{"id":26402,"date":"2025-06-20T15:17:53","date_gmt":"2025-06-20T14:17:53","guid":{"rendered":"https:\/\/www.riskinsight-wavestone.com\/?p=26402"},"modified":"2025-06-20T15:17:54","modified_gmt":"2025-06-20T14:17:54","slug":"cybersecurity-startups-radar-2025-ai-at-the-service-of-cybersecurity","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/06\/cybersecurity-startups-radar-2025-ai-at-the-service-of-cybersecurity\/","title":{"rendered":"Cybersecurity Startups Radar: 2025, AI at the service of cybersecurity"},"content":{"rendered":"\n<h2 style=\"text-align: justify;\">AI at the service of cybersecurity: a concrete step forward<\/h2>\n<p>\u00a0<\/p>\n<p style=\"text-align: justify;\">Every year since 2020, Wavestone has identified Swiss cybersecurity startups in its eponymous radar. While AI has established itself as a cross-disciplinary subject in all fields, the 2025 Radar focuses on the <strong>use of artificial intelligence as a tool<\/strong>, not just as a subject to be secured, but as a <strong>technology at the very heart of the cyber response.<\/strong><\/p>\n<p style=\"text-align: justify;\">Several startups are using AI to automate, enhance or personalize their solutions:<\/p>\n<p style=\"text-align: justify;\"><strong>Egonym<\/strong> uses generative AI to anonymize faces in images and videos while preserving useful traits like age and emotion \u2014 striking a rare balance between privacy and utility.<\/p>\n<p style=\"text-align: justify;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-26393\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/06\/Image16.jpg\" alt=\"egonym logo\" width=\"155\" height=\"53\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/06\/Image16.jpg 155w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/06\/Image16-71x24.jpg 71w\" sizes=\"auto, (max-width: 155px) 100vw, 155px\" \/><\/p>\n<p style=\"text-align: justify;\"><strong>Hafnova<\/strong> applies real-time AI to detect, block, and report threats across critical infrastructures with high responsiveness and minimal delay.<\/p>\n<p style=\"text-align: justify;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-26369\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/06\/Image2.png\" alt=\"Hafnova logo\" width=\"67\" height=\"71\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/06\/Image2.png 67w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/06\/Image2-37x39.png 37w\" sizes=\"auto, (max-width: 67px) 100vw, 67px\" \/><\/p>\n<p style=\"text-align: justify;\"><strong>Aurigin<\/strong> combats deepfake-based fraud in real time using multimodal AI that simultaneously analyzes voice, image, and text to validate identities.\u00a0<\/p>\n<p style=\"text-align: justify;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-26395\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/06\/Image17.jpg\" alt=\"aurigin.ai logo\" width=\"176\" height=\"51\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/06\/Image17.jpg 176w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/06\/Image17-71x21.jpg 71w\" sizes=\"auto, (max-width: 176px) 100vw, 176px\" \/><\/p>\n<p style=\"text-align: justify;\"><strong>RedCarbon<\/strong> delivers autonomous AI agents capable of handling complex cybersecurity tasks such as threat detection, hunting, and compliance monitoring \u2014 significantly reducing analyst workload.<\/p>\n<p style=\"text-align: justify;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-26375\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/06\/Image6-e1750428148421.png\" alt=\"REDCARBON logo\" width=\"183\" height=\"24\" \/><\/p>\n<p style=\"text-align: justify;\"><strong>Baited<\/strong> leverages AI and OSINT to generate hyper-realistic phishing simulations, enabling organizations to test and train employees under real-world conditions.<\/p>\n<p style=\"text-align: justify;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-26373\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/06\/Image5-e1750428603602.png\" alt=\"baited logo\" width=\"142\" height=\"45\" \/><\/p>\n<p style=\"text-align: justify;\">It&#8217;s good to see AI becoming an essential defensive weapon contributing to the defense of our information systems.<\/p>\n<p style=\"text-align: justify;\">\u00a0<\/p>\n<h2 style=\"text-align: justify;\">Strong momentum around threat detection, response and monitoring<\/h2>\n<p>\u00a0<\/p>\n<p style=\"text-align: justify;\">The second strong trend this year is the emergence or reinforcement of startups specializing in <strong>intrusion detection, suspicious behavior detection, incident response<\/strong> and <strong>continuous supervision.<\/strong><\/p>\n<p style=\"text-align: justify;\">This segment, already well established historically, is undoubtedly gaining strength with several new entries:<\/p>\n<p style=\"text-align: justify;\"><strong>RedCarbon<\/strong>: AI agents for threat detection &amp; automated hunting.<\/p>\n<p style=\"text-align: justify;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-26375\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/06\/Image6-e1750428148421.png\" alt=\"REDCARBON logo\" width=\"175\" height=\"23\" \/><\/p>\n<p style=\"text-align: justify;\"><strong>Swiss Security Hub<\/strong>: continuous monitoring of SAP systems with XDR integration.<\/p>\n<p style=\"text-align: justify;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-26377\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/06\/Image7-e1750428038244.png\" alt=\"Security Hub logo\" width=\"115\" height=\"115\" \/><\/p>\n<p style=\"text-align: justify;\"><strong>Cyberservices<\/strong> : XDR platform based on the Google ecosystem.<\/p>\n<p style=\"text-align: justify;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter  wp-image-26379\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/06\/Image8-e1750428222485.png\" alt=\"Cyberservices logo\" width=\"64\" height=\"35\" \/><\/p>\n<p style=\"text-align: justify;\"><strong>Hafnova<\/strong>: real-time cyber supervision in critical sectors.<\/p>\n<p style=\"text-align: justify;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-26369\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/06\/Image2.png\" alt=\"Hafnova logo\" width=\"67\" height=\"71\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/06\/Image2.png 67w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/06\/Image2-37x39.png 37w\" sizes=\"auto, (max-width: 67px) 100vw, 67px\" \/><\/p>\n<p style=\"text-align: justify;\"><strong>Tirreno<\/strong>: on-prem platform for online fraud detection with user trust scoring.<\/p>\n<p style=\"text-align: justify;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter  wp-image-26383\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/06\/Image10-e1750428239189.png\" alt=\"tirreno logo\" width=\"131\" height=\"29\" \/><\/p>\n<p style=\"text-align: justify;\">\u00a0<\/p>\n<p style=\"text-align: justify;\">At a time when cyber-attacks continue to increase in number and complexity, <strong>preventive, contextualized and autonomous detection<\/strong> is and will remain key to strengthening operational resilience.<\/p>\n<p style=\"text-align: justify;\"><strong>\u00a0<\/strong><\/p>\n<h2 style=\"text-align: justify;\">New ground explored: digital sovereignty and secure hardware<\/h2>\n<p>\u00a0<\/p>\n<p style=\"text-align: justify;\">Among the notable additions, <strong>The Cosmic Dolphins<\/strong> stands out with its sovereign hardware approach:<\/p>\n<p style=\"text-align: justify;\"><strong>The Cosmic Dolphins<\/strong>: Swiss smartphones with dual-zone OS (Shark Zone \/ Dolphin Zone), kill switch, and hardware-first approach to privacy.<\/p>\n<p style=\"text-align: justify;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-26385\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/06\/Image11-e1750428264682.jpg\" alt=\"The Cosmic Dolphins logo\" width=\"99\" height=\"99\" \/><\/p>\n<p style=\"text-align: justify;\">Swiss innovation isn&#8217;t limited to software: <strong>mastery of the physical infrastructure<\/strong> is becoming an issue of trust, sovereignty and differentiation.<\/p>\n<p style=\"text-align: justify;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-26387\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/06\/Image12.jpg\" alt=\"Cybersecurity Startups Radar: 2025, AI at the service of cybersecurity\" width=\"602\" height=\"338\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/06\/Image12.jpg 602w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/06\/Image12-340x191.jpg 340w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/06\/Image12-69x39.jpg 69w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/06\/Image12-600x338.jpg 600w\" sizes=\"auto, (max-width: 602px) 100vw, 602px\" \/><\/p>\n<h2 style=\"text-align: justify;\">Key Figures<\/h2>\n<h2 style=\"text-align: justify;\" data-wp-editing=\"1\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-26406 size-full\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/06\/Image18-e1750429011414.png\" alt=\"\" width=\"200\" height=\"39\" \/><br \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-26408 size-full\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/06\/Image19-e1750428988444.png\" alt=\"\" width=\"200\" height=\"67\" \/><\/h2>\n<p>\u00a0<\/p>\n<h2 style=\"text-align: justify;\">Geographical focus: undisputed predominance of Lausanne and Zurich, but other regions are gaining ground<\/h2>\n<p>\u00a0<\/p>\n<p style=\"text-align: justify;\">Unsurprisingly, most startups are located around two main technological clusters: Z\u00fcrich and Lausanne. This confirms an already existing trend since these two cities are hosting Swiss Federal institutes of technology (ETHZ in Z\u00fcrich, EPFL in Lausanne).<\/p>\n<p style=\"text-align: justify;\">These universities are providing a fertile ground for startups as they offer support in terms of infrastructure but also in terms of collaboration with students and labs. In return, intellectual property is shared between startups and universities. This model is a success for Switzerland as it allows to continuously improve the economy of these regions with a good balance between investment and research.<\/p>\n<p style=\"text-align: justify;\">Nevertheless, other regions such as Geneva and Ticino are showing increasing dynamism, with several new startups emerging in this year\u2019s edition. This points to a gradually diversifying ecosystem, supported by regional initiatives like innovation hubs and dedicated startup incubators.<\/p>\n<p style=\"text-align: justify;\">\u00a0<\/p>\n<h2 style=\"text-align: justify;\">Methodology<\/h2>\n<p>\u00a0<\/p>\n<p style=\"text-align: justify;\">Wavestone\u2019s Swiss Cybersecurity Startups Radar identifies new players in the Swiss cyber innovation ecosystem. Its objective: to provide a global and critical view of an ever-renewing environment.<\/p>\n<ul>\n<li style=\"text-align: justify;\">Startups were selected according to our eligibility criteria:<\/li>\n<li style=\"text-align: justify;\">Head office in Switzerland<\/li>\n<li style=\"text-align: justify;\">Less than 50 employees<\/li>\n<li style=\"text-align: justify;\">Less than 8 years of activity (established as of 2017)<\/li>\n<li style=\"text-align: justify;\">Business model around a specific product (software or hardware)<\/li>\n<li style=\"text-align: justify;\">Startups were identified and evaluated according to the following procedure:<\/li>\n<li style=\"text-align: justify;\">Open Source Intelligence (OSINT) data consolidation<\/li>\n<li style=\"text-align: justify;\">Evaluation in regard to above criteria<\/li>\n<li style=\"text-align: justify;\">Qualitative interviews with the startups<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>AI at the service of cybersecurity: a concrete step forward \u00a0 Every year since 2020, Wavestone has identified Swiss cybersecurity startups in its eponymous radar. While AI has established itself as a cross-disciplinary subject in all fields, the 2025 Radar&#8230;<\/p>\n","protected":false},"author":1550,"featured_media":26422,"comment_status":"open","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[3270,2777,3922],"tags":[3279,2772,4670,4379,4671,4672,4673],"coauthors":[4477,4665,4475],"class_list":["post-26402","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyberrisk-management-strategy-en","category-cybersecurity-digital-trust","category-deep-dive-en","tag-artificial-intelligence-en","tag-cybersecurity","tag-cybersecurity-startups-radar","tag-ia-2","tag-radar-2025-2","tag-swiss-radar","tag-switzerland"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybersecurity Startups Radar: 2025, AI at the service of cybersecurity - RiskInsight<\/title>\n<meta name=\"description\" content=\"While AI has established itself as a cross-disciplinary subject, the 2025 Radar focuses on the use of artificial intelligence as a tool and a technology at the very heart of the cyber response\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/06\/cybersecurity-startups-radar-2025-ai-at-the-service-of-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity Startups Radar: 2025, AI at the service of cybersecurity - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"While AI has established itself as a cross-disciplinary subject, the 2025 Radar focuses on the use of artificial intelligence as a tool and a technology at the very heart of the cyber response\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/06\/cybersecurity-startups-radar-2025-ai-at-the-service-of-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2025-06-20T14:17:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-20T14:17:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/06\/Image1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"808\" \/>\n\t<meta property=\"og:image:height\" content=\"540\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Johann Pl\u00fcss, Ahmed Amine Ghariani, R\u00e9mi Pactat\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Johann Pl\u00fcss, Ahmed Amine Ghariani, R\u00e9mi Pactat\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/06\/cybersecurity-startups-radar-2025-ai-at-the-service-of-cybersecurity\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/06\/cybersecurity-startups-radar-2025-ai-at-the-service-of-cybersecurity\/\"},\"author\":{\"name\":\"Ahmed Amine Ghariani\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8e5c66081cd7338d413d695731e23cd5\"},\"headline\":\"Cybersecurity Startups Radar: 2025, AI at the service of cybersecurity\",\"datePublished\":\"2025-06-20T14:17:53+00:00\",\"dateModified\":\"2025-06-20T14:17:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/06\/cybersecurity-startups-radar-2025-ai-at-the-service-of-cybersecurity\/\"},\"wordCount\":642,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/06\/cybersecurity-startups-radar-2025-ai-at-the-service-of-cybersecurity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/06\/Image1.jpg\",\"keywords\":[\"artificial intelligence\",\"cybersecurity\",\"Cybersecurity startups radar\",\"IA\",\"radar 2025\",\"Swiss radar\",\"Switzerland\"],\"articleSection\":[\"Cyberrisk Management &amp; Strategy\",\"Cybersecurity &amp; Digital Trust\",\"Deep-dive\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/06\/cybersecurity-startups-radar-2025-ai-at-the-service-of-cybersecurity\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/06\/cybersecurity-startups-radar-2025-ai-at-the-service-of-cybersecurity\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/06\/cybersecurity-startups-radar-2025-ai-at-the-service-of-cybersecurity\/\",\"name\":\"Cybersecurity Startups Radar: 2025, AI at the service of cybersecurity - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/06\/cybersecurity-startups-radar-2025-ai-at-the-service-of-cybersecurity\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/06\/cybersecurity-startups-radar-2025-ai-at-the-service-of-cybersecurity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/06\/Image1.jpg\",\"datePublished\":\"2025-06-20T14:17:53+00:00\",\"dateModified\":\"2025-06-20T14:17:54+00:00\",\"description\":\"While AI has established itself as a cross-disciplinary subject, the 2025 Radar focuses on the use of artificial intelligence as a tool and a technology at the very heart of the cyber response\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/06\/cybersecurity-startups-radar-2025-ai-at-the-service-of-cybersecurity\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/06\/cybersecurity-startups-radar-2025-ai-at-the-service-of-cybersecurity\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/06\/cybersecurity-startups-radar-2025-ai-at-the-service-of-cybersecurity\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/06\/Image1.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/06\/Image1.jpg\",\"width\":808,\"height\":540},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/06\/cybersecurity-startups-radar-2025-ai-at-the-service-of-cybersecurity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Startups Radar: 2025, AI at the service of cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8e5c66081cd7338d413d695731e23cd5\",\"name\":\"Ahmed Amine Ghariani\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/ahmedamine-ghariani\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity Startups Radar: 2025, AI at the service of cybersecurity - RiskInsight","description":"While AI has established itself as a cross-disciplinary subject, the 2025 Radar focuses on the use of artificial intelligence as a tool and a technology at the very heart of the cyber response","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/06\/cybersecurity-startups-radar-2025-ai-at-the-service-of-cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity Startups Radar: 2025, AI at the service of cybersecurity - RiskInsight","og_description":"While AI has established itself as a cross-disciplinary subject, the 2025 Radar focuses on the use of artificial intelligence as a tool and a technology at the very heart of the cyber response","og_url":"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/06\/cybersecurity-startups-radar-2025-ai-at-the-service-of-cybersecurity\/","og_site_name":"RiskInsight","article_published_time":"2025-06-20T14:17:53+00:00","article_modified_time":"2025-06-20T14:17:54+00:00","og_image":[{"width":808,"height":540,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/06\/Image1.jpg","type":"image\/jpeg"}],"author":"Johann Pl\u00fcss, Ahmed Amine Ghariani, R\u00e9mi Pactat","twitter_misc":{"Written by":"Johann Pl\u00fcss, Ahmed Amine Ghariani, R\u00e9mi Pactat","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/06\/cybersecurity-startups-radar-2025-ai-at-the-service-of-cybersecurity\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/06\/cybersecurity-startups-radar-2025-ai-at-the-service-of-cybersecurity\/"},"author":{"name":"Ahmed Amine Ghariani","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8e5c66081cd7338d413d695731e23cd5"},"headline":"Cybersecurity Startups Radar: 2025, AI at the service of cybersecurity","datePublished":"2025-06-20T14:17:53+00:00","dateModified":"2025-06-20T14:17:54+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/06\/cybersecurity-startups-radar-2025-ai-at-the-service-of-cybersecurity\/"},"wordCount":642,"commentCount":0,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/06\/cybersecurity-startups-radar-2025-ai-at-the-service-of-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/06\/Image1.jpg","keywords":["artificial intelligence","cybersecurity","Cybersecurity startups radar","IA","radar 2025","Swiss radar","Switzerland"],"articleSection":["Cyberrisk Management &amp; Strategy","Cybersecurity &amp; Digital Trust","Deep-dive"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2025\/06\/cybersecurity-startups-radar-2025-ai-at-the-service-of-cybersecurity\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/06\/cybersecurity-startups-radar-2025-ai-at-the-service-of-cybersecurity\/","url":"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/06\/cybersecurity-startups-radar-2025-ai-at-the-service-of-cybersecurity\/","name":"Cybersecurity Startups Radar: 2025, AI at the service of cybersecurity - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/06\/cybersecurity-startups-radar-2025-ai-at-the-service-of-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/06\/cybersecurity-startups-radar-2025-ai-at-the-service-of-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/06\/Image1.jpg","datePublished":"2025-06-20T14:17:53+00:00","dateModified":"2025-06-20T14:17:54+00:00","description":"While AI has established itself as a cross-disciplinary subject, the 2025 Radar focuses on the use of artificial intelligence as a tool and a technology at the very heart of the cyber response","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/06\/cybersecurity-startups-radar-2025-ai-at-the-service-of-cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2025\/06\/cybersecurity-startups-radar-2025-ai-at-the-service-of-cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/06\/cybersecurity-startups-radar-2025-ai-at-the-service-of-cybersecurity\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/06\/Image1.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2025\/06\/Image1.jpg","width":808,"height":540},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2025\/06\/cybersecurity-startups-radar-2025-ai-at-the-service-of-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Startups Radar: 2025, AI at the service of cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8e5c66081cd7338d413d695731e23cd5","name":"Ahmed Amine Ghariani","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/ahmedamine-ghariani\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/26402","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/1550"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=26402"}],"version-history":[{"count":32,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/26402\/revisions"}],"predecessor-version":[{"id":26459,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/26402\/revisions\/26459"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/26422"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=26402"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=26402"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=26402"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=26402"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}