{"id":11524,"date":"2025-11-19T10:37:11","date_gmt":"2025-11-19T15:37:11","guid":{"rendered":"https:\/\/www.carahsoft.com\/wordpress\/?p=11524"},"modified":"2025-11-19T10:37:12","modified_gmt":"2025-11-19T15:37:12","slug":"onspring-artificial-intelligence-and-cybersecurity-blog-2025","status":"publish","type":"post","link":"https:\/\/www.carahsoft.com\/wordpress\/onspring-artificial-intelligence-and-cybersecurity-blog-2025\/","title":{"rendered":"Artificial Intelligence and Cybersecurity: A Federal Perspective"},"content":{"rendered":"\n<p>As artificial intelligence (AI) continues to expand across Government operations, Federal agencies must integrate advanced AI technology to strengthen cybersecurity while staying ahead of new cyber threats. This is especially crucial in environments where critical systems, personally identifiable information (PII), and critical infrastructure are constantly targeted by sophisticated adversaries.<\/p>\n\n\n\n<p>AI is a double-edged sword. Malicious actors now use machine learning techniques, deep learning and generative AI to scale cyberattacks at unprecedented speed. At the same time, security teams are successfully deploying advanced AI algorithms, security tools and threat intelligence to detect, defend and respond faster. Striking the right balance is essential for Federal leaders responsible for safeguarding national interests.<\/p>\n\n\n\n<p>In this article, we\u2019ll talk about how to find the right balance between exploiting AI\u2019s capabilities and guarding against the risks. We\u2019ll also explore the specific threats agencies face today, and discuss how AI can help by<a href=\"https:\/\/onspring.com\/ai-third-party-risk-management-in-grc\/\"target=\"_blank\" rel=\"noreferrer noopener\" data-track=\"Onspring Cybersecurity Blog 2025 - Risk Management\"> <\/a><a href=\"https:\/\/onspring.com\/ai-third-party-risk-management-in-grc\/\"target=\"_blank\" rel=\"noreferrer noopener\" data-track=\"Onspring Cybersecurity Blog 2025 - Risk Management\">automating risk management<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Growing Cybersecurity Challenge<\/h2>\n\n\n\n<p>Ransomware, large-scale phishing campaigns and deepfake social engineering attacks are accelerating due to advancements in AI systems and large language models (LLMs). Cybercriminals can cast a wider net than ever before, with little effort and at a low cost to themselves, especially when targeting critical infrastructure and Federal systems.<\/p>\n\n\n\n<p><a><\/a><strong>Increased Threats<\/strong><\/p>\n\n\n\n<p>It\u2019s worth noting that even benign AI applications are paving the way for more cyber events. When Government agencies adopt AI tools, they automatically expand their networks and their \u201cattack surfaces,\u201d requiring new security measures and stronger vulnerability assessment practices.<\/p>\n\n\n\n<p>AI\u2019s automation and speed enable large-scale attacks. AI can rapidly scan and scrape online databases and analyze network traffic, looking for potential targets to attack. Hackers can use AI&#8217;s<a href=\"https:\/\/onspring.com\/why-no-code-automation-is-the-future-for-federal-e-book\/\"target=\"_blank\" rel=\"noreferrer noopener\" data-track=\"Onspring Cybersecurity Blog 2025 - No-Code Automation\"> <\/a><a href=\"https:\/\/onspring.com\/why-no-code-automation-is-the-future-for-federal-e-book\/\"target=\"_blank\" rel=\"noreferrer noopener\" data-track=\"Onspring Cybersecurity Blog 2025 - No-Code Automation\">no-code automation<\/a> capabilities to create the code for malware at high speed, and to send out phishing emails at a larger scale than ever before. AI\u2019s natural language processing (NLP) capabilities allow it to create credible \u201cdeepfake\u201d video and audio at high speed, as well.<\/p>\n\n\n\n<p>The vast majority of these attacks are unsuccessful, but it only takes one careless end user to click a bad link to a malicious website, or to click a link that triggers a domain blocking failure. That\u2019s why it\u2019s so important for security teams to be on their guard. Fortunately, AI tools can also help. Just as no-code automation helps hackers, it also helps agencies protect themselves against threats.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Leveraging AI Tools To Fight Cyberattacks<\/h2>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignright size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/11\/Onspring-AI-Cybersecurity-embedded-blog-image.png\" alt=\"\" class=\"wp-image-11525\" style=\"object-fit:cover;width:300px;height:300px\" srcset=\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/11\/Onspring-AI-Cybersecurity-embedded-blog-image.png 300w, https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/11\/Onspring-AI-Cybersecurity-embedded-blog-image-150x150.png 150w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/figure><\/div>\n\n\n<p>The same capabilities that can make AI useful for hackers also make it a great tool in fighting cyber threats. Automation, speed and the ability to identify patterns are all invaluable for countering online threats.<\/p>\n\n\n\n<p><a><\/a><strong>Using AI to Identify Phishing Attacks<\/strong><\/p>\n\n\n\n<p>AI excels at assisting with phishing detection. AI and Machine Learning (ML) tools can quickly \u201cread\u201d incoming emails and texts and scan them for telltale signs of danger, like unusual sender addresses. AI\u2019s natural language processing capabilities also help. NLP tools scan incoming messages for unusual phrasing or a strange tone, which might indicate a phishing attack.<\/p>\n\n\n\n<p>Most spam folders are powered by AI and ML tools. These tools are constantly learning on the job, too. Whenever you mark an incoming email \u201cspam,\u201d your software learns a little more about what you consider to be spam. Going forward, it incorporates that information into its workflow.<\/p>\n\n\n\n<p><a><\/a><strong>Using AI To Scan for Malware<\/strong><\/p>\n\n\n\n<p>AI-powered antivirus tools scan for malware more effectively than older antivirus detection systems. The AI software scans and analyzes huge quantities of data in network traffic and system logs to identify patterns that could indicate a virus. Because deep learning models are so good at identifying patterns and spotting anomalies, it can often spot new viruses early on.<\/p>\n\n\n\n<p>Older antivirus software relies on known viral signatures. While useful, these tools can\u2019t keep up with new threats evolving through AI algorithms. That\u2019s the AI difference: predictive pattern detection supports proactive cybersecurity solutions and strengthens incident response.<\/p>\n\n\n\n<p><a><\/a><strong>Using AI To Identify Threats From Within<\/strong><\/p>\n\n\n\n<p>AI can help to spot attacks from within. The software establishes a baseline of user behavior, like normal login hours and normal patterns of data access. When there\u2019s a change in that baseline, the AI tool flags it for further investigation.<\/p>\n\n\n\n<p>AI looks for changes like unusual activity outside of a team member&#8217;s normal working hours or location-based aberrations. For example, if a member of your team normally logs in at 9 a.m. and out at 5 p.m., the AI tool will notice if they start logging in again at midnight to download files. Even if they have authorization to view that information, it\u2019s worth asking why they suddenly need to access it at an unusual time. In the same vein, further review may be warranted if an employee views a record from an atypical IP address.<\/p>\n\n\n\n<p><a><\/a><strong>Using AI To Actively Fight Threats<\/strong><\/p>\n\n\n\n<p>Beyond identifying cyber threats, AI tools can proactively defend systems. They block or isolate compromised devices, enforce malicious domain blocking, apply system patches and notify security teams of attempted attacks.<\/p>\n\n\n\n<p>AI-backed incident response workflows reduce the spread of malware and help protect the network even when one endpoint is compromised.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Exercising Precaution: Building Guardrails for AI<\/h2>\n\n\n\n<p>AI is a valuable tool for fighting cyber threats. However, it\u2019s important to protect your network and end users against AI\u2019s natural pitfalls. Federal agencies have a special responsibility to<a href=\"https:\/\/onspring.com\/what-is-fedramp-authroization\/\"target=\"_blank\" rel=\"noreferrer noopener\" data-track=\"Onspring Cybersecurity Blog 2025 - FedRAMP\"> <\/a><a href=\"https:\/\/onspring.com\/what-is-fedramp-authroization\/\"target=\"_blank\" rel=\"noreferrer noopener\" data-track=\"Onspring Cybersecurity Blog 2025 - FedRAMP\">install guardrails<\/a> in accordance with the relevant regulations and guidelines.<\/p>\n\n\n\n<p>AI guardrails ensure that the technology behaves according to ethical standards, avoiding bias and making appropriate use of sensitive data. To some extent, AI itself can create guidelines. Generative AI tools can routinely scan for ethical problems and alert managers to any new issues.<\/p>\n\n\n\n<p>However, human oversight remains crucial, and agencies should appoint managers to be directly accountable for AI supervision. The NIST AI Risk Management Framework provides detailed guidance for managers and anyone else involved in managing AI guardrails.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Making the Best Use of AI<\/h2>\n\n\n\n<p>Government agencies can\u2019t turn their backs on AI. The technology offers too many benefits to stop using it. However, leaders must be aware that expanding AI also opens them up to greater threats. It\u2019s also critical to be alert to the many dangers posed by AI-enabled cyberattacks.<\/p>\n\n\n\n<p><strong><em>The first step? Inform yourself about how AI can impact your agency. To get started, learn about<a href=\"https:\/\/onspring.com\/integrating-ai-into-your-grc-platform-e-book\/\"target=\"_blank\" rel=\"noreferrer noopener\" data-track=\"Onspring AI Cybersecurity Blog 2025 - Bottom CTA\"> AI integration into GRC<\/a> today.<\/em><\/strong><\/p>\n<head><meta name=\"url\" property=\"og:url\" content=\"https:\/\/www.carahsoft.com\/blog\/onspring-artificial-intelligence-and-cybersecurity-blog-2025\"><\/head>","protected":false},"excerpt":{"rendered":"<p>As artificial intelligence (AI) continues to expand across Government operations, Federal agencies must integrate advanced AI technology to strengthen cybersecurity while staying ahead of new cyber threats. This is especially crucial in environments where critical systems, personally identifiable information (PII), &hellip; <a href=\"https:\/\/www.carahsoft.com\/wordpress\/onspring-artificial-intelligence-and-cybersecurity-blog-2025\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":9,"featured_media":11526,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[574,2,157],"tags":[605,545,611,1660],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Artificial Intelligence and Cybersecurity: Federal | Carahsoft<\/title>\n<meta name=\"description\" content=\"Discover how Federal agencies can leverage artificial intelligence (AI) to eliminate cyber threats while mitigating risks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.carahsoft.com\/wordpress\/onspring-artificial-intelligence-and-cybersecurity-blog-2025\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Artificial Intelligence and Cybersecurity: Federal | Carahsoft\" \/>\n<meta property=\"og:description\" content=\"Discover how Federal agencies can leverage artificial intelligence (AI) to eliminate cyber threats while mitigating risks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.carahsoft.com\/wordpress\/onspring-artificial-intelligence-and-cybersecurity-blog-2025\/\" \/>\n<meta property=\"og:site_name\" content=\"| Carahsoft\" \/>\n<meta property=\"article:published_time\" content=\"2025-11-19T15:37:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-19T15:37:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/11\/Onspring-AI-Cybersecurity-preview-blog-image.png\" \/>\n\t<meta property=\"og:image:width\" content=\"875\" \/>\n\t<meta property=\"og:image:height\" content=\"635\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"caduncan@carahsoft.com\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"caduncan@carahsoft.com\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/onspring-artificial-intelligence-and-cybersecurity-blog-2025\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/onspring-artificial-intelligence-and-cybersecurity-blog-2025\/\"},\"author\":{\"name\":\"caduncan@carahsoft.com\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/7ef36b93fd236bf4ee76ab49a9105ef5\"},\"headline\":\"Artificial Intelligence and Cybersecurity: A Federal Perspective\",\"datePublished\":\"2025-11-19T15:37:11+00:00\",\"dateModified\":\"2025-11-19T15:37:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/onspring-artificial-intelligence-and-cybersecurity-blog-2025\/\"},\"wordCount\":1067,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/onspring-artificial-intelligence-and-cybersecurity-blog-2025\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/11\/Onspring-AI-Cybersecurity-preview-blog-image.png\",\"keywords\":[\"Artificial Intelligence\",\"Cybersecurity\",\"Federal Government\",\"Onspring\"],\"articleSection\":[\"Artificial Intelligence\",\"Cybersecurity\",\"Federal Government\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.carahsoft.com\/wordpress\/onspring-artificial-intelligence-and-cybersecurity-blog-2025\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/onspring-artificial-intelligence-and-cybersecurity-blog-2025\/\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/onspring-artificial-intelligence-and-cybersecurity-blog-2025\/\",\"name\":\"Artificial Intelligence and Cybersecurity: Federal | Carahsoft\",\"isPartOf\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/onspring-artificial-intelligence-and-cybersecurity-blog-2025\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/onspring-artificial-intelligence-and-cybersecurity-blog-2025\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/11\/Onspring-AI-Cybersecurity-preview-blog-image.png\",\"datePublished\":\"2025-11-19T15:37:11+00:00\",\"dateModified\":\"2025-11-19T15:37:12+00:00\",\"description\":\"Discover how Federal agencies can leverage artificial intelligence (AI) to eliminate cyber threats while mitigating risks.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/onspring-artificial-intelligence-and-cybersecurity-blog-2025\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.carahsoft.com\/wordpress\/onspring-artificial-intelligence-and-cybersecurity-blog-2025\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/onspring-artificial-intelligence-and-cybersecurity-blog-2025\/#primaryimage\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/11\/Onspring-AI-Cybersecurity-preview-blog-image.png\",\"contentUrl\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/11\/Onspring-AI-Cybersecurity-preview-blog-image.png\",\"width\":875,\"height\":635},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/onspring-artificial-intelligence-and-cybersecurity-blog-2025\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.carahsoft.com\/wordpress\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Artificial Intelligence and Cybersecurity: A Federal Perspective\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#website\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/\",\"name\":\"| Carahsoft\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.carahsoft.com\/wordpress\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#organization\",\"name\":\"Carahsoft\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2022\/02\/Carahsoft-Blue-Logo-Print.png\",\"contentUrl\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2022\/02\/Carahsoft-Blue-Logo-Print.png\",\"width\":3184,\"height\":846,\"caption\":\"Carahsoft\"},\"image\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/7ef36b93fd236bf4ee76ab49a9105ef5\",\"name\":\"caduncan@carahsoft.com\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/170e441354efb33164baf70f4f675d15?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/170e441354efb33164baf70f4f675d15?s=96&d=mm&r=g\",\"caption\":\"caduncan@carahsoft.com\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Artificial Intelligence and Cybersecurity: Federal | Carahsoft","description":"Discover how Federal agencies can leverage artificial intelligence (AI) to eliminate cyber threats while mitigating risks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.carahsoft.com\/wordpress\/onspring-artificial-intelligence-and-cybersecurity-blog-2025\/","og_locale":"en_US","og_type":"article","og_title":"Artificial Intelligence and Cybersecurity: Federal | Carahsoft","og_description":"Discover how Federal agencies can leverage artificial intelligence (AI) to eliminate cyber threats while mitigating risks.","og_url":"https:\/\/www.carahsoft.com\/wordpress\/onspring-artificial-intelligence-and-cybersecurity-blog-2025\/","og_site_name":"| Carahsoft","article_published_time":"2025-11-19T15:37:11+00:00","article_modified_time":"2025-11-19T15:37:12+00:00","og_image":[{"width":875,"height":635,"url":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/11\/Onspring-AI-Cybersecurity-preview-blog-image.png","type":"image\/png"}],"author":"caduncan@carahsoft.com","twitter_misc":{"Written by":"caduncan@carahsoft.com","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.carahsoft.com\/wordpress\/onspring-artificial-intelligence-and-cybersecurity-blog-2025\/#article","isPartOf":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/onspring-artificial-intelligence-and-cybersecurity-blog-2025\/"},"author":{"name":"caduncan@carahsoft.com","@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/7ef36b93fd236bf4ee76ab49a9105ef5"},"headline":"Artificial Intelligence and Cybersecurity: A Federal Perspective","datePublished":"2025-11-19T15:37:11+00:00","dateModified":"2025-11-19T15:37:12+00:00","mainEntityOfPage":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/onspring-artificial-intelligence-and-cybersecurity-blog-2025\/"},"wordCount":1067,"commentCount":0,"publisher":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/#organization"},"image":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/onspring-artificial-intelligence-and-cybersecurity-blog-2025\/#primaryimage"},"thumbnailUrl":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/11\/Onspring-AI-Cybersecurity-preview-blog-image.png","keywords":["Artificial Intelligence","Cybersecurity","Federal Government","Onspring"],"articleSection":["Artificial Intelligence","Cybersecurity","Federal Government"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.carahsoft.com\/wordpress\/onspring-artificial-intelligence-and-cybersecurity-blog-2025\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.carahsoft.com\/wordpress\/onspring-artificial-intelligence-and-cybersecurity-blog-2025\/","url":"https:\/\/www.carahsoft.com\/wordpress\/onspring-artificial-intelligence-and-cybersecurity-blog-2025\/","name":"Artificial Intelligence and Cybersecurity: Federal | Carahsoft","isPartOf":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/onspring-artificial-intelligence-and-cybersecurity-blog-2025\/#primaryimage"},"image":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/onspring-artificial-intelligence-and-cybersecurity-blog-2025\/#primaryimage"},"thumbnailUrl":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/11\/Onspring-AI-Cybersecurity-preview-blog-image.png","datePublished":"2025-11-19T15:37:11+00:00","dateModified":"2025-11-19T15:37:12+00:00","description":"Discover how Federal agencies can leverage artificial intelligence (AI) to eliminate cyber threats while mitigating risks.","breadcrumb":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/onspring-artificial-intelligence-and-cybersecurity-blog-2025\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.carahsoft.com\/wordpress\/onspring-artificial-intelligence-and-cybersecurity-blog-2025\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.carahsoft.com\/wordpress\/onspring-artificial-intelligence-and-cybersecurity-blog-2025\/#primaryimage","url":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/11\/Onspring-AI-Cybersecurity-preview-blog-image.png","contentUrl":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/11\/Onspring-AI-Cybersecurity-preview-blog-image.png","width":875,"height":635},{"@type":"BreadcrumbList","@id":"https:\/\/www.carahsoft.com\/wordpress\/onspring-artificial-intelligence-and-cybersecurity-blog-2025\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.carahsoft.com\/wordpress\/"},{"@type":"ListItem","position":2,"name":"Artificial Intelligence and Cybersecurity: A Federal Perspective"}]},{"@type":"WebSite","@id":"https:\/\/www.carahsoft.com\/wordpress\/#website","url":"https:\/\/www.carahsoft.com\/wordpress\/","name":"| Carahsoft","description":"","publisher":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.carahsoft.com\/wordpress\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.carahsoft.com\/wordpress\/#organization","name":"Carahsoft","url":"https:\/\/www.carahsoft.com\/wordpress\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/logo\/image\/","url":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2022\/02\/Carahsoft-Blue-Logo-Print.png","contentUrl":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2022\/02\/Carahsoft-Blue-Logo-Print.png","width":3184,"height":846,"caption":"Carahsoft"},"image":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/7ef36b93fd236bf4ee76ab49a9105ef5","name":"caduncan@carahsoft.com","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/170e441354efb33164baf70f4f675d15?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/170e441354efb33164baf70f4f675d15?s=96&d=mm&r=g","caption":"caduncan@carahsoft.com"}}]}},"_links":{"self":[{"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/posts\/11524"}],"collection":[{"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/comments?post=11524"}],"version-history":[{"count":1,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/posts\/11524\/revisions"}],"predecessor-version":[{"id":11527,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/posts\/11524\/revisions\/11527"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/media\/11526"}],"wp:attachment":[{"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/media?parent=11524"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/categories?post=11524"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/tags?post=11524"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}