Venkata, Sujan Kumar Seethamsetty (2025) Enhance your enterprise security and controls through generative AI. World Journal of Advanced Research and Reviews, 26 (2). pp. 1287-1297. ISSN 2581-9615
![WJARR-2025-1680.pdf [thumbnail of WJARR-2025-1680.pdf]](https://eprint.scholarsrepository.com/style/images/fileicons/text.png)
WJARR-2025-1680.pdf - Published Version
Available under License Creative Commons Attribution Non-commercial Share Alike.
Abstract
This article explores the transformative potential of generative artificial intelligence in enhancing enterprise security and controls. As organizations confront increasingly sophisticated cyber threats, traditional reactive security measures prove insufficient against adaptive adversaries. Generative AI offers a paradigm shift by leveraging advanced machine learning algorithms to understand normal system behaviors, predict potential attack vectors, and respond autonomously to emerging threats. The article examines how generative AI enhances security through proactive threat detection, behavioral analysis, anomaly detection, and real-time threat intelligence. It delves into the transformation of core security processes, including automated vulnerability assessment and adaptive authentication. The article highlights generative AI's capability to simulate attacks through graph-based modeling and adversarial training, enabling organizations to identify and remediate vulnerabilities before exploitation. While acknowledging significant implementation challenges related to data privacy, model security, algorithmic transparency, and regulatory compliance, the article provides a strategic adoption framework with case studies demonstrating successful implementations in financial services and healthcare sectors, offering a roadmap for organizations seeking to leverage generative AI for enhanced security postures.
Item Type: | Article |
---|---|
Official URL: | https://doi.org/10.30574/wjarr.2025.26.2.1680 |
Uncontrolled Keywords: | Generative artificial intelligence; Cybersecurity transformation; Proactive threat detection; Adversarial machine learning; Security automation |
Depositing User: | Editor WJARR |
Date Deposited: | 20 Aug 2025 10:42 |
Related URLs: | |
URI: | https://eprint.scholarsrepository.com/id/eprint/2817 |