{"id":52501,"date":"2023-06-26T10:00:00","date_gmt":"2023-06-26T10:00:00","guid":{"rendered":"https:\/\/www.networkworld.com\/article\/3700788\/how-it-pros-can-benefit-from-generative-ai-safely.html#tk.rss_security"},"modified":"2023-06-26T10:00:00","modified_gmt":"2023-06-26T10:00:00","slug":"how-it-pros-can-benefit-from-generative-ai-safely","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/how-it-pros-can-benefit-from-generative-ai-safely\/","title":{"rendered":"How IT pros can benefit from generative AI safely"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2023\/01\/shutterstock_1901618698-100936241-large.jpg?auto=webp&amp;quality=85,70\" class=\"ff-og-image-inserted\"><\/div>\n<p>The enterprise IT landscape is littered with supposedly paradigm-shifting technologies that failed to live up to the hype, and intil now, one could argue that AI fell into that category. But generative AI, which has taken the world by storm in the form of OpenAI\u2019s ChatGPT chatbot, just might be the real deal.<\/p>\n<p>Chris Bedi, chief digital information officer at ServiceNow, says the release of ChatGPT last November was \u201can iPhone moment,\u201d an event that captured the public\u2019s attention in a way that \u201cchanged everything forever.\u201d He predicts that generative AI will become embedded into the fabric of every enterprise, and he recommends that CIOs and other IT leaders should begin now to develop their generative AI strategies.<\/p>\n<p>Gartner is no less effusive, predicting that generative AI will become \u201ca general-purpose technology with an impact similar to that of the steam engine, electricity and the internet.\u201d Although generative AI is still in its infancy and there are many pitfalls that need to be navigated, Gartner says, \u201cGenerative AI provides new and disruptive opportunities to increase revenue, reduce costs, improve productivity and better manage risk. In the near future, it will become a competitive advantage and differentiator.\u201d&nbsp;<\/p>\n<p>AI has been around for a long time, but generative AI takes machine learning to the next level with a neural network architecture called transformer (the T in GPT), first described by Google researchers in 2017. So, this is new. Generative AI systems are built on pre-trained (the P in GPT) data sets (45 terabytes for ChatGPT) and are able to respond to queries in conversational language. Generative AI can produce text, images, and video, including software code and networking scripts.<\/p>\n<p>We went right to source and asked ChatGPT itself how it can make life easier for enterprise IT. After a pause of no more than a couple of seconds, we got back a numbered list: 1) troubleshooting and issue resolution, 2) documentation and knowledge management, 3) automation and scripting, 4) training and onboarding, 5) security and compliance, 6) project management and planning, 7) stay updated on technology trends. &nbsp;<\/p>\n<p>Without any prompting, the chatbot added, \u201cIt\u2019s important to note that while ChatGPT can provide valuable guidance and support it should not be solely relied upon for critical decision-making. Human expertise and judgment should always be considered alongside AI-generated suggestions.\u201d<\/p>\n<aside class=\"nativo-promo nativo-promo-1 smartphone\" id> <\/aside>\n<p>After getting the chatbot\u2019s perspective, we moved on to intelligent humans for their take on several key questions about generative AI: What exactly is it? What can it do for enterprise IT? What can\u2019t it do? How do I get it? What are some of the potential pitfalls that I need to be aware of?<\/p>\n<h2>What is generative AI and how is it different from \u2018traditional\u2019 AI?<\/h2>\n<p>For the most part, traditional AI\/ML technology sits in the background, looking to identify patterns in large data sets. It makes predictions and provides recommendations based on those predictions.<\/p>\n<aside class=\"nativo-promo nativo-promo-1 tablet desktop\" id> <\/aside>\n<p>Generative AI is fundamentally different. It is a large language model (LLM) trained with vast amounts of data, including samples of human conversation. It is able to digest and summarize data and can interact with a human using natural language. ChatGPT is a super Siri that surprised even its creators when it racked up a million users in its first week after launch and 100 million after two months. It currently generates 1.8 billion visitors per month.<\/p>\n<p>In general, when systems scale rapidly, they become more complex, harder to manage, less reliable and less efficient. With large language models, the more data, the more queries, the more interactions, the smarter the system becomes, and the more it begins to resemble human intelligence.<\/p>\n<p>But, at least at this stage, these models are not the same as human intelligence. Forrester analyst Rowan Curran says, \u201cWhat they are <em>not<\/em> doing is creating net new information that has a contextual understanding of itself. These models predict the next word in a sequence based on the previous words in that sequence. It\u2019s important not to treat them as a source of authority, an oracle or anything that has a mind behind it.\u201d<\/p>\n<h2>What can generative AI do for enterprise IT?<\/h2>\n<p>At the networking layer, large language models can perform functions like generating network configurations, writing scripts for IT automation tools and creating networking maps, says Shamus McGillicuddy, vice-president of research at Enterprise Management Associates.<\/p>\n<aside class=\"nativo-promo nativo-promo-2 tablet desktop smartphone\" id> <\/aside>\n<p>\u201cIt\u2019s very good for inspiration, imagination, anti-procrastination. One can use it to get started with a task or project. Ask it to give you something, like a piece of content or code. Then one can use his or her knowledge and skills to turn it into something good, whether it\u2019s a policy paper or a network configuration file,\u201d McGillicuddy says.<\/p>\n<p>In software development, generative AI can spit out code snippets and has the ability to de-bug code. Large language models use the term \u201ctoken\u201d the way IT pros talk about bytes. With ChatGPT, one token represents four characters, or roughly three-fourths of a word. This is important because each ChatGPT query\/response has a limit of around 4,000 tokens, and the query wording itself counts toward that limit. So, generative AI systems can write pieces of code in a variety of programming languages, but don\u2019t ask them to come up with new versions of an operating system, because when it hits that limit, it stops and resets.<\/p>\n<p>At the strategic level, as IT leaders become more familiar and comfortable with generative AI, they will be able to roll it out across the enterprise to make employees more productive, streamline business processes, improve customer service, and drive digital transformation.<\/p>\n<p>Bedi says generative AI\u2019s ability to take large pieces of disparate, complex information and summarize them for human consumption has applications for ITOps, analysis of security and event logs, customer support, call center, help desk, finance, HR, sales, and marketing. \u201cEverybody is awash in tons of content; generative AI has the ability to distill it into something useful and consumable. It can speed up every operation in the company,\u201d he adds.<\/p>\n<aside class=\"nativo-promo nativo-promo-3 tablet desktop smartphone\" id> <\/aside>\n<h2>Generative AI pitfalls.<\/h2>\n<p>If this all this sounds too good to be true, and that\u2019s because it probably is\u2014at least for now. A <a href=\"https:\/\/www.mckinsey.com\/featured-insights\/mckinsey-explainers\/what-is-generative-ai\" rel=\"nofollow\">McKinsey report<\/a> cautions, \u201cThe outputs generative AI models produce may often sound extremely convincing. But sometimes the information they generate is just plain wrong. Worse, sometimes it\u2019s biased (because it\u2019s built on the gender, racial, and myriad other biases of the internet and society more generally) and can be manipulated to enable unethical or criminal activity.\u201d<\/p>\n<p>Forrester\u2019s Curran uses the term \u201ccoherent nonsense\u201d to describe this phenomenon. But the term gaining the most traction in the generative AI ecosystem is \u201challucination.\u201d<\/p>\n<p>Futurist Bernard Marr says, \u201cHallucination in AI refers to the generation of outputs that may sound plausible but are either factually incorrect or unrelated to the given context. These outputs often emerge from the AI model\u2019s inherent biases, lack of real-world understanding, or training data limitations. In other words, the AI system \u2018hallucinates\u2019 information that it has not been explicitly trained on, leading to unreliable or misleading responses.\u201d<\/p>\n<p>This means that enterprise IT should not put generative AI software code or networking scripts into production without a person double-checking it first\u2014an approach dubbed \u201chuman in the loop.\u201d And organizations should have systems in place to catch instances in which the chatbot might interact with customers in a way that might be considered argumentative, offensive, or inappropriate.<\/p>\n<p>The explosion of interest in ChatGPT has also triggered worries about data privacy and shadow generative AI, since it must be assumed that employees at all levels are asking ChatGPT questions.<\/p>\n<p>\u201cI am very concerned about what data people put into ChatGPT when they are putting queries into it,\u201d says McGillicuddy. \u201cI\u2019m concerned about how that data is used and stored and what rights Open AI asserts to it.\u201d<\/p>\n<p>Keatron Evans, principal cybersecurity advisor at the InfoSec Institute, cautions, \u201cDon\u2019t use any protected data or personal information when utilizing or experimenting with AI. For instance, say you have a confidential sales report and want to generate a summary using AI. You upload the report, but now the data that you entered is stored on ChatGPT\u2019s servers, and it will use that data to answer queries from other people, possibly exposing your company\u2019s confidential information.\u201d<\/p>\n<p>He adds that hackers could exploit ChatGPT code vulnerabilities to steal user information or find a way to steal that data directly from the app itself. \u201cRegardless, uploading sensitive data or information could violate privacy laws, which would result in your company possibly facing large fines,\u201d Evans points out.&nbsp;<\/p>\n<p>Another, more fuzzy issue concerns ownership of intellectual property. Let\u2019s say an employee uploads proprietary software code to ChatGPT, asking it to de-bug the code or add a piece of functionality. That code goes into the ChatGPT database. What happens when someone else at a different company queries ChatGPT and the output includes chunks of that original code?<\/p>\n<p>&nbsp;<a href=\"https:\/\/www.csoonline.com\/article\/3695170\/samsung-bans-staff-ai-use-over-data-leak-concerns.html\">Samsung<\/a> recently banned the use of ChatGTP by employees after an engineer \u201caccidentally leaked internal source code by uploading it to ChatGPT,\u201d according to an internal memo.&nbsp;<\/p>\n<h2>How should organizations acquire generative AI.<\/h2>\n<p>The vendor community is racing to provide generative AI for enterprises. The usual suspects are leading the way (Google, AWS, Microsoft, IBM) since they have the resources to develop these large language models. But just about every vendor is figuring out a way to embed generative AI into its platforms.<\/p>\n<p>IDC analyst Nancy Gohring says, \u201cVendors in ITSM and ITOps are already applying generative AI to a variety of use cases, predominantly with the aim of improving tool usability, speeding response times, and expanding use cases. While ensuring human oversight is critical, particularly given the immaturity of the technology, enterprises should seriously consider embracing new offerings as a way to improve efficiencies.\u201d<\/p>\n<p>For IT leaders, a sensible approach would be to work with existing platform partners to determine how the vendor roadmap aligns with their enterprises\u2019 style of technology acquisition. Does the enterprise have the willingness and the readiness (either from a skills, funding, or data-processing infrastructure perspective) to spin up its own generative AI capabilities? This approach might deliver competitive advantage, but it also takes time and effort.<\/p>\n<p>Or would it make more sense to leverage existing technology providers who are embedding generative AI into their platforms? For example, Salesforce has released Einstein GPT which brings generative AI capabilities to the Salesforce CRM platform as well as to the Slack app.<\/p>\n<p>Of course, similar to the way organizations have adopted <a href=\"https:\/\/www.networkworld.com\/article\/3233132\/what-is-hybrid-cloud-computing.html\">hybrid-cloud<\/a> architectures, it\u2019s likely that enterprises will adopt a mixed model that encompasses both cloud and on-prem deployments. One option would be to build new generative AI apps in the AWS cloud, using the AWS infrastructure, large language models, and toolsets. Another would be to build custom generative AI functionality on top of vendor CRM or ERP platforms.<\/p>\n<h2>What some of the leading vendors are offering.<\/h2>\n<p>Here are some examples of how key vendors are ramping up their generative AI capabilities:<\/p>\n<h3 class=\"body\">Microsoft<\/h3>\n<p>Microsoft, the major investor in OpenAI and its technology partner, is embedding ChatGPT technology throughout its portfolio. Microsoft has introduced Microsoft 365 Copilot, which integrates generative AI into Office productivity apps like Word, Excel, Outlook, and Teams. A feature called Business Chat combines a user\u2019s calendar, emails, chats, documents, contacts, etc., into one knowledge base that can be queried in natural language. Microsoft has announced Dynamics 365 Copilot, which brings generative AI to CRM and ERP. And Microsoft has embedded ChatGPT functionality into its Bing search engine.<\/p>\n<p>In a related development, OpenAI has partnered with GitHub to offer a commercial product called GitHub Copilot, a code-writing chatbot that can speak more than a dozen programming languages.<\/p>\n<h3 class=\"body\">Google<\/h3>\n<p>Google has announced Duet AI for Google Workspace, which embeds its Generative AI (Google\u2019s large language model is called PaLM) into the Google productivity suite (Gmail, Google Docs, Sheets, Slides, and Meet). Google is putting Generative AI functionality into its Chrome browser. It has a platform called Vertex AI that enables enterprises and SaaS vendors to build their own applications; a service to help enterprises build AI-powered chat and search applications based on Google\u2019s foundation models; and an answer to GitHub\u2019s Copilot called Duet, designed to help developers write code.<\/p>\n<h3 class=\"body\">Cisco<\/h3>\n<p>Cisco has built its own generative AI and recently announced plans to buy AI startup&nbsp;<a href=\"https:\/\/www.networkworld.com\/article\/3698288\/cisco-aims-for-ai-first-security-with-armorblox-buy.html\">Armorblox.<\/a>&nbsp;Cisco says it will embed Generative AI capabilities across its entire portfolio, starting with its Security Cloud service and Webex collaboration tool.<\/p>\n<p> READ MORE <a href=\"https:\/\/www.networkworld.com\/article\/3700788\/how-it-pros-can-benefit-from-generative-ai-safely.html#tk.rss_security\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\nThe enterprise IT landscape is littered with supposedly paradigm-shifting technologies that failed to live up to the hype, and intil now, one could argue that AI fell into that category. But generative AI, which has taken the world by storm in the form of OpenAI\u2019s ChatGPT chatbot, just might be the real deal.Chris Bedi, chief digital information officer at ServiceNow, says the release of ChatGPT last November was \u201can iPhone moment,\u201d an event that captured the public\u2019s attention in a way that \u201cchanged everything forever.\u201d He predicts that generative AI will become embedded into the fabric of every enterprise, and he recommends that CIOs and other IT leaders should begin now to develop their generative AI strategies.To read this article in full, please click here READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":52502,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[738],"tags":[9458,2767,1061],"class_list":["post-52501","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-networkworld","tag-network-management-software","tag-network-monitoring","tag-network-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How IT pros can benefit from generative AI safely 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/how-it-pros-can-benefit-from-generative-ai-safely\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How IT pros can benefit from generative AI safely 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/how-it-pros-can-benefit-from-generative-ai-safely\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-06-26T10:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/images.idgesg.net\/images\/article\/2023\/01\/shutterstock_1901618698-100936241-large.jpg?auto=webp&amp;quality=85,70\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-it-pros-can-benefit-from-generative-ai-safely\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-it-pros-can-benefit-from-generative-ai-safely\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"How IT pros can benefit from generative AI safely\",\"datePublished\":\"2023-06-26T10:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-it-pros-can-benefit-from-generative-ai-safely\\\/\"},\"wordCount\":2105,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-it-pros-can-benefit-from-generative-ai-safely\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/how-it-pros-can-benefit-from-generative-ai-safely.jpg\",\"keywords\":[\"Network Management Software\",\"Network Monitoring\",\"Network Security\"],\"articleSection\":[\"Networkworld\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-it-pros-can-benefit-from-generative-ai-safely\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-it-pros-can-benefit-from-generative-ai-safely\\\/\",\"name\":\"How IT pros can benefit from generative AI safely 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-it-pros-can-benefit-from-generative-ai-safely\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-it-pros-can-benefit-from-generative-ai-safely\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/how-it-pros-can-benefit-from-generative-ai-safely.jpg\",\"datePublished\":\"2023-06-26T10:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-it-pros-can-benefit-from-generative-ai-safely\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-it-pros-can-benefit-from-generative-ai-safely\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-it-pros-can-benefit-from-generative-ai-safely\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/how-it-pros-can-benefit-from-generative-ai-safely.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/how-it-pros-can-benefit-from-generative-ai-safely.jpg\",\"width\":150,\"height\":100},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-it-pros-can-benefit-from-generative-ai-safely\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Network Management Software\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/network-management-software\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"How IT pros can benefit from generative AI safely\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How IT pros can benefit from generative AI safely 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/how-it-pros-can-benefit-from-generative-ai-safely\/","og_locale":"en_US","og_type":"article","og_title":"How IT pros can benefit from generative AI safely 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/how-it-pros-can-benefit-from-generative-ai-safely\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-06-26T10:00:00+00:00","og_image":[{"url":"https:\/\/images.idgesg.net\/images\/article\/2023\/01\/shutterstock_1901618698-100936241-large.jpg?auto=webp&amp;quality=85,70","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/how-it-pros-can-benefit-from-generative-ai-safely\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/how-it-pros-can-benefit-from-generative-ai-safely\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"How IT pros can benefit from generative AI safely","datePublished":"2023-06-26T10:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/how-it-pros-can-benefit-from-generative-ai-safely\/"},"wordCount":2105,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/how-it-pros-can-benefit-from-generative-ai-safely\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/06\/how-it-pros-can-benefit-from-generative-ai-safely.jpg","keywords":["Network Management Software","Network Monitoring","Network Security"],"articleSection":["Networkworld"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/how-it-pros-can-benefit-from-generative-ai-safely\/","url":"https:\/\/www.threatshub.org\/blog\/how-it-pros-can-benefit-from-generative-ai-safely\/","name":"How IT pros can benefit from generative AI safely 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/how-it-pros-can-benefit-from-generative-ai-safely\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/how-it-pros-can-benefit-from-generative-ai-safely\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/06\/how-it-pros-can-benefit-from-generative-ai-safely.jpg","datePublished":"2023-06-26T10:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/how-it-pros-can-benefit-from-generative-ai-safely\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/how-it-pros-can-benefit-from-generative-ai-safely\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/how-it-pros-can-benefit-from-generative-ai-safely\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/06\/how-it-pros-can-benefit-from-generative-ai-safely.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/06\/how-it-pros-can-benefit-from-generative-ai-safely.jpg","width":150,"height":100},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/how-it-pros-can-benefit-from-generative-ai-safely\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Network Management Software","item":"https:\/\/www.threatshub.org\/blog\/tag\/network-management-software\/"},{"@type":"ListItem","position":3,"name":"How IT pros can benefit from generative AI safely"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/52501","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=52501"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/52501\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/52502"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=52501"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=52501"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=52501"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}