{"id":54390,"date":"2023-10-31T12:55:36","date_gmt":"2023-10-31T12:55:36","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/35182\/Cyber-Pros-Praise-Biden-Executive-Order-On-Artificial-Intelligence.html"},"modified":"2023-10-31T12:55:36","modified_gmt":"2023-10-31T12:55:36","slug":"cyber-pros-praise-biden-executive-order-on-artificial-intelligence","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/cyber-pros-praise-biden-executive-order-on-artificial-intelligence\/","title":{"rendered":"Cyber Pros Praise Biden Executive Order On Artificial Intelligence"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/files.scmagazine.com\/wp-content\/uploads\/2023\/10\/1030_biden_ai.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>President Joe Biden on Monday released an ambitious <a href=\"https:\/\/www.whitehouse.gov\/briefing-room\/statements-releases\/2023\/10\/30\/fact-sheet-president-biden-issues-executive-order-on-safe-secure-and-trustworthy-artificial-intelligence\/\">executive order (EO) around artificial intelligence<\/a> that aims to have AI companies share their red team test results, establish a program to find tools and fix vulnerabilities in AI code, protect consumers against fraud, and build up the AI workforce.<\/p>\n<p>The new EO, primarily a response to ongoing public concerns around the fast pace of development and potential risks around AI, &nbsp;gives practically every agency of the federal government a role in the nation\u2019s attempt to securely harness the promise of AI.<\/p>\n<p>\u201cAs part of the Biden-Harris administration\u2019s comprehensive strategy for responsible innovation, the EO builds on previous actions the President has taken, including work that led to <a href=\"https:\/\/www.scmagazine.com\/news\/leading-ai-firms-volunteer-security-commitments-to-biden-administration\">voluntary commitments<\/a> from 15 leading companies (including OpenAI, AWS, and Meta) to drive safe, secure, and trustworthy development of AI,\u201d said a statement in the EO.<\/p>\n<p>EOs are issued from the executive branch of the government, normally directly from the president. While an EO is not a law in the sense that it does not go through the legislative process in Congress, executive branch employees are subject to its requirements and like the <a href=\"https:\/\/www.scmagazine.com\/news\/in-eo-federal-security-provides-impetus-for-far-reaching-cyber-implications\">May 2021 EO on Cybersecurity, <\/a>these EOs set a framework for public and private cooperation.<\/p>\n<p>\u201cThe EO is levelheaded \u2014 it avoids the use of phrases like <a href=\"https:\/\/www.scmagazine.com\/resource\/ai-as-existential-threat-the-story-so-far\">\u2018existential risk\u2019 <\/a>and focuses on concrete problems \u2014 security and safety, privacy, and discrimination,\u201d said James Lewis, a senior researcher at the Center for Strategic and International Studies. \u201cIt\u2019s approach to managing risk is increased transparency and the use of testing, tools, and standards. The EO also has a great emphasis on developing standards for critical infrastructure and a second using AI tools to fix software reinforces goals set in the <a href=\"https:\/\/www.scmagazine.com\/analysis\/bidens-national-cyber-strategy-wants-to-redirect-responsibility-from-users-to-manufacturers\">National Cybersecurity Strategy.&#8221;<\/a><\/p>\n<p>Here are some highlights of today\u2019s EO around security:<\/p>\n<div>\n<ul>\n<li><strong>Red team testing:<\/strong> The National Institute of Standards and Technology (NIST) was requried to set rigorous standards for extensive red-team testing to ensure safety before public release. The Department of Homeland Security (DHS will apply those standards to critical infrastructure sectors and establish the AI Safety and Security Board. Finally, the Departments of Energy and Homeland Security will also address AI systems\u2019 threats to critical infrastructure, as well as chemical, biological, radiological, nuclear, and cybersecurity risks.<\/li>\n<\/ul>\n<\/div>\n<div>\n<ul>\n<li><strong>Fix vulnerabilities:<\/strong> The EO calls for the establishment of an advanced cybersecurity program to develop AI tools that will find and fix vulnerabilities in critical software, building on the administration\u2019s ongoing <a href=\"https:\/\/www.scmagazine.com\/news\/darpa-sponsors-competition-for-ai-innovation-and-cybersecurity\">AI Cyber Challenge<\/a> sponsored by the Defense Advanced Projects Research Agency (DARPA).<\/li>\n<\/ul>\n<\/div>\n<div>\n<ul>\n<li><strong>Consumer protections:<\/strong> The Department of Commerce (DOC) was ordered to develop guidance for content authentication and watermarking to clearly label AI-generated content. Federal agencies will use these tools to make it easy for Americans to know that the communications they receive from their government are authentic, the goal of which is to set an example for the private sector and governments around the world.<\/li>\n<\/ul>\n<\/div>\n<div>\n<ul>\n<li><strong>Workforce development:<\/strong> The EO seeks to accelerate the rapid hiring of AI professionals&nbsp;as part of a governmentwide AI talent initiative led by the Office of Personnel Management, U.S. Digital Service, U.S. Digital Corps, and Presidential Innovation Fellowship. Agencies are being required to offer AI training for employees at all levels in relevant fields.<\/li>\n<\/ul>\n<\/div>\n<h2>The industry responds Biden order on AI<\/h2>\n<p>Overall, security pros are glad to see the Biden administration take on the AI issue in a responsible way that also involved significant input from the industry.<\/p>\n<p>\u201cPresident Biden&#8217;s EO underscores a robust commitment to safety, cybersecurity, and rigorous testing,\u201d said Casey Ellis, founder and CTO of Bugcrowd. \u201cThe directive mandates developers to share safety test results with the U.S. government, ensuring AI systems are extensively vetted before public release. It also highlights the importance of AI in bolstering cybersecurity, particularly in detecting AI-enabled fraud and enhancing software and network security. The order also champions the development of standards, tools, and tests for AI&#8217;s safety and security.\u201d<\/p>\n<p>Randy Lariar, AI security leader at Optiv, said ultimately, the question about the red teaming and safety of new models has been much-requested in the research community. Lariar said OpenAI has not been entirely open with what they\u2019ve been doing to train and secure their latest versions.<\/p>\n<p>\u201cI worry that many open-source models, which are derived from the big foundational models, can be just as risky without the burden of red teaming \u2014 but this is a start,\u201d said Lariar. &#8220;NIST has already put out an AI Risk Management Framework and is continuing to build upon that. I am not surprised that they\u2019re well-positioned to continue to be a leader in the space for defining safety. To me, their existing tooling does feel to be too high-level, so this directive to develop standards, tools, and tests is greatly needed. I think NIST will continue to play a key role in defining what AI Safety means and how to align to that.\u201d<\/p>\n<p>Ashley Leonard, chief executive officer of Syxsense, added that it will be very interesting to see how the vulnerability program gets implemented and if those tools will be open source and voluntary or proprietary and government-mandated. Leonard said that over the last 30 years, we\u2019ve seen how code degrades over time: it\u2019s why we have new vulnerabilities and bugs released every day.<\/p>\n<p>\u201cIt takes real resources \u2014 budget, time, and staff \u2014 for even the most advanced companies to keep up with vulnerabilities and bug fixes, so it makes sense to see if we could use AI tools to find and fix these vulnerabilities,\u201d said Leonard. \u201cThe other side of this directive, though, is whether AI can check AI. We are already seeing broad use of generative AI as part of the software development process. GenAI has enabled everyone to become a coder \u2014 but if you use AI to code, can you use it to test as well?\u201d<\/p>\n<p>Marcus Fowler, chief executive officer of Darktrace Federal added that he and his team firmly believe that the industry can\u2019t achieve AI safety without cybersecurity.<\/p>\n<p>\u201cSecurity needs to be by-design, embedded across every step of an AI system\u2019s creation and deployment,\u201d said Fowler.&nbsp;\u201cThat means taking action on data security, control and trust. It\u2019s promising to see some specific actions in the EO that start to address these challenges.\u201d<\/p>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/35182\/Cyber-Pros-Praise-Biden-Executive-Order-On-Artificial-Intelligence.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":54391,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[1111],"class_list":["post-54390","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlinegovernmentusabotnet"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyber Pros Praise Biden Executive Order On Artificial Intelligence 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/cyber-pros-praise-biden-executive-order-on-artificial-intelligence\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Pros Praise Biden Executive Order On Artificial Intelligence 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/cyber-pros-praise-biden-executive-order-on-artificial-intelligence\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-10-31T12:55:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/files.scmagazine.com\/wp-content\/uploads\/2023\/10\/1030_biden_ai.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyber-pros-praise-biden-executive-order-on-artificial-intelligence\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyber-pros-praise-biden-executive-order-on-artificial-intelligence\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Cyber Pros Praise Biden Executive Order On Artificial Intelligence\",\"datePublished\":\"2023-10-31T12:55:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyber-pros-praise-biden-executive-order-on-artificial-intelligence\\\/\"},\"wordCount\":1062,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyber-pros-praise-biden-executive-order-on-artificial-intelligence\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/11\\\/cyber-pros-praise-biden-executive-order-on-artificial-intelligence.jpg\",\"keywords\":[\"headline,government,usa,botnet\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyber-pros-praise-biden-executive-order-on-artificial-intelligence\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyber-pros-praise-biden-executive-order-on-artificial-intelligence\\\/\",\"name\":\"Cyber Pros Praise Biden Executive Order On Artificial Intelligence 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyber-pros-praise-biden-executive-order-on-artificial-intelligence\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyber-pros-praise-biden-executive-order-on-artificial-intelligence\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/11\\\/cyber-pros-praise-biden-executive-order-on-artificial-intelligence.jpg\",\"datePublished\":\"2023-10-31T12:55:36+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyber-pros-praise-biden-executive-order-on-artificial-intelligence\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyber-pros-praise-biden-executive-order-on-artificial-intelligence\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyber-pros-praise-biden-executive-order-on-artificial-intelligence\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/11\\\/cyber-pros-praise-biden-executive-order-on-artificial-intelligence.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/11\\\/cyber-pros-praise-biden-executive-order-on-artificial-intelligence.jpg\",\"width\":1164,\"height\":776},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/cyber-pros-praise-biden-executive-order-on-artificial-intelligence\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,government,usa,botnet\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinegovernmentusabotnet\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Pros Praise Biden Executive Order On Artificial Intelligence\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Pros Praise Biden Executive Order On Artificial Intelligence 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/cyber-pros-praise-biden-executive-order-on-artificial-intelligence\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Pros Praise Biden Executive Order On Artificial Intelligence 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/cyber-pros-praise-biden-executive-order-on-artificial-intelligence\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-10-31T12:55:36+00:00","og_image":[{"url":"https:\/\/files.scmagazine.com\/wp-content\/uploads\/2023\/10\/1030_biden_ai.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/cyber-pros-praise-biden-executive-order-on-artificial-intelligence\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/cyber-pros-praise-biden-executive-order-on-artificial-intelligence\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Cyber Pros Praise Biden Executive Order On Artificial Intelligence","datePublished":"2023-10-31T12:55:36+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/cyber-pros-praise-biden-executive-order-on-artificial-intelligence\/"},"wordCount":1062,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/cyber-pros-praise-biden-executive-order-on-artificial-intelligence\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/11\/cyber-pros-praise-biden-executive-order-on-artificial-intelligence.jpg","keywords":["headline,government,usa,botnet"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/cyber-pros-praise-biden-executive-order-on-artificial-intelligence\/","url":"https:\/\/www.threatshub.org\/blog\/cyber-pros-praise-biden-executive-order-on-artificial-intelligence\/","name":"Cyber Pros Praise Biden Executive Order On Artificial Intelligence 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/cyber-pros-praise-biden-executive-order-on-artificial-intelligence\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/cyber-pros-praise-biden-executive-order-on-artificial-intelligence\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/11\/cyber-pros-praise-biden-executive-order-on-artificial-intelligence.jpg","datePublished":"2023-10-31T12:55:36+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/cyber-pros-praise-biden-executive-order-on-artificial-intelligence\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/cyber-pros-praise-biden-executive-order-on-artificial-intelligence\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/cyber-pros-praise-biden-executive-order-on-artificial-intelligence\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/11\/cyber-pros-praise-biden-executive-order-on-artificial-intelligence.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/11\/cyber-pros-praise-biden-executive-order-on-artificial-intelligence.jpg","width":1164,"height":776},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/cyber-pros-praise-biden-executive-order-on-artificial-intelligence\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,government,usa,botnet","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinegovernmentusabotnet\/"},{"@type":"ListItem","position":3,"name":"Cyber Pros Praise Biden Executive Order On Artificial Intelligence"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/54390","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=54390"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/54390\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/54391"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=54390"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=54390"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=54390"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}