{"id":52247,"date":"2023-06-07T17:59:00","date_gmt":"2023-06-07T17:59:00","guid":{"rendered":"https:\/\/www.networkworld.com\/article\/3699048\/cisco-spotlights-generative-ai-in-security-collaboration.html#tk.rss_security"},"modified":"2023-06-07T17:59:00","modified_gmt":"2023-06-07T17:59:00","slug":"cisco-spotlights-generative-ai-in-security-collaboration","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/cisco-spotlights-generative-ai-in-security-collaboration\/","title":{"rendered":"Cisco spotlights generative AI in security, collaboration"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/idge\/imported\/imageapi\/2023\/05\/08\/01\/shutterstock_728178127-100940689-large.jpg?auto=webp&amp;quality=85,70\" class=\"ff-og-image-inserted\"><\/div>\n<p>Looking to harness a decade of AI\/ML development Cisco this week previewed generative AI-based features it will soon bring to its Security Cloud service and Webex collaboration offerings.<\/p>\n<p>Cisco said it was looking meld the network and security intelligence it has amassed over the years with the large language models (LLMs) of generative AI to simplify enterprise operations and address threats with practical, effective techniques. &nbsp;<\/p>\n<p>The first fruits of this effort will be directed at the Cisco Security Cloud, the overarching, integrated-security platform that includes software such as Duo access control and Umbrella security as well as firewalls and&nbsp; Talos threat intelligence access all delivered via the cloud.<\/p>\n<p>During his Cisco Live! keynote, Jeetu Patel, Cisco\u2019s executive vice president and general manager of security and collaboration, said that an AI-based policy engine, Policy Assistant, will be available by the end of the year in Security Cloud. The idea is that the assistant will use natural language interfaces to simplify policy management for admins, he said.&nbsp;<\/p>\n<p>Security and IT administrators will be able to describe granular security policies and the assistant willl evaluate how to best implement them across different aspects of their security infrastructure, Patel said.<\/p>\n<p>At the Live! event, Cisco demoed how a generative Cisco Policy Assistant can reason with the existing set of&nbsp; firewall policy rules to implement and simplify them within the Cisco Secure Firewall Management Center. Cisco says it is the first of many examples of how generative AI can reimagine policy management across the Cisco Security Cloud.<\/p>\n<aside class=\"nativo-promo nativo-promo-1 smartphone\" id> <\/aside>\n<p>\u201cBasically going forward you won\u2019t need to have a Ph.D. to manage a firewall policy,\u201d Patel said.<\/p>\n<p>In addition, he said the security assistant will let customers describe and contextualize events across email, the web, endpoints, and the network to tell security operation center (SOC) analyst exactly what happened,&nbsp;the impact, and best next steps to take to remediate problems and set new policies.<\/p>\n<aside class=\"nativo-promo nativo-promo-1 tablet desktop\" id> <\/aside>\n<p>The SOC Assistant will provide a comprehensive situation analysis for analysts, correlating intel across the Cisco Security Cloud, relaying potential impacts, and providing recommended actions with the goal of reducing the time needed for SOC teams to respond to potential threats, he said.<\/p>\n<p>\u201cCisco will continue to add generative AI capabilities to our entire security portfolio over time,\u201d Patel said.<\/p>\n<p>Generative AI will also be a part of features\u2014to be disclosed in the future\u2014in Cisco <a href=\"https:\/\/www.networkworld.com\/article\/3698691\/cisco-vision-takes-networking-to-the-cloud-in-a-big-way.html\">Networking Cloud<\/a> unveiled at this week\u2019s Cisco Live! The Networking Cloud will involve a broad range of software and cloud-system integration and has as its ultimate goal to converge networking platforms over time, culminating in a unified management platform. &nbsp;<\/p>\n<h2>Cisco relies on in-house generative AI.<\/h2>\n<p>In addition, Cisco recently announced <a href=\"https:\/\/www.networkworld.com\/article\/3698288\/cisco-aims-for-ai-first-security-with-armorblox-buy.html\">plans to buy Armorblox<\/a>, a six-year-old AI vendor, to help create \u201can AI-first Security Cloud.\u201d<\/p>\n<aside class=\"nativo-promo nativo-promo-2 tablet desktop smartphone\" id> <\/aside>\n<p>\u201cLeveraging Armorblox\u2019s use of predictive and generative AI across our portfolio, we will change the way our customers understand and interact with their security control points,\u201d wrote Raj Chopra senior vice president and chief product officer for Cisco Security in a blog announcing the pending acquisition.<\/p>\n<p>The use of generative AI is potentially a powerful tool for enterprises but its still early yet and customers should start to get a handle on it now,&nbsp;said Neil Anderson, area vice president of Cloud &amp; Infrastructure Solutions at World Wide Technology (WWT), a technology services provider and Cisco business partner.<\/p>\n<p>WWT recently <a href=\"https:\/\/www.wwt.com\/wwt-research\/manage-generative-ai-before-it-manages-you\" rel=\"nofollow\">issued a report<\/a> on the use of generative AI in the enterprise that stated: \u201cFor now, generative AI should be treated with caution. Unless using a proprietary generative AI solution, the technology is not ready for critical or semi-critical enterprise use cases. Governance and risk management must be top of mind for IT leaders being inundated with requests for how best to implement the technology.\u201d<\/p>\n<p>\u201cWe expect that as people get their arms &nbsp;around AI and figure out how they will actually use this technology securely, it will become valuable\u2014because it\u2019s a little like the Wild West right now,\u201d Anderson said.<\/p>\n<aside class=\"nativo-promo nativo-promo-3 tablet desktop smartphone\" id> <\/aside>\n<p>Shamus McGillicuddy, research director for the network-management practice at Enterprise Management Associates, said network pros recognize that AI\/ML can optimize and automate IT operations, so it makes sense for Cisco to make a big investment in it.<\/p>\n<p>\u201cIt will take time for customers to learn to trust this stuff,\u201d he said. \u201cIf it works, AI features will prove their value fairly quickly. Right now, much of this is about vision and a commitment to product development. Automated troubleshooting and predictive capacity management will be key use cases.\u201d<\/p>\n<h2>AI will support Webex features, too.<\/h2>\n<p>Cisco\u2019s security portfolio won\u2019t be the only system where generative AI will impact customers.<\/p>\n<p>The company introduced a variety of AI-based features for its flagship collaboration <a href=\"https:\/\/www.computerworld.com\/article\/3698714\/cisco-brings-generative-ai-to-webex-and-cisco-security-cloud.html\">Webex Suite<\/a> of software as well.<\/p>\n<p>For example, a new catch-me-up feature lets users ask questions about meetings or chats they missed. The idea is that customers can find out the status of a project or get an overview of what was discussed in a previous&nbsp;meeting they might have missed. In addition, users can simply generate intelligent summaries of meetings with action items from a Webex meeting or&nbsp;<a href=\"https:\/\/url.avanan.click\/v2\/___https:\/vidcast.io\/___.YXAzOmlkYzphOm86NWU1MDhlY2M4ZmE0ZGZmMGIzMWFlNTNiOGFlODNlNTQ6Njo4YmEwOmUwYjFiMWJlMTJhNTQ0ZTVlYTE4MGViNTlhNGQyOTM1NjVjNDJiMDNhOTgxNGM4NWM2NzA2YjI1ZGFlYTU4MjE6aDpU\" rel=\"nofollow\">Vidcast<\/a>, Cisco\u2019s video messaging tool.&nbsp;&nbsp;<\/p>\n<p>Also a new conversation capability in <a href=\"https:\/\/blog.webex.com\/customer-experience\/delivering-on-the-customer-experience-imperative\" rel=\"nofollow\">Webex Contact Center<\/a> will provide agents with a fast, automated way to consume long-form text from digital chats with customers as well as easing post-call wrap-up and resolution with customers.<\/p>\n<p>The idea with the new AI features within Webex is to save times and help make faster, smarter decisions by analyzing vast amounts of information in real-time, Cisco stated.&nbsp;<\/p>\n<p>\u201cAI empowers organizations to tackle the challenges of hybrid work head-on, bridging gaps in real-time information, streamlining manual processes, reducing unnecessary meetings, and ultimately delivering exceptional experiences for employees and customers,\u201d Cisco stated <a href=\"https:\/\/blog.webex.com\/innovation\/reimagining-how-and-where-we-work\/\" rel=\"nofollow\">in a blog post<\/a>.<\/p>\n<div class=\"end-note\"> <!-- blx4 #2005 blox4.html --> <\/p>\n<div id class=\"blx blxParticleendnote blxM2005 blox4_html blxC23909\">\n<p> <strong>Next read this:<\/strong> <\/p>\n<\/p><\/div>\n<\/p><\/div>\n<p> READ MORE <a href=\"https:\/\/www.networkworld.com\/article\/3699048\/cisco-spotlights-generative-ai-in-security-collaboration.html#tk.rss_security\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\nLooking to harness a decade of AI\/ML development Cisco this week previewed generative AI-based features it will soon bring to its Security Cloud service and Webex collaboration offerings.Cisco said it was looking meld the network and security intelligence it has amassed over the years with the large language models (LLMs) of generative AI to simplify enterprise operations and address threats with practical, effective techniques. \u00a0The first fruits of this effort will be directed at the Cisco Security Cloud, the overarching, integrated-security platform that includes software such as Duo access control and Umbrella security as well as firewalls and\u00a0 Talos threat intelligence access all delivered via the cloud.To read this article in full, please click here READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":52248,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[738],"tags":[539,536,1061,307],"class_list":["post-52247","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-networkworld","tag-cisco-systems","tag-cloud-security","tag-network-security","tag-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cisco spotlights generative AI in security, collaboration 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/cisco-spotlights-generative-ai-in-security-collaboration\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cisco spotlights generative AI in security, collaboration 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/cisco-spotlights-generative-ai-in-security-collaboration\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-06-07T17:59:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/images.idgesg.net\/images\/idge\/imported\/imageapi\/2023\/05\/08\/01\/shutterstock_728178127-100940689-large.jpg?auto=webp&amp;quality=85,70\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/cisco-spotlights-generative-ai-in-security-collaboration\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/cisco-spotlights-generative-ai-in-security-collaboration\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Cisco spotlights generative AI in security, collaboration\",\"datePublished\":\"2023-06-07T17:59:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/cisco-spotlights-generative-ai-in-security-collaboration\/\"},\"wordCount\":992,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/cisco-spotlights-generative-ai-in-security-collaboration\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/06\/cisco-spotlights-generative-ai-in-security-collaboration.jpg\",\"keywords\":[\"Cisco systems\",\"Cloud Security\",\"Network Security\",\"Security\"],\"articleSection\":[\"Networkworld\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/cisco-spotlights-generative-ai-in-security-collaboration\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/cisco-spotlights-generative-ai-in-security-collaboration\/\",\"name\":\"Cisco spotlights generative AI in security, collaboration 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/cisco-spotlights-generative-ai-in-security-collaboration\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/cisco-spotlights-generative-ai-in-security-collaboration\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/06\/cisco-spotlights-generative-ai-in-security-collaboration.jpg\",\"datePublished\":\"2023-06-07T17:59:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/cisco-spotlights-generative-ai-in-security-collaboration\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/cisco-spotlights-generative-ai-in-security-collaboration\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/cisco-spotlights-generative-ai-in-security-collaboration\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/06\/cisco-spotlights-generative-ai-in-security-collaboration.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/06\/cisco-spotlights-generative-ai-in-security-collaboration.jpg\",\"width\":150,\"height\":100},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/cisco-spotlights-generative-ai-in-security-collaboration\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cisco systems\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/cisco-systems\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cisco spotlights generative AI in security, collaboration\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cisco spotlights generative AI in security, collaboration 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/cisco-spotlights-generative-ai-in-security-collaboration\/","og_locale":"en_US","og_type":"article","og_title":"Cisco spotlights generative AI in security, collaboration 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/cisco-spotlights-generative-ai-in-security-collaboration\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-06-07T17:59:00+00:00","og_image":[{"url":"https:\/\/images.idgesg.net\/images\/idge\/imported\/imageapi\/2023\/05\/08\/01\/shutterstock_728178127-100940689-large.jpg?auto=webp&amp;quality=85,70","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/cisco-spotlights-generative-ai-in-security-collaboration\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/cisco-spotlights-generative-ai-in-security-collaboration\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Cisco spotlights generative AI in security, collaboration","datePublished":"2023-06-07T17:59:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/cisco-spotlights-generative-ai-in-security-collaboration\/"},"wordCount":992,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/cisco-spotlights-generative-ai-in-security-collaboration\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/06\/cisco-spotlights-generative-ai-in-security-collaboration.jpg","keywords":["Cisco systems","Cloud Security","Network Security","Security"],"articleSection":["Networkworld"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/cisco-spotlights-generative-ai-in-security-collaboration\/","url":"https:\/\/www.threatshub.org\/blog\/cisco-spotlights-generative-ai-in-security-collaboration\/","name":"Cisco spotlights generative AI in security, collaboration 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/cisco-spotlights-generative-ai-in-security-collaboration\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/cisco-spotlights-generative-ai-in-security-collaboration\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/06\/cisco-spotlights-generative-ai-in-security-collaboration.jpg","datePublished":"2023-06-07T17:59:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/cisco-spotlights-generative-ai-in-security-collaboration\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/cisco-spotlights-generative-ai-in-security-collaboration\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/cisco-spotlights-generative-ai-in-security-collaboration\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/06\/cisco-spotlights-generative-ai-in-security-collaboration.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/06\/cisco-spotlights-generative-ai-in-security-collaboration.jpg","width":150,"height":100},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/cisco-spotlights-generative-ai-in-security-collaboration\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Cisco systems","item":"https:\/\/www.threatshub.org\/blog\/tag\/cisco-systems\/"},{"@type":"ListItem","position":3,"name":"Cisco spotlights generative AI in security, collaboration"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/52247","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=52247"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/52247\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/52248"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=52247"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=52247"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=52247"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}