You Can’t Sleep in the AI Era: The Brutal Reality of Securing Modern Data Centers

Uriel kosayev

Author

Uriel Kosayev
Uriel Kosayev is a cybersecurity researcher, reverse engineer, and author of MAoS and Antivirus Bypass Techniques. He’s led real-world red team ops, malware investigations, and incident response cases. As the founder of TrainSec Academy, he teaches professionals to think like attackers and defend with precision. His training is practical, focused, and based on real threats, not theory.

A summary and perspective from the panel discussion at the “Data Centers & Cloud 2025” conference.

In a recent panel of industry experts convened at the annual Data Centers & Cloud 2025 event, we explored how data‑centres and cloud infrastructures are preparing for the AI era and why the sleep‑at‑night factor may be under threat for many organizations.

Setting the Scene

As AI and data‑intensive workloads move to the fore, traditional data‑centre and cloud infrastructure are under unprecedented pressure. The panel, which included cloud and cyber‑security leaders from government, healthcare and enterprise, examined how legacy installation, hybrid models, regulation, infrastructure scaling, and the human factor combine to create a volatile mix.

My Key Takeaways (as Uriel Kosayev)

  1. “You can breach any data‑centre … and any user.”
    Even the most hardened data‑centre or the most privileged user account is not immune. AI brings tremendous potential but also heightened responsibility. If we don’t manage access and permissions correctly, the whole system can unravel.
  2. The cloud‑transition is harder than it sounds.
    Many organizations still operate substantial on‑premise installations. In practice, the hybrid model becomes a bridge but also a risk vector. Maintaining parallel operations on‑premise and in the cloud adds complexity and creates new attack surfaces.
  3. From defeat‑preparation to damage‑limitation? That’s not good enough.
    Too many organizations have moved from “we will defend and win” to “we anticipate we’ll be attacked and aim to limit damage”. That signals a weaker stance akin to buying a car without a full inspection.

Other Panel Highlights

  • Tali Shitrit emphasized that although dedicated hardware installs will continue in the short term, the long‑term strategic direction must be cloud‑centric especially as AI workloads scale.
  • Orna Granot stressed data sovereignty: keeping all sensitive data in Israel.
  • Moshe Praver noted hyperscalers’ advantage but warned of availability risks in crisis scenarios.
  • Alex Peleg highlighted that security focus shifts from hardware protection to entity protection in cloud environments.

EDR Internals – Research & Development

This hands-on workshop is designed to give cybersecurity professionals, malware researchers, and detection engineers a rare opportunity to explore how modern Endpoint Detection and Response (EDR) solutions truly work, and how to both research and build them from the ground up.

Why This Matters

  • Hybrid complexity = hybrid risk.
  • AI workloads demand new infrastructure scale.
  • Identity becomes the critical vulnerability point.
  • Organisational mindset must return to proactive defence, not passive acceptance.

Recommendations

  • Avoid “lift‑and‑shift” cloud migration; start with identity/permissions design.
  • Build monitoring and incident response that is hybrid‑aware.
  • Evaluate cloud providers for sovereignty, regional availability, and crisis resilience.
  • Test application entry points aggressively, especially those exposed through AI‑augmented services.
  • Shift to continuous offensive testing: red‑teaming, penetration testing, identity audits.

Final Words

In the AI‑era, the data‑centre is no longer a simple physical facility. It is a dynamic hybrid ecosystem of compute, cloud services, accelerators, and identity flows. Security leaders cannot sleep soundly but with the right architecture and mindset, they can stay ahead of the threat curve.

Source & Attribution

Based on a panel discussion at Data Centers & Cloud 2025 and the original Hebrew article published by PC.co.il.

blue depth
Uriel kosayev

About the author

Uriel Kosayev
Uriel Kosayev is a cybersecurity researcher, reverse engineer, and author of MAoS and Antivirus Bypass Techniques. He’s led real-world red team ops, malware investigations, and incident response cases. As the founder of TrainSec Academy, he teaches professionals to think like attackers and defend with precision. His training is practical, focused, and based on real threats, not theory.

Even more articles from the free knowledge library

The following articles were written by the TrainSec trainers for the free knowledge library.

electron based cross platform vulnerability exploitation

One Electron to Rule Them All

Authors Uriel Kosayev — @MalFuzzer, Hai Vaknin — @VakninHai, Tamir Yehuda — @Tamirye94, Matan Bahar — @Bl4ckShad3 Prologue As red teamers, we are on a constant verge and

Read More

The Malware Shlayer

As Mac malware becomes more widespread and as detection mechanisms get more sophisticated, malware actors need to adapt. If not

Read More