{"id":52210,"date":"2023-06-05T21:29:00","date_gmt":"2023-06-05T21:29:00","guid":{"rendered":"https:\/\/www.darkreading.com\/operations\/red-sift-launches-relevance-detection-as-gpt-4-powered-asset-discovery-and-classification-solution"},"modified":"2023-06-05T21:29:00","modified_gmt":"2023-06-05T21:29:00","slug":"red-sift-launches-relevance-detection-as-gpt-4-powered-asset-discovery-and-classification-solution","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/red-sift-launches-relevance-detection-as-gpt-4-powered-asset-discovery-and-classification-solution\/","title":{"rendered":"Red Sift Launches Relevance Detection as GPT-4-Powered Asset Discovery and Classification Solution"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/beta.darkreading.com\/images\/og-image.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p><strong><\/strong><span><strong><\/strong><span><strong>SAN FRANCISCO &amp; LONDON &#8212; June 5, 2023 &#8212;<\/strong><\/span><\/span><span><span> <\/span><\/span><a href=\"https:\/\/redsift.com\" target=\"_blank\" rel=\"noopener\"><span><span><\/span><\/span>Red Sift<\/a><span><span>, the leading Digital Resilience Platform enabling organizations to see, solve, and secure vulnerabilities in their attack surface, today launched Relevance Detection, a new, first-of-its-kind feature in <\/span><\/span><a href=\"https:\/\/redsift.com\/products\/ondomain\" target=\"_blank\" rel=\"noopener\"><span><span><\/span><\/span>OnDOMAIN<\/a><span><span> <\/span><\/span><span><span>powered by OpenAI\u2019s GPT-4 technology. With Relevance Detection, Red Sift empowers organizations to quickly and efficiently gain more visibility into their domain estate, giving them the tools they need to secure existing vulnerabilities and strengthen their network security posture.<\/span><\/span><span><span>&nbsp;<\/span><\/span><span><\/span><span><span><\/span><\/span><\/p>\n<p><span><span>According to <\/span><\/span><a href=\"https:\/\/www.technologyreview.com\/2021\/09\/08\/1034262\/a-game-changer-in-it-security\/\" target=\"_blank\" rel=\"noopener\"><span><span><\/span><\/span>a survey<\/a><span><span> <\/span><\/span><span><span>conducted by MIT Technology Review Insights of 700+ global leaders, over 50% said they have experienced a cybersecurity attack originating from an unknown, unmanaged, or poorly managed digital asset. For large organizations that struggle with the volume and complexity of network monitoring, Relevance Detection\u2019s artificial intelligence (AI) eliminates those challenges by automatically discovering and classifying the significance of identities found across sources such as DNS, WHOIS info, SSL certificates and many others, to provide custom recommendations for full identity enablement. Through Red Sift\u2019s proprietary methods of real-time monitoring of publicly-issued certificates and discovery of hostnames, the company ingests 10 million new certificates per month and checks more than 1.9 billion hostnames in its own database.&nbsp;<\/span><\/span><span><span>&nbsp;<\/span><\/span><span><\/span><span><span><\/span><\/span><\/p>\n<p><span><span>\u201cBuilding a comprehensive list of domain names has long plagued organizations, especially those that have undergone mergers and acquisitions. Even for organizations that successfully generate and maintain comprehensive asset inventory lists, evaluating them requires significant manual effort at a time when talent is scarce,\u201d said Rahul Powar, CEO, Red Sift. \u201cRelevance Detection will be an invaluable feature to organizations across the globe, as it removes the traditional barriers to network monitoring, and even translates identities that have been picked up in foreign languages, enabling the average non-multilingual human to understand and review them.\u201d&nbsp;<\/span><\/span><span><span>&nbsp;<\/span><\/span><span><\/span><span><span><\/span><\/span><\/p>\n<p><span><span>Historically, OnDOMAIN and Red Sift\u2019s External Attack Surface Management solution Hardenize, surfaced all discovered identities to its users. With today\u2019s new integration with GPT-4 and the launch of Relevance Detection, Red Sift can now automatically scan each identity and generate a custom recommendation that tells customers whether an identity should be monitored and why.&nbsp;<\/span><\/span><span><span>&nbsp;<\/span><\/span><span><\/span><span><span><\/span><\/span><\/p>\n<p><span><span>Once identities that appear relevant have been reviewed and enabled, OnDOMAIN continuously surfaces any undiscovered domain assets owned by an organization, as well as uncovers any potential lookalikes that exist in the wild. This enhanced discovery allows organizations to discover assets that may have been parked or forgotten, which if left vulnerable, could be an exploitable attack surface. Relevance Detection<em> <\/em>puts the power back into organizations\u2019 hands and enables security teams to decide which identities should be included in the domain asset discovery process.<\/span><\/span><span><span>&nbsp;<\/span><\/span><span><\/span><span><span><\/span><\/span><\/p>\n<p><span><span>To learn more about how Relevance Detection can redefine network monitoring and domain asset discovery for your organization, visit: <\/span><\/span><span><\/span><\/p>\n<p><strong><\/strong><span><strong><\/strong><span><strong>About Red Sift<\/strong><\/span><strong><\/strong><\/span><strong><\/strong><span><strong><\/strong><span><strong>&nbsp;<\/strong><\/span><\/span><span><\/span><\/p>\n<p><span><span>Red Sift&#8217;s Digital Resilience Platform solves for the greatest vulnerabilities across the complete attack surface. By providing comprehensive coverage of an organization\u2019s digital footprint through best-in-class discovery and monitoring, Red Sift enables users to proactively uncover threats within email, domains, brand, and the network perimeter. Paired with sophisticated remediation capabilities, Red Sift provides organizations with the tools to shut down phishing and ensure ongoing compliance with email and web security protocols.<\/span><\/span><span><span>&nbsp;<\/span><\/span><span><\/span><span><span><\/span><\/span><span><span><\/span><\/span><\/p>\n<p><span><span>Red Sift is a global organization with offices in North America, Australia, Spain, and the UK. It boasts an impressive client base across all industries, including Domino\u2019s, ZoomInfo, Athletic Greens, Pipedrive, and top global law firms. Red Sift is also a trusted partner of Entrust, Microsoft, and Validity, among others. Find out more at redsift.com.&nbsp;<\/span><\/span><span><span>&nbsp;<\/span><\/span><\/p>\n<p>Read More <a href=\"https:\/\/www.darkreading.com\/operations\/red-sift-launches-relevance-detection-as-gpt-4-powered-asset-discovery-and-classification-solution\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>New AI feature enhances OnDOMAIN&#8217;s capabilities to secure unknown vulnerabilities and strengthen network security posture.Read More <a href=\"https:\/\/www.darkreading.com\/operations\/red-sift-launches-relevance-detection-as-gpt-4-powered-asset-discovery-and-classification-solution\">HERE<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[151],"tags":[],"class_list":["post-52210","post","type-post","status-publish","format-standard","hentry","category-darkreading-ti"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Red Sift Launches Relevance Detection as GPT-4-Powered Asset Discovery and Classification Solution 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/red-sift-launches-relevance-detection-as-gpt-4-powered-asset-discovery-and-classification-solution\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Red Sift Launches Relevance Detection as GPT-4-Powered Asset Discovery and Classification Solution 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/red-sift-launches-relevance-detection-as-gpt-4-powered-asset-discovery-and-classification-solution\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-06-05T21:29:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/beta.darkreading.com\/images\/og-image.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/red-sift-launches-relevance-detection-as-gpt-4-powered-asset-discovery-and-classification-solution\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/red-sift-launches-relevance-detection-as-gpt-4-powered-asset-discovery-and-classification-solution\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Red Sift Launches Relevance Detection as GPT-4-Powered Asset Discovery and Classification Solution\",\"datePublished\":\"2023-06-05T21:29:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/red-sift-launches-relevance-detection-as-gpt-4-powered-asset-discovery-and-classification-solution\\\/\"},\"wordCount\":606,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/red-sift-launches-relevance-detection-as-gpt-4-powered-asset-discovery-and-classification-solution\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/beta.darkreading.com\\\/images\\\/og-image.jpg\",\"articleSection\":[\"DarkReading |TI\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/red-sift-launches-relevance-detection-as-gpt-4-powered-asset-discovery-and-classification-solution\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/red-sift-launches-relevance-detection-as-gpt-4-powered-asset-discovery-and-classification-solution\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/red-sift-launches-relevance-detection-as-gpt-4-powered-asset-discovery-and-classification-solution\\\/\",\"name\":\"Red Sift Launches Relevance Detection as GPT-4-Powered Asset Discovery and Classification Solution 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/red-sift-launches-relevance-detection-as-gpt-4-powered-asset-discovery-and-classification-solution\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/red-sift-launches-relevance-detection-as-gpt-4-powered-asset-discovery-and-classification-solution\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/beta.darkreading.com\\\/images\\\/og-image.jpg\",\"datePublished\":\"2023-06-05T21:29:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/red-sift-launches-relevance-detection-as-gpt-4-powered-asset-discovery-and-classification-solution\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/red-sift-launches-relevance-detection-as-gpt-4-powered-asset-discovery-and-classification-solution\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/red-sift-launches-relevance-detection-as-gpt-4-powered-asset-discovery-and-classification-solution\\\/#primaryimage\",\"url\":\"https:\\\/\\\/beta.darkreading.com\\\/images\\\/og-image.jpg\",\"contentUrl\":\"https:\\\/\\\/beta.darkreading.com\\\/images\\\/og-image.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/red-sift-launches-relevance-detection-as-gpt-4-powered-asset-discovery-and-classification-solution\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Red Sift Launches Relevance Detection as GPT-4-Powered Asset Discovery and Classification Solution\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Red Sift Launches Relevance Detection as GPT-4-Powered Asset Discovery and Classification Solution 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/red-sift-launches-relevance-detection-as-gpt-4-powered-asset-discovery-and-classification-solution\/","og_locale":"en_US","og_type":"article","og_title":"Red Sift Launches Relevance Detection as GPT-4-Powered Asset Discovery and Classification Solution 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/red-sift-launches-relevance-detection-as-gpt-4-powered-asset-discovery-and-classification-solution\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-06-05T21:29:00+00:00","og_image":[{"url":"https:\/\/beta.darkreading.com\/images\/og-image.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/red-sift-launches-relevance-detection-as-gpt-4-powered-asset-discovery-and-classification-solution\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/red-sift-launches-relevance-detection-as-gpt-4-powered-asset-discovery-and-classification-solution\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Red Sift Launches Relevance Detection as GPT-4-Powered Asset Discovery and Classification Solution","datePublished":"2023-06-05T21:29:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/red-sift-launches-relevance-detection-as-gpt-4-powered-asset-discovery-and-classification-solution\/"},"wordCount":606,"commentCount":0,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/red-sift-launches-relevance-detection-as-gpt-4-powered-asset-discovery-and-classification-solution\/#primaryimage"},"thumbnailUrl":"https:\/\/beta.darkreading.com\/images\/og-image.jpg","articleSection":["DarkReading |TI"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.threatshub.org\/blog\/red-sift-launches-relevance-detection-as-gpt-4-powered-asset-discovery-and-classification-solution\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/red-sift-launches-relevance-detection-as-gpt-4-powered-asset-discovery-and-classification-solution\/","url":"https:\/\/www.threatshub.org\/blog\/red-sift-launches-relevance-detection-as-gpt-4-powered-asset-discovery-and-classification-solution\/","name":"Red Sift Launches Relevance Detection as GPT-4-Powered Asset Discovery and Classification Solution 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/red-sift-launches-relevance-detection-as-gpt-4-powered-asset-discovery-and-classification-solution\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/red-sift-launches-relevance-detection-as-gpt-4-powered-asset-discovery-and-classification-solution\/#primaryimage"},"thumbnailUrl":"https:\/\/beta.darkreading.com\/images\/og-image.jpg","datePublished":"2023-06-05T21:29:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/red-sift-launches-relevance-detection-as-gpt-4-powered-asset-discovery-and-classification-solution\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/red-sift-launches-relevance-detection-as-gpt-4-powered-asset-discovery-and-classification-solution\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/red-sift-launches-relevance-detection-as-gpt-4-powered-asset-discovery-and-classification-solution\/#primaryimage","url":"https:\/\/beta.darkreading.com\/images\/og-image.jpg","contentUrl":"https:\/\/beta.darkreading.com\/images\/og-image.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/red-sift-launches-relevance-detection-as-gpt-4-powered-asset-discovery-and-classification-solution\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Red Sift Launches Relevance Detection as GPT-4-Powered Asset Discovery and Classification Solution"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/52210","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=52210"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/52210\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=52210"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=52210"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=52210"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}