{"id":4917,"date":"2025-08-30T03:06:26","date_gmt":"2025-08-30T01:06:26","guid":{"rendered":"https:\/\/implementi.ai\/en\/2025\/08\/30\/software-consumes-40-of-cybersecurity-budgets-amid-millisecond-gen-ai-attacks\/"},"modified":"2025-08-30T03:06:26","modified_gmt":"2025-08-30T01:06:26","slug":"%e5%9c%a8%e6%af%ab%e7%a7%92%e7%ba%a7%e4%ba%ba%e5%b7%a5%e6%99%ba%e8%83%bd%e6%94%bb%e5%87%bb%e4%b8%ad%ef%bc%8c%e8%bd%af%e4%bb%b6%e8%80%97%e8%b4%b9%e4%ba%86-40-%e7%9a%84%e7%bd%91%e7%bb%9c%e5%ae%89","status":"publish","type":"post","link":"https:\/\/implementi.ai\/zh\/2025\/08\/30\/software-consumes-40-of-cybersecurity-budgets-amid-millisecond-gen-ai-attacks\/","title":{"rendered":"\u5728\u6beb\u79d2\u7ea7\u4eba\u5de5\u667a\u80fd\u653b\u51fb\u4e2d\uff0c\u8f6f\u4ef6\u8017\u8d39\u4e86 40% \u7684\u7f51\u7edc\u5b89\u5168\u9884\u7b97"},"content":{"rendered":"<p>\u7f51\u7edc\u5b89\u5168\u7684\u683c\u5c40\u6b63\u5728\u53d1\u751f\u6839\u672c\u6027\u7684\u8f6c\u53d8\u3002\u9762\u5bf9\u4e0d\u65ad\u6f14\u53d8\u7684\u5a01\u80c1\uff0c\u4f20\u7edf\u7684\u9632\u5fa1\u63aa\u65bd\u5df2\u4e0d\u518d\u9002\u7528\uff0c\u8fd9\u5f15\u53d1\u4e86\u5411\u66f4\u5177\u521b\u65b0\u6027\u7684\u65b9\u6cd5\u7684\u91cd\u5927\u8f6c\u53d8\u3002\u4eca\u5929\uff0c\u6211\u4eec\u6bd4\u4ee5\u5f80\u4efb\u4f55\u65f6\u5019\u90fd\u66f4\u8feb\u5207\u9700\u8981\u6ce8\u5165\u5927\u91cf\u7684\u9884\u7b97\u8d44\u6e90\uff0c\u4ee5\u4fbf\u5728\u7f51\u7edc\u5b89\u5168\u7684\u9634\u6697\u6c34\u57df\u4e2d\u822a\u884c\u3002\u73b0\u5728\uff0c\u8f6f\u4ef6\u6210\u4e3a\u7126\u70b9\uff0c\u5728\u7f51\u7edc\u5b89\u5168\u9884\u7b97\u4e2d\u5360\u636e\u4e86\u524d\u6240\u672a\u6709\u7684 40% \u4efd\u989d\u3002\u8f6f\u4ef6\u5728\u7f51\u7edc\u5b89\u5168\u65b9\u9762\u7684\u652f\u51fa\u4e4b\u5927\uff0c\u8868\u660e\u5176\u5728\u5e94\u5bf9\u7f51\u7edc\u5a01\u80c1\u7684\u6218\u6597\u4e2d\u53d1\u6325\u7740\u6838\u5fc3\u4f5c\u7528\u3002 <\/p>\n<p>\u6570\u5b57\u5316\u7ee7\u7eed\u91cd\u65b0\u5b9a\u4e49\u7740\u6211\u4eec\u7ecf\u6d4e\u7684\u6bcf\u4e00\u4e2a\u9886\u57df\uff0c\u540c\u65f6\u4e5f\u5e26\u6765\u4e86\u5de8\u5927\u7684\u7f51\u7edc\u98ce\u9669\u9634\u5f71\u3002\u5728\u300a2020 \u5e74\u5168\u7403\u98ce\u9669\u62a5\u544a\u300b\u4e2d\uff0c\u4e16\u754c\u7ecf\u6d4e\u8bba\u575b\u5c06\u7f51\u7edc\u72af\u7f6a\u5217\u4e3a\u4f01\u4e1a\u9762\u4e34\u7684\u7b2c\u4e09\u5927\u5168\u7403\u98ce\u9669\u3002\u7f51\u7edc\u5a01\u80c1\u7684\u6025\u5267\u4e0a\u5347\u8feb\u4f7f\u5305\u62ec\u9996\u5e2d\u4fe1\u606f\u5b89\u5168\u5b98\uff08CISO\uff09\u5728\u5185\u7684\u5168\u7403\u9ad8\u5c42\u7ba1\u7406\u4eba\u5458\u5750\u7acb\u4e0d\u5b89\u3001\u5f15\u8d77\u91cd\u89c6\uff0c\u5e76\u91cd\u65b0\u5b89\u6392\u9884\u7b97\u7ed3\u6784\u7684\u4f18\u5148\u6b21\u5e8f\u3002 <\/p>\n<p>\u4e16\u754c\u6b63\u5728\u8fdb\u5165\u4eba\u5de5\u667a\u80fd\u6218\u4e89\u65f6\u4ee3\u3002\u9996\u5e2d\u4fe1\u606f\u5b89\u5168\u5b98\u4eec\u8ba4\u8bc6\u5230\uff0c\u5b9e\u65f6\u4eba\u5de5\u667a\u80fd\u9632\u5fa1\u7cfb\u7edf\u6709\u52a9\u4e8e\u9632\u8303\u5f53\u4eca\u590d\u6742\u7684\u7f51\u7edc\u5a01\u80c1\u3002\u5728\u53ef\u9884\u89c1\u7684\u672a\u6765\uff0c\u5bf9\u4eba\u5de5\u667a\u80fd\u96c6\u6210\u8f6f\u4ef6\u7684\u6295\u8d44\u9884\u8ba1\u5c06\u4e0d\u65ad\u589e\u957f\uff0c\u6210\u4e3a\u6bcf\u4f4d CISO \u6b66\u5668\u5e93\u4e2d\u4e0d\u53ef\u6216\u7f3a\u7684\u4e00\u90e8\u5206\u3002 <\/p>\n<h2>\u89e3\u8bfb\u5411\u8f6f\u4ef6\u548c\u4eba\u5de5\u667a\u80fd\u7684\u8f6c\u53d8<\/h2>\n<p>\u4e3a\u4ec0\u4e48\u5728\u786e\u5b9a\u7f51\u7edc\u5b89\u5168\u9884\u7b97\u65f6\u4f1a\u8f6c\u5411\u8f6f\u4ef6\u548c\u4eba\u5de5\u667a\u80fd\uff1f\u4e3a\u4ec0\u4e48 CISO \u8981\u8c03\u6574\u9884\u7b97\u5206\u914d\uff0c\u4f18\u5148\u8003\u8651\u8fd9\u4e9b\u9886\u57df\uff1f\u8fd9\u4e00\u8d8b\u52bf\u6709\u51e0\u4e2a\u4ee4\u4eba\u4fe1\u670d\u7684\u539f\u56e0\u3002 <\/p>\n<p>\u9996\u5148\uff0c\u7f51\u7edc\u5a01\u80c1\u73af\u5883\u53d8\u5f97\u65e5\u76ca\u590d\u6742\u3002\u7f51\u7edc\u653b\u51fb\u8005\u6b63\u53d8\u5f97\u8d8a\u6765\u8d8a\u590d\u6742\uff0c\u4ed6\u4eec\u91c7\u7528\u590d\u6742\u7684\u6218\u672f\uff0c\u5e76\u5229\u7528\u4eba\u5de5\u667a\u80fd\u548c\u673a\u5668\u5b66\u4e60\u7b49\u65b0\u6280\u672f\u6765\u5b9e\u65bd\u653b\u51fb\u3002\u4e25\u91cd\u4f9d\u8d56\u4eba\u5de5\u76d1\u63a7\u548c\u53cd\u5e94\u7684\u4f20\u7edf\u7f51\u7edc\u5b89\u5168\u5de5\u5177\u5df2\u7ecf\u8ddf\u4e0d\u4e0a\u65f6\u4ee3\u7684\u6b65\u4f10\u3002\u5728\u8fd9\u79cd\u60c5\u51b5\u4e0b\uff0c\u8f6f\u4ef6\u5f00\u59cb\u4ecb\u5165\uff0c\u63d0\u4f9b\u81ea\u52a8\u9632\u5fa1\uff0c\u4e0d\u4ec5\u66f4\u52a0\u6709\u6548\uff0c\u800c\u4e14\u5f71\u54cd\u6df1\u8fdc\u3002 <\/p>\n<p>\u5176\u6b21\uff0c\u5f53\u4eca\u4ea7\u751f\u7684\u5927\u91cf\u6570\u636e\u4f7f\u60c5\u51b5\u53d8\u5f97\u66f4\u52a0\u590d\u6742\u3002\u968f\u7740\u6570\u5b57\u5316\u8d8b\u52bf\u7684\u4e0d\u65ad\u53d1\u5c55\uff0c\u4f01\u4e1a\u6b63\u5728\u521b\u5efa\u548c\u5b58\u50a8\u6bd4\u4ee5\u5f80\u66f4\u591a\u7684\u6570\u636e\u3002\u8981\u4fdd\u62a4\u8fd9\u4e9b\u5e9e\u5927\u7684\u6570\u636e\u514d\u53d7\u7f51\u7edc\u5a01\u80c1\uff0c\u5c31\u5fc5\u987b\u8fdb\u884c\u6709\u6548\u7684\u6570\u636e\u5904\u7406\uff0c\u800c\u6ca1\u6709\u6b63\u786e\u7684\u8f6f\u4ef6\u5de5\u5177\u662f\u4e0d\u53ef\u80fd\u505a\u5230\u8fd9\u4e00\u70b9\u7684\u3002 <\/p>\n<p>\u6700\u540e\uff0c\u4f46\u6700\u91cd\u8981\u7684\u662f\u4eba\u5de5\u667a\u80fd\u548c\u673a\u5668\u5b66\u4e60\u6280\u672f\u7684\u51fa\u73b0\u3002\u8fd9\u4e9b\u6280\u672f\u80fd\u591f\u8fc5\u901f\u800c\u51c6\u786e\u5730\u68c0\u6d4b\u548c\u7f13\u89e3\u5a01\u80c1\uff0c\u5728\u590d\u6742\u800c\u5e9e\u5927\u7684\u6570\u5b57\u73af\u5883\u4e2d\u63d0\u4f9b\u6025\u9700\u7684\u4fdd\u62a4\u5c42\u3002\u6b64\u5916\uff0c\u4eba\u5de5\u667a\u80fd\u8fd8\u53ef\u4ee5\u9884\u6d4b\u6f5c\u5728\u7684\u653b\u51fb\uff0c\u4e3a\u4f01\u4e1a\u91c7\u53d6\u4e3b\u52a8\u63aa\u65bd\u63d0\u4f9b\u9884\u8b66\u7cfb\u7edf\u3002 <\/p>\n<h2>\u7ed3\u8bba<\/h2>\n<p>\u9274\u4e8e\u7f51\u7edc\u5a01\u80c1\u65e5\u76ca\u589e\u52a0\uff0c\u8f6f\u4ef6\u548c\u4eba\u5de5\u667a\u80fd\u4e0e\u7f51\u7edc\u5b89\u5168\u7684\u7ed3\u5408\u663e\u7136\u5df2\u4e0d\u4ec5\u4ec5\u662f\u4e00\u79cd\u9009\u62e9\uff0c\u800c\u662f\u4f01\u4e1a\u5bfb\u6c42\u6709\u6548\u9632\u5fa1\u7684\u5fc5\u8981\u6761\u4ef6\u3002\u4ee4\u4eba\u6b23\u6170\u7684\u662f\uff0cCISO \u8c03\u6574\u9884\u7b97\u7684\u8d8b\u52bf\u8f6c\u5411\u4e86\u8f6f\u4ef6\u548c\u5b9e\u65f6\u4eba\u5de5\u667a\u80fd\u9632\u5fa1\uff0c\u5f88\u660e\u663e\uff0c\u5728\u53ef\u9884\u89c1\u7684\u672a\u6765\uff0c\u8fd9\u4e00\u8d8b\u52bf\u53ea\u4f1a\u6108\u6f14\u6108\u70c8\u3002 <\/p>\n<p><a href=\"https:\/\/venturebeat.com\/security\/software-is-40-of-security-budgets-as-cisos-shift-to-ai-defense\/\" target=\"_blank\" rel=\"noopener\">\u70b9\u51fb\u6b64\u5904\u67e5\u770b\u539f\u6587<\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>The landscape of cybersecurity is undergoing fundamental transformations. The traditional defenses no longer hold against the constantly evolving threats, sparking a seismic shift towards more innovative approaches. Today, more than ever, a significant injection of budgetary resources is urgently needed to navigate the murky waters of cybersecurity. The spotlight is now on software, commanding an unprecedented 40% slice of cybersecurity [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":4918,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[26],"tags":[],"class_list":["post-4917","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-automation"],"featured_image_src":"https:\/\/implementi.ai\/wp-content\/uploads\/2025\/08\/4917-1024x683.png","blog_images":{"medium":"https:\/\/implementi.ai\/wp-content\/uploads\/2025\/08\/4917-300x200.png","large":"https:\/\/implementi.ai\/wp-content\/uploads\/2025\/08\/4917-1024x683.png"},"ams_acf":[],"jetpack_featured_media_url":"https:\/\/implementi.ai\/wp-content\/uploads\/2025\/08\/4917.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/implementi.ai\/zh\/wp-json\/wp\/v2\/posts\/4917","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/implementi.ai\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/implementi.ai\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/implementi.ai\/zh\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/implementi.ai\/zh\/wp-json\/wp\/v2\/comments?post=4917"}],"version-history":[{"count":0,"href":"https:\/\/implementi.ai\/zh\/wp-json\/wp\/v2\/posts\/4917\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/implementi.ai\/zh\/wp-json\/wp\/v2\/media\/4918"}],"wp:attachment":[{"href":"https:\/\/implementi.ai\/zh\/wp-json\/wp\/v2\/media?parent=4917"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/implementi.ai\/zh\/wp-json\/wp\/v2\/categories?post=4917"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/implementi.ai\/zh\/wp-json\/wp\/v2\/tags?post=4917"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}