<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Intelligence artificielle Archives - Cyriskintel</title>
	<atom:link href="https://cyriskintel.com/category/intelligence-artificielle/feed/" rel="self" type="application/rss+xml" />
	<link>https://cyriskintel.com/category/intelligence-artificielle/</link>
	<description>Conseil et formations en GRC</description>
	<lastBuildDate>Wed, 02 Apr 2025 21:33:05 +0000</lastBuildDate>
	<language>fr-FR</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.2</generator>

<image>
	<url>https://cyriskintel.com/wp-content/uploads/2025/06/cropped-CRI_Logo_New-32x32.png</url>
	<title>Intelligence artificielle Archives - Cyriskintel</title>
	<link>https://cyriskintel.com/category/intelligence-artificielle/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Typologie des intelligences artificielles</title>
		<link>https://cyriskintel.com/2025/04/02/typologie-des-intelligences-artificielles/</link>
					<comments>https://cyriskintel.com/2025/04/02/typologie-des-intelligences-artificielles/#respond</comments>
		
		<dc:creator><![CDATA[Gestion]]></dc:creator>
		<pubDate>Wed, 02 Apr 2025 21:33:05 +0000</pubDate>
				<category><![CDATA[Intelligence artificielle]]></category>
		<guid isPermaLink="false">https://cyriskintel.com/?p=822</guid>

					<description><![CDATA[<p>Pour éviter les confusions fréquentes de la littérature grand public, voici un diagramme avec plusieurs vues différentes de ce qu&#8217;est une intelligence artificielle, en distinguant, [...]</p>
<p>The post <a href="https://cyriskintel.com/2025/04/02/typologie-des-intelligences-artificielles/">Typologie des intelligences artificielles</a> appeared first on <a href="https://cyriskintel.com">Cyriskintel</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Pour éviter les confusions fréquentes de la littérature grand public, voici un diagramme avec plusieurs vues différentes de ce qu&rsquo;est une intelligence artificielle, en distinguant, au centre, les modes d&rsquo;apprentissage, des autres typologies et des usages qui en sont faits.</p>



<figure class="wp-block-image size-large"><img  alt="" class="wp-image-823 lws-optimize-lazyload"/ data-src="https://cyriskintel.com/wp-content/uploads/2025/04/image-1-1024x719.png"></figure>
<p>The post <a href="https://cyriskintel.com/2025/04/02/typologie-des-intelligences-artificielles/">Typologie des intelligences artificielles</a> appeared first on <a href="https://cyriskintel.com">Cyriskintel</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://cyriskintel.com/2025/04/02/typologie-des-intelligences-artificielles/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>AI Security Threats, controls and life cycle</title>
		<link>https://cyriskintel.com/2025/04/02/ai-security-threats-controls-and-life-cycle/</link>
					<comments>https://cyriskintel.com/2025/04/02/ai-security-threats-controls-and-life-cycle/#respond</comments>
		
		<dc:creator><![CDATA[Gestion]]></dc:creator>
		<pubDate>Wed, 02 Apr 2025 15:58:32 +0000</pubDate>
				<category><![CDATA[Cybersécurité]]></category>
		<category><![CDATA[Intelligence artificielle]]></category>
		<category><![CDATA[Risques]]></category>
		<guid isPermaLink="false">https://cyriskintel.com/?p=818</guid>

					<description><![CDATA[<p>Temporary mapping. From OWASP GenAI Security Project and NIST AI Risk Management Framework.</p>
<p>The post <a href="https://cyriskintel.com/2025/04/02/ai-security-threats-controls-and-life-cycle/">AI Security Threats, controls and life cycle</a> appeared first on <a href="https://cyriskintel.com">Cyriskintel</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Temporary mapping.</p>



<p>From OWASP GenAI Security Project and NIST AI Risk Management Framework.</p>



<figure class="wp-block-image size-large"><img  alt="" class="wp-image-819 lws-optimize-lazyload"/ data-src="https://cyriskintel.com/wp-content/uploads/2025/04/image-1024x705.png"></figure>
<p>The post <a href="https://cyriskintel.com/2025/04/02/ai-security-threats-controls-and-life-cycle/">AI Security Threats, controls and life cycle</a> appeared first on <a href="https://cyriskintel.com">Cyriskintel</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://cyriskintel.com/2025/04/02/ai-security-threats-controls-and-life-cycle/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
