{"id":830389,"date":"2024-07-08T09:37:21","date_gmt":"2024-07-08T04:07:21","guid":{"rendered":"https:\/\/telecomlive.in\/web\/?p=830389"},"modified":"2024-07-08T09:37:05","modified_gmt":"2024-07-08T04:07:05","slug":"genai-has-potential-to-enhance-cybersecurity-practices-says-chief-security-strategist","status":"publish","type":"post","link":"https:\/\/telecomlive.in\/web\/2024\/07\/08\/genai-has-potential-to-enhance-cybersecurity-practices-says-chief-security-strategist\/","title":{"rendered":"GenAI has potential to enhance cybersecurity practices, says chief security strategist"},"content":{"rendered":"<p>Generative AI tools, if understood fully, can be utilized in cybersecurity, says Nathan Wenzler, Chief Security Strategist at US-based cybersecurity firm Tenable. <\/p>\n<p>\u201cGenAI is good at iterating data. It takes data in its raw format and transforms it into an output. In the security world, this is a huge benefit, because practitioners are constantly looking at complicated sets of data &#8211; security findings from our firewalls, our vulnerability scanners, and our web pen tests,\u201d he added.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Generative AI tools, if understood fully, can be utilized in cybersecurity, says Nathan Wenzler, Chief Security Strategist at US-based cybersecurity firm Tenable. \u201cGenAI is good at iterating data. It takes data in its raw format and transforms it into an output. In the security world, this is a huge benefit, because practitioners are constantly looking at complicated sets of data &#8211; security findings from our firewalls, our vulnerability scanners, and our web pen tests,\u201d he added.<\/p>\n","protected":false},"author":8,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[4],"tags":[],"class_list":["post-830389","post","type-post","status-publish","format-standard","hentry","category-newspapers"],"acf":[],"_links":{"self":[{"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/posts\/830389","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/comments?post=830389"}],"version-history":[{"count":0,"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/posts\/830389\/revisions"}],"wp:attachment":[{"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/media?parent=830389"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/categories?post=830389"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/tags?post=830389"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}