{"id":972259,"date":"2025-11-06T09:40:35","date_gmt":"2025-11-06T04:10:35","guid":{"rendered":"https:\/\/telecomlive.in\/web\/?p=972259"},"modified":"2025-11-06T10:56:20","modified_gmt":"2025-11-06T05:26:20","slug":"from-hackers-to-defenders-how-ai-and-generative-models-are-reshaping-cybersecurity","status":"publish","type":"post","link":"https:\/\/telecomlive.in\/web\/2025\/11\/06\/from-hackers-to-defenders-how-ai-and-generative-models-are-reshaping-cybersecurity\/","title":{"rendered":"From Hackers to Defenders: How AI and Generative Models Are Reshaping Cybersecurity"},"content":{"rendered":"<p>New Delhi [India], November 5: The war on cyber attackers and cyber security defenders in the new reality of the evolving digital world has reached a new stage: The Age of Intelligent Cybersecurity. The combination of Artificial Intelligence (AI) and cybersecurity has turned the management of digital defense in a completely new direction. Previously relying on human surveillance, intelligent automation has made security systems detect and neutralize threats within seconds, which is now automated.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>New Delhi [India], November 5: The war on cyber attackers and cyber security defenders in the new reality of the evolving digital world has reached a new stage: The Age of Intelligent Cybersecurity. The combination of Artificial Intelligence (AI) and cybersecurity has turned the management of digital defense in a completely new direction. Previously relying on human surveillance, intelligent automation has made security systems detect and neutralize threats within seconds, which is now automated.<\/p>\n","protected":false},"author":8,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[91,4,24],"tags":[],"class_list":["post-972259","post","type-post","status-publish","format-standard","hentry","category-it-2-the-tribune","category-newspapers","category-the-tribune"],"acf":[],"_links":{"self":[{"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/posts\/972259","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/comments?post=972259"}],"version-history":[{"count":0,"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/posts\/972259\/revisions"}],"wp:attachment":[{"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/media?parent=972259"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/categories?post=972259"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/tags?post=972259"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}