy-artificial-intelligence\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.tsfactory.com\/forums\/"},{"@type":"ListItem","position":2,"name":"AI runs on trust: Why cybersecurity will decide who gets to deploy artificial intelligence"}]},{"@type":"WebSite","@id":"https:\/\/www.tsfactory.com\/forums\/#website","url":"https:\/\/www.tsfactory.com\/forums\/","name":"Community","description":"TSFactory","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tsfactory.com\/forums\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f","name":"Chelsie Wyatt","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g","caption":"Chelsie Wyatt"},"url":"https:\/\/www.tsfactory.com\/forums\/blog\/author\/chelsie\/"}]}},"_links":{"self":[{"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/posts\/1900","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/comments?post=1900"}],"version-history":[{"count":1,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/posts\/1900\/revisions"}],"predecessor-version":[{"id":1902,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/posts\/1900\/revisions\/1902"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/media\/1901"}],"wp:attachment":[{"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/media?parent=1900"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/categories?post=1900"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/tags?post=1900"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}