{"id":10332,"date":"2025-03-03T16:44:18","date_gmt":"2025-03-03T21:44:18","guid":{"rendered":"https:\/\/www.carahsoft.com\/wordpress\/?p=10332"},"modified":"2025-03-03T16:44:19","modified_gmt":"2025-03-03T21:44:19","slug":"human-security-cybersecurity-low-code-and-ai-addressing-emerging-risks-blog-2025","status":"publish","type":"post","link":"https:\/\/www.carahsoft.com\/wordpress\/human-security-cybersecurity-low-code-and-ai-addressing-emerging-risks-blog-2025\/","title":{"rendered":"Strengthening Cybersecurity in the Age of Low-Code and AI: Addressing Emerging Risks"},"content":{"rendered":"\n<p>As new technologies like low-code\/no-code development and generative AI (GenAI) revolutionize how we build and interact with software, they also bring about new security challenges\u2014especially for the public sector. Protecting sensitive information and online accounts is more critical than ever, as cybercriminals look to exploit gaps in these emerging systems. Ensuring robust security and threat visibility is now essential for safeguarding against the risks associated with these advancements, especially as traditional safeguards become less effective in the face of evolving threats.<\/p>\n\n<br>\n\n<h2 class=\"wp-block-heading\">Low-code Development Exposes New Risk<\/h2>\n\n\n\n<p>One of the unintended consequences of our shift to a low-code\/no-code development paradigm is the delegation of complex development tasks to Large Language Models (LLMs) and GenAI systems, often bypassing seasoned developers and architects. This opens new opportunities for cybercriminals. These systems excel at functional requirements\u2014\u2018Build me a website that accepts customer checkout requests\u2019\u2014but they rarely infer non-functional needs, like security, unless explicitly instructed.<\/p>\n\n\n\n<p>In traditional software development, security considerations are often implicit, stemming from the experience of developers and architects who\u2019ve spent years learning from real-world failures. GenAI, however, lacks this depth of experience and focuses narrowly on the task at hand. The result? Incomplete or inadequate security measures in software developed through these systems. As organizations lean more heavily on GenAI, we risk creating an insecure software ecosystem ripe for exploitation by threat actors.<\/p>\n\n<br>\n\n<h2 class=\"wp-block-heading\">The Proliferation of Knowledge-Based Verification Attacks<\/h2>\n\n\n\n<p>We\u2019re on the brink of a surge in automated attacks exploiting vulnerabilities in Knowledge-Based Verification (KBV) systems. Large-scale data breaches, like the one that exposed millions of Social Security numbers last year, are eroding the effectiveness of this approach at confirming identity when creating an account or supporting a password reset. These processes often rely on KBV\u2014such as answering questions about your mother\u2019s maiden name or the street you grew up on\u2014but this information is increasingly accessible to malicious actors.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignright size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/03\/HumanBlog-300x300-Frank-1.png\" alt=\"Human Security GenAI Low Code Blog Embedded Image 2025\" class=\"wp-image-10333\" srcset=\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/03\/HumanBlog-300x300-Frank-1.png 300w, https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/03\/HumanBlog-300x300-Frank-1-150x150.png 150w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/figure><\/div>\n\n\n<p>As these personal details become more widely available through data breaches and online marketplaces, attackers can easily bypass KBV systems. Worse yet, threat actors can now leverage LLMs to develop sophisticated tools to mine personal data at scale and orchestrate automated attacks against these KBV systems. Organizations face an urgent challenge: how to protect accounts in a world where traditional KBV methods are no longer secure or reliable while still offering users a legitimate path to create an account or regain access when needed.<\/p>\n\n<br>\n\n<h2 class=\"wp-block-heading\">LLM Safeguards Can Be Overridden or Bypassed by Running Models Locally<\/h2>\n\n\n\n<p>With the proliferation of local LLM instances and tools like Ollama, we\u2019ll see safeguards embedded in commercial LLMs eroded or bypassed entirely. Running models locally can allow threat actors to fine-tune them, removing restrictions on malicious activity and enabling custom models optimized for cybercrime. This creates a new frontier for scaled attacks that are faster, more targeted, and harder to detect until it&#8217;s too late.<\/p>\n\n\n\n<p>Imagine a threat actor fine-tuning a model to craft phishing campaigns, identify vulnerabilities in software, or automate account takeovers. The ability to localize and modify these models fundamentally shifts the balance, empowering attackers with tools tailored to their malicious intent. The guardrails built into commercial LLMs are no match for this growing trend, amplifying the need for robust detection and defense strategies at every level.<\/p>\n\n\n\n<p>As the public sector continues to adopt innovative technologies, staying ahead of emerging cyber threats is crucial. The increasing sophistication of attacks, such as those targeting KBV systems and leveraging GenAI, highlights the need for stronger protections. By prioritizing comprehensive security measures and threat detection, organizations can mitigate the risks of these evolving vulnerabilities and safeguard their sensitive data and online accounts against malicious actors. It is essential to build and maintain resilient security strategies to ensure the integrity of digital infrastructures in this rapidly changing environment. <\/p>\n\n<br>\n\n<p><strong><em>To learn more about how HUMAN Security helps the public sector protect citizen accounts, sensitive information, and critical infrastructure, <\/em><\/strong><a href=\"https:\/\/www.humansecurity.com\/wp-content\/uploads\/HUMAN_Solution-Brief_Public-Sector.pdf\" target=\"_blank\" rel=\"noreferrer noopener\" data-track=\"HUMAN Security - Cybersecurity Low Code AI Blog - 2025 - Bottom CTA\"><strong><em>click here<\/em><\/strong><\/a><strong><em>.<\/em><\/strong><\/p>\n\n<br>\n<p><em>Carahsoft Technology Corp. is The Trusted Government IT Solutions Provider, supporting Public Sector organizations across Federal, State and Local Government agencies and Education and Healthcare markets. As the Master Government Aggregator\u202ffor our vendor partners, including HUMAN Security, we deliver\u202f<a href=\"https:\/\/www.carahsoft.com\/solve\" target=\"_blank\" rel=\"noreferrer noopener\" data-track=\"HUMAN Security - Cybersecurity Low Code AI Blog - 2025 - Carahsoft Solve\">solutions<\/a>\u202ffor Geospatial, Cybersecurity,&nbsp;MultiCloud,&nbsp;DevSecOps, Artificial Intelligence, Customer Experience and Engagement, Open Source and more. Working with resellers, systems integrators and consultants, our sales and marketing teams provide industry leading IT products, services and training through hundreds of contract vehicles. Explore the <a href=\"https:\/\/www.carahsoft.com\/blog\" target=\"_blank\" rel=\"noreferrer noopener\" data-track=\"HUMAN Security - Cybersecurity Low Code AI Blog - 2025 - Carahsoft Blog\">Carahsoft Blog<\/a> to learn more about the latest trends in Government technology markets and solutions, as well as Carahsoft\u2019s ecosystem of partner thought-leaders.<\/em><\/p>\n<!-- \/wp:paragraph --><head><meta name=\"url\" property=\"og:url\" content=\"https:\/\/www.carahsoft.com\/community\/human-security-cybersecurity-low-code-and-ai-addressing-emerging-risks-blog-2025\"><\/head><\/p>","protected":false},"excerpt":{"rendered":"<p>As new technologies like low-code\/no-code development and generative AI (GenAI) revolutionize how we build and interact with software, they also bring about new security challenges\u2014especially for the public sector. Protecting sensitive information and online accounts is more critical than ever, &hellip; <a href=\"https:\/\/www.carahsoft.com\/wordpress\/human-security-cybersecurity-low-code-and-ai-addressing-emerging-risks-blog-2025\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":10334,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[574,2],"tags":[605,545,1404,1587,1588],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Strengthening Cybersecurity in the Age of Low-Code and AI: Addressing Emerging Risks | Carahsoft<\/title>\n<meta name=\"description\" content=\"Ensuring robust security and threat visibility is now essential for safeguarding against the risks associated with these advancements, especially as traditional safeguards become less effective in the face of evolving threats.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.carahsoft.com\/wordpress\/human-security-cybersecurity-low-code-and-ai-addressing-emerging-risks-blog-2025\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Strengthening Cybersecurity in the Age of Low-Code and AI: Addressing Emerging Risks | Carahsoft\" \/>\n<meta property=\"og:description\" content=\"Ensuring robust security and threat visibility is now essential for safeguarding against the risks associated with these advancements, especially as traditional safeguards become less effective in the face of evolving threats.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.carahsoft.com\/wordpress\/human-security-cybersecurity-low-code-and-ai-addressing-emerging-risks-blog-2025\/\" \/>\n<meta property=\"og:site_name\" content=\"| Carahsoft\" \/>\n<meta property=\"article:published_time\" content=\"2025-03-03T21:44:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-03T21:44:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/03\/HumanBlog-875x635-Frank-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"875\" \/>\n\t<meta property=\"og:image:height\" content=\"635\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"The Carahsoft Team\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"The Carahsoft Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/human-security-cybersecurity-low-code-and-ai-addressing-emerging-risks-blog-2025\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/human-security-cybersecurity-low-code-and-ai-addressing-emerging-risks-blog-2025\/\"},\"author\":{\"name\":\"The Carahsoft Team\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/dffa406b5cc1df3bbb30b12e96aa2083\"},\"headline\":\"Strengthening Cybersecurity in the Age of Low-Code and AI: Addressing Emerging Risks\",\"datePublished\":\"2025-03-03T21:44:18+00:00\",\"dateModified\":\"2025-03-03T21:44:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/human-security-cybersecurity-low-code-and-ai-addressing-emerging-risks-blog-2025\/\"},\"wordCount\":774,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/human-security-cybersecurity-low-code-and-ai-addressing-emerging-risks-blog-2025\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/03\/HumanBlog-875x635-Frank-1.png\",\"keywords\":[\"Artificial Intelligence\",\"Cybersecurity\",\"Generative AI\",\"HUMAN Security\",\"Knowledge-Based Verification\"],\"articleSection\":[\"Artificial Intelligence\",\"Cybersecurity\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.carahsoft.com\/wordpress\/human-security-cybersecurity-low-code-and-ai-addressing-emerging-risks-blog-2025\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/human-security-cybersecurity-low-code-and-ai-addressing-emerging-risks-blog-2025\/\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/human-security-cybersecurity-low-code-and-ai-addressing-emerging-risks-blog-2025\/\",\"name\":\"Strengthening Cybersecurity in the Age of Low-Code and AI: Addressing Emerging Risks | Carahsoft\",\"isPartOf\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/human-security-cybersecurity-low-code-and-ai-addressing-emerging-risks-blog-2025\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/human-security-cybersecurity-low-code-and-ai-addressing-emerging-risks-blog-2025\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/03\/HumanBlog-875x635-Frank-1.png\",\"datePublished\":\"2025-03-03T21:44:18+00:00\",\"dateModified\":\"2025-03-03T21:44:19+00:00\",\"description\":\"Ensuring robust security and threat visibility is now essential for safeguarding against the risks associated with these advancements, especially as traditional safeguards become less effective in the face of evolving threats.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/human-security-cybersecurity-low-code-and-ai-addressing-emerging-risks-blog-2025\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.carahsoft.com\/wordpress\/human-security-cybersecurity-low-code-and-ai-addressing-emerging-risks-blog-2025\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/human-security-cybersecurity-low-code-and-ai-addressing-emerging-risks-blog-2025\/#primaryimage\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/03\/HumanBlog-875x635-Frank-1.png\",\"contentUrl\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/03\/HumanBlog-875x635-Frank-1.png\",\"width\":875,\"height\":635,\"caption\":\"Human Security Cybersecurity Low Code AI Blog Preview Image 2025\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/human-security-cybersecurity-low-code-and-ai-addressing-emerging-risks-blog-2025\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.carahsoft.com\/wordpress\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Strengthening Cybersecurity in the Age of Low-Code and AI: Addressing Emerging Risks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#website\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/\",\"name\":\"| Carahsoft\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.carahsoft.com\/wordpress\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#organization\",\"name\":\"Carahsoft\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2022\/02\/Carahsoft-Blue-Logo-Print.png\",\"contentUrl\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2022\/02\/Carahsoft-Blue-Logo-Print.png\",\"width\":3184,\"height\":846,\"caption\":\"Carahsoft\"},\"image\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/dffa406b5cc1df3bbb30b12e96aa2083\",\"name\":\"The Carahsoft Team\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/236e97a68144b362e2ffda77d1518ca7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/236e97a68144b362e2ffda77d1518ca7?s=96&d=mm&r=g\",\"caption\":\"The Carahsoft Team\"},\"description\":\"The Digital Media team at Carahsoft.\",\"sameAs\":[\"https:\/\/www.carahsoft.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Strengthening Cybersecurity in the Age of Low-Code and AI: Addressing Emerging Risks | Carahsoft","description":"Ensuring robust security and threat visibility is now essential for safeguarding against the risks associated with these advancements, especially as traditional safeguards become less effective in the face of evolving threats.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.carahsoft.com\/wordpress\/human-security-cybersecurity-low-code-and-ai-addressing-emerging-risks-blog-2025\/","og_locale":"en_US","og_type":"article","og_title":"Strengthening Cybersecurity in the Age of Low-Code and AI: Addressing Emerging Risks | Carahsoft","og_description":"Ensuring robust security and threat visibility is now essential for safeguarding against the risks associated with these advancements, especially as traditional safeguards become less effective in the face of evolving threats.","og_url":"https:\/\/www.carahsoft.com\/wordpress\/human-security-cybersecurity-low-code-and-ai-addressing-emerging-risks-blog-2025\/","og_site_name":"| Carahsoft","article_published_time":"2025-03-03T21:44:18+00:00","article_modified_time":"2025-03-03T21:44:19+00:00","og_image":[{"width":875,"height":635,"url":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/03\/HumanBlog-875x635-Frank-1.png","type":"image\/png"}],"author":"The Carahsoft Team","twitter_misc":{"Written by":"The Carahsoft Team","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.carahsoft.com\/wordpress\/human-security-cybersecurity-low-code-and-ai-addressing-emerging-risks-blog-2025\/#article","isPartOf":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/human-security-cybersecurity-low-code-and-ai-addressing-emerging-risks-blog-2025\/"},"author":{"name":"The Carahsoft Team","@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/dffa406b5cc1df3bbb30b12e96aa2083"},"headline":"Strengthening Cybersecurity in the Age of Low-Code and AI: Addressing Emerging Risks","datePublished":"2025-03-03T21:44:18+00:00","dateModified":"2025-03-03T21:44:19+00:00","mainEntityOfPage":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/human-security-cybersecurity-low-code-and-ai-addressing-emerging-risks-blog-2025\/"},"wordCount":774,"commentCount":0,"publisher":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/#organization"},"image":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/human-security-cybersecurity-low-code-and-ai-addressing-emerging-risks-blog-2025\/#primaryimage"},"thumbnailUrl":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/03\/HumanBlog-875x635-Frank-1.png","keywords":["Artificial Intelligence","Cybersecurity","Generative AI","HUMAN Security","Knowledge-Based Verification"],"articleSection":["Artificial Intelligence","Cybersecurity"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.carahsoft.com\/wordpress\/human-security-cybersecurity-low-code-and-ai-addressing-emerging-risks-blog-2025\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.carahsoft.com\/wordpress\/human-security-cybersecurity-low-code-and-ai-addressing-emerging-risks-blog-2025\/","url":"https:\/\/www.carahsoft.com\/wordpress\/human-security-cybersecurity-low-code-and-ai-addressing-emerging-risks-blog-2025\/","name":"Strengthening Cybersecurity in the Age of Low-Code and AI: Addressing Emerging Risks | Carahsoft","isPartOf":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/human-security-cybersecurity-low-code-and-ai-addressing-emerging-risks-blog-2025\/#primaryimage"},"image":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/human-security-cybersecurity-low-code-and-ai-addressing-emerging-risks-blog-2025\/#primaryimage"},"thumbnailUrl":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/03\/HumanBlog-875x635-Frank-1.png","datePublished":"2025-03-03T21:44:18+00:00","dateModified":"2025-03-03T21:44:19+00:00","description":"Ensuring robust security and threat visibility is now essential for safeguarding against the risks associated with these advancements, especially as traditional safeguards become less effective in the face of evolving threats.","breadcrumb":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/human-security-cybersecurity-low-code-and-ai-addressing-emerging-risks-blog-2025\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.carahsoft.com\/wordpress\/human-security-cybersecurity-low-code-and-ai-addressing-emerging-risks-blog-2025\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.carahsoft.com\/wordpress\/human-security-cybersecurity-low-code-and-ai-addressing-emerging-risks-blog-2025\/#primaryimage","url":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/03\/HumanBlog-875x635-Frank-1.png","contentUrl":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/03\/HumanBlog-875x635-Frank-1.png","width":875,"height":635,"caption":"Human Security Cybersecurity Low Code AI Blog Preview Image 2025"},{"@type":"BreadcrumbList","@id":"https:\/\/www.carahsoft.com\/wordpress\/human-security-cybersecurity-low-code-and-ai-addressing-emerging-risks-blog-2025\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.carahsoft.com\/wordpress\/"},{"@type":"ListItem","position":2,"name":"Strengthening Cybersecurity in the Age of Low-Code and AI: Addressing Emerging Risks"}]},{"@type":"WebSite","@id":"https:\/\/www.carahsoft.com\/wordpress\/#website","url":"https:\/\/www.carahsoft.com\/wordpress\/","name":"| Carahsoft","description":"","publisher":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.carahsoft.com\/wordpress\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.carahsoft.com\/wordpress\/#organization","name":"Carahsoft","url":"https:\/\/www.carahsoft.com\/wordpress\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/logo\/image\/","url":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2022\/02\/Carahsoft-Blue-Logo-Print.png","contentUrl":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2022\/02\/Carahsoft-Blue-Logo-Print.png","width":3184,"height":846,"caption":"Carahsoft"},"image":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/dffa406b5cc1df3bbb30b12e96aa2083","name":"The Carahsoft Team","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/236e97a68144b362e2ffda77d1518ca7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/236e97a68144b362e2ffda77d1518ca7?s=96&d=mm&r=g","caption":"The Carahsoft Team"},"description":"The Digital Media team at Carahsoft.","sameAs":["https:\/\/www.carahsoft.com"]}]}},"_links":{"self":[{"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/posts\/10332"}],"collection":[{"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/comments?post=10332"}],"version-history":[{"count":4,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/posts\/10332\/revisions"}],"predecessor-version":[{"id":10339,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/posts\/10332\/revisions\/10339"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/media\/10334"}],"wp:attachment":[{"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/media?parent=10332"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/categories?post=10332"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/tags?post=10332"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}