{"id":54651,"date":"2023-11-22T20:00:00","date_gmt":"2023-11-22T20:00:00","guid":{"rendered":"https:\/\/www.darkreading.com\/emerging-tech\/generative-ai-takes-on-siem"},"modified":"2023-11-22T20:00:00","modified_gmt":"2023-11-22T20:00:00","slug":"generative-ai-takes-on-siem","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/generative-ai-takes-on-siem\/","title":{"rendered":"Generative AI Takes on SIEM"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltc53d6965d9f963bf\/64789b9b6159dba6643b4668\/robot_at_laptop-Dariusz_Banaszuk-alamy.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>With more vendors adding support for generative AI to their platforms and products, life for security analysts seems to be getting deceptively easier. While adding generative AI capabilities to security information and event management (SIEM) is still in early stages, several providers are taking steps to allow security analysts interact with their platforms using natural language processing.<\/p>\n<h2>Generative AI For IBM QRadar SIEM<\/h2>\n<p>Take IBM, for one: Big Blue recently announced plans to upgrade its QRadar SIEM platform to a modern cloud-native architecture and to bring its watsonx technology to the new platform. The new QRadar SIEM is set for release in the coming weeks as a SaaS offering, with the watsonx models and an on-premises version based on Red Hat OpenShift poised to roll out in 2024. The plan is to add generative AI to the revamped platform next year.<\/p>\n<p>The modernized QRadar SIEM offering will become part of the QRadar Suite, originally launched in April 2023, which brings IBM&#8217;s EDR, XDR, SOAR and SIEM offerings and a new log management tool onto a common platform designed to give SOC analysts a unified interface and controls.<\/p>\n<p>Analysts say QRadar SIEM was overdue for a significant upgrade as rivals such as Splunk, Palo Alto Networks, Microsoft, CrowdStrike and Elastic have emerged with cloud-native alternatives. In recent months, leading security providers have released technical previews of managed detection and response (MDR) platforms with SIEM that can tap generative AI.<\/p>\n<p>&#8220;They had essentially taken their legacy platform as far as they could have in terms of capabilities and performance, and the need to modernize the platform and migrate to cloud-native, which is becoming table stakes in the next-generation SIEM segment, was an imperative,&#8221; says Omdia Cybersecurity managing partner Eric Parizo. &#8220;Fortunately, it coincided with IBM&#8217;s company-wide shift to the Red Hat OpenShift platform.&#8221;<\/p>\n<p>Parizo says moving QRadar to OpenShift and emphasizing standards-based integration could make its security offerings more appealing beyond the core IBM base. &#8220;However, it must overcome having a relatively unproven endpoint security solution, a years-long effort to convert its on-prem SIEM\/SOAR customers to the new cloud-native SIEM, and growing competition, particularly from Microsoft, which topped $20 billion in annual security revenue earlier this year and has stated its commitment to own the SecOps market.&#8221;<\/p>\n<p>IBM&#8217;s forthcoming generative AI capabilities aim to make security operations teams more efficient by automating repetitive and tedious tasks, allowing them to focus on more critical issues. Among them include generating reports on common incidents, threat hunting by generating searches based on natural language explanations of attack patterns, interpreting machine-generated data with non-technical explanations of events and curating threat intelligence and determining what is most relevant.<\/p>\n<h2>Charlotte AI Coming to Falcon Raptor<\/h2>\n<p>Crowdstrike is another company shaking up SIEM with generative AI: Charlotte AI will be part of a new release of Raptor, a rearchitected release of Crowdstrike&#8217;s Falcon XDR platform. Raptor adds generative AI-powered incident investigation capabilities and extended detection and response (XDR) features.<\/p>\n<p>At its recent&nbsp;Fal.Con 2023 conference&nbsp;in Las Vegas, CrowdStrike demonstrated the new Falcon Raptor XDR platform with Charlotte AI, which correlates threat telemetry and functions and with a bot-like interface functions as an automated security analyst. It lets users, ranging from executives with little technical experience to advanced security professionals, ask questions and receive natural language responses.<\/p>\n<p>&#8220;With our Raptor release, we now have the ability to ingest third-party data natively,&#8221; founder and CEO George Kurtz said during the keynote session at the Fal.Con event. Kurtz said CrowdStrike&#8217;s threat graph identifies combinations of events that would lead to a threat indicator.<\/p>\n<p>As Falcon Raptor shifts the XDR functions to the cloud, Kurtz promised it will not lose context of activity on the endpoint, thanks to CrowdStrike&#8217;s new threat and asset graphs, which provide detailed views of an organization&#8217;s assets and state. The intelligence graph is designed to understand threats and adversaries, Kurtz said.<\/p>\n<p>While customers at the CrowdStrike conference say they were intrigued by the Charlotte AI demo, many say they aren&#8217;t going to rush into it. &#8220;I&#8217;m going to wait and see on it,&#8221; says Jason Strohbehn, the State of Wyoming&#8217;s deputy CISO. &#8220;But if it comes out and works as well as promised, it could let me and my team do things much more quickly.&#8221;<\/p>\n<p>Prabhath Karanth, VP and global head of security and trust at travel expense management SaaS provider Navan (formerly Trip Actions), also plans to evaluate Charlotte for his SOC and IR analysts. &#8220;We will definitely test it,&#8221; Karanth says. &#8220;If we can reduce cycle times for triaging alerts, that&#8217;s a huge play from an efficiency perspective.&#8221;<\/p>\n<h2>Microsoft Security Copilot Released to Early Access Customers<\/h2>\n<p>Notably, Microsoft last month released a preview of Security Copilot for early-access customers. Microsoft claims a more restricted preview launched in March 2023 has reduced the time spent on everyday security operations tasks by as much as 40% when security analysts enter complex queries with natural language text.<\/p>\n<p>&#8220;Security Copilot can effectively up-skill a security team, regardless of its expertise, save them time, enable them to find what previously they might have missed, and free them to focus on the most impactful projects,&#8221; Microsoft corporate VP for security, compliance, security and management&nbsp;<a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/10\/19\/microsoft-security-copilot-early-access-program-harnessing-generative-ai-to-empower-security-teams\/\">noted<\/a>&nbsp;in last month&#8217;s announcement.<\/p>\n<p>Microsoft&#8217;s updated preview release is now embedded with&nbsp;<a href=\"https:\/\/www.microsoft.com\/security\/business\/siem-and-xdr\/microsoft-365-defender\">Microsoft 365 Defender<\/a>&nbsp;extended detection and response (XDR). Also included with Security Copilot is Microsoft Defender Threat Intelligence, which provides direct access to Microsoft&#8217;s cleansed threat intelligence telemetry.<\/p>\n<p>&#8220;There&#8217;s a lot of interest in Security Copilot, but it assumes you are a Microsoft customer,&#8221; Olstik says. &#8220;If you have an E5 license and you&#8217;re using Microsoft tooling, infrastructure, and security. It&#8217;s a great fit. It will really help. If you have a heterogeneous environment, it won&#8217;t be nearly as effective. At least not now. They say they&#8217;ll support those things over time. Maybe they will. But for now, it&#8217;s really Microsoft-centric.&#8221;<\/p>\n<h2>Time for AI to Shine<\/h2>\n<p>IBM Security VP of product management Chris Meenan says IBM has been leading the way with AI for years, noting that QRadar SIEM used traditional machine learning to provide alert prioritization and adaptive detection. &#8220;We&#8217;ve been embedding AI in our products, including the existing QRadar, and we leverage it a lot in our own MSS SOCs around the globe,&#8221; Meenan says.&nbsp;<\/p>\n<p>Enterprise Strategy Group principal analyst and fellow Jon Olstik recalls IBM&#8217;s first attempt to bring generative AI capabilities to Watson in 2017 with&nbsp;<a href=\"https:\/\/www.darkreading.com\/threat-intelligence\/ibm-brings-watson-cognitive-computing-to-the-soc\">the release of Watson Cognitive<\/a>. Despite heavily promoting it, Olstik says few customers implemented it for various reasons. &#8220;I think they charged too much for it, and I don&#8217;t think people got what it did,&#8221; he says. &#8220;To some extent, they were ahead of their time.&#8221;<\/p>\n<p>Read More <a href=\"https:\/\/www.darkreading.com\/emerging-tech\/generative-ai-takes-on-siem\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>IBM joins Crowdstrike and Microsoft is releasing AI models to cloud-native SIEM platforms.Read More <a href=\"https:\/\/www.darkreading.com\/emerging-tech\/generative-ai-takes-on-siem\">HERE<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[151],"tags":[],"class_list":["post-54651","post","type-post","status-publish","format-standard","hentry","category-darkreading-ti"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Generative AI Takes on SIEM 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/generative-ai-takes-on-siem\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Generative AI Takes on SIEM 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/generative-ai-takes-on-siem\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-11-22T20:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltc53d6965d9f963bf\/64789b9b6159dba6643b4668\/robot_at_laptop-Dariusz_Banaszuk-alamy.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/generative-ai-takes-on-siem\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/generative-ai-takes-on-siem\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Generative AI Takes on SIEM\",\"datePublished\":\"2023-11-22T20:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/generative-ai-takes-on-siem\/\"},\"wordCount\":1146,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/generative-ai-takes-on-siem\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltc53d6965d9f963bf\/64789b9b6159dba6643b4668\/robot_at_laptop-Dariusz_Banaszuk-alamy.jpg\",\"articleSection\":[\"DarkReading |TI\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/generative-ai-takes-on-siem\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/generative-ai-takes-on-siem\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/generative-ai-takes-on-siem\/\",\"name\":\"Generative AI Takes on SIEM 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/generative-ai-takes-on-siem\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/generative-ai-takes-on-siem\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltc53d6965d9f963bf\/64789b9b6159dba6643b4668\/robot_at_laptop-Dariusz_Banaszuk-alamy.jpg\",\"datePublished\":\"2023-11-22T20:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/generative-ai-takes-on-siem\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/generative-ai-takes-on-siem\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/generative-ai-takes-on-siem\/#primaryimage\",\"url\":\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltc53d6965d9f963bf\/64789b9b6159dba6643b4668\/robot_at_laptop-Dariusz_Banaszuk-alamy.jpg\",\"contentUrl\":\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltc53d6965d9f963bf\/64789b9b6159dba6643b4668\/robot_at_laptop-Dariusz_Banaszuk-alamy.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/generative-ai-takes-on-siem\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Generative AI Takes on SIEM\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Generative AI Takes on SIEM 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/generative-ai-takes-on-siem\/","og_locale":"en_US","og_type":"article","og_title":"Generative AI Takes on SIEM 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/generative-ai-takes-on-siem\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-11-22T20:00:00+00:00","og_image":[{"url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltc53d6965d9f963bf\/64789b9b6159dba6643b4668\/robot_at_laptop-Dariusz_Banaszuk-alamy.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/generative-ai-takes-on-siem\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/generative-ai-takes-on-siem\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Generative AI Takes on SIEM","datePublished":"2023-11-22T20:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/generative-ai-takes-on-siem\/"},"wordCount":1146,"commentCount":0,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/generative-ai-takes-on-siem\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltc53d6965d9f963bf\/64789b9b6159dba6643b4668\/robot_at_laptop-Dariusz_Banaszuk-alamy.jpg","articleSection":["DarkReading |TI"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.threatshub.org\/blog\/generative-ai-takes-on-siem\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/generative-ai-takes-on-siem\/","url":"https:\/\/www.threatshub.org\/blog\/generative-ai-takes-on-siem\/","name":"Generative AI Takes on SIEM 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/generative-ai-takes-on-siem\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/generative-ai-takes-on-siem\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltc53d6965d9f963bf\/64789b9b6159dba6643b4668\/robot_at_laptop-Dariusz_Banaszuk-alamy.jpg","datePublished":"2023-11-22T20:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/generative-ai-takes-on-siem\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/generative-ai-takes-on-siem\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/generative-ai-takes-on-siem\/#primaryimage","url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltc53d6965d9f963bf\/64789b9b6159dba6643b4668\/robot_at_laptop-Dariusz_Banaszuk-alamy.jpg","contentUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/bltc53d6965d9f963bf\/64789b9b6159dba6643b4668\/robot_at_laptop-Dariusz_Banaszuk-alamy.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/generative-ai-takes-on-siem\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Generative AI Takes on SIEM"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/54651","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=54651"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/54651\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=54651"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=54651"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=54651"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}