{"id":57647,"date":"2024-11-07T17:00:00","date_gmt":"2024-11-07T17:00:00","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/more-value-less-risk-how-to-implement-generative-ai-across-the-organization-securely-and-responsibly\/"},"modified":"2024-11-07T17:00:00","modified_gmt":"2024-11-07T17:00:00","slug":"more-value-less-risk-how-to-implement-generative-ai-across-the-organization-securely-and-responsibly","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/more-value-less-risk-how-to-implement-generative-ai-across-the-organization-securely-and-responsibly\/","title":{"rendered":"More value, less risk: How to implement generative AI across the organization securely and responsibly"},"content":{"rendered":"<p>The technology landscape is undergoing a massive transformation, and AI is at the center of this change\u2014posing both new opportunities as well as new threats.&nbsp; While AI can be used by adversaries to execute malicious activities, it also has the potential to be a game changer for organizations to help defeat cyberattacks at machine speed.&nbsp;Already today generative AI stands out as a transformative technology that can help boost innovation and efficiency. To maximize the advantages of generative AI, we need to strike a balance between addressing the potential risks and embracing innovation. In our recent strategy paper, \u201c<a href=\"https:\/\/clouddamcdnprodep.azureedge.net\/gdc\/gdctvIyrZ\/original\"><strong>Minimize Risk and Reap the Benefits of AI<\/strong><\/a>,\u201d we provide a comprehensive guide to navigating the challenges and opportunities of using generative AI.<\/p>\n<div class=\"wp-block-msxcm-cta-block\" data-moray data-bi-an=\"CTA Block\">\n<div class=\"card d-block mx-ng mx-md-0\">\n<div class=\"row no-gutters\">\n<div class=\"col-md-4\"> <img loading=\"lazy\" decoding=\"async\" width=\"535\" height=\"385\" src=\"https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/wp-content\/uploads\/2024\/11\/Screenshot-2024-10-30-093729.png\" class=\"card-img img-object-cover\" alt=\"background pattern\" srcset=\"https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/wp-content\/uploads\/2024\/11\/Screenshot-2024-10-30-093729.webp 535w, https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/wp-content\/uploads\/2024\/11\/Screenshot-2024-10-30-093729-300x216.webp 300w, https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/wp-content\/uploads\/2024\/11\/Screenshot-2024-10-30-093729-514x370.webp 514w\" sizes=\"auto, (max-width: 535px) 100vw, 535px\"> <\/div>\n<div class=\"d-flex col-md\">\n<div class=\"card-body align-self-center p-4 p-md-5\" readability=\"25.363636363636\">\n<h2>Minimize Risk and Reap the Benefits of AI<\/h2>\n<div class=\"mb-3\" readability=\"7\">\n<p>Addressing security concerns and implementing safeguards<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/div>\n<p>According to a recent survey conducted by ISMG, the top concerns for both business executives and security leaders on using generative AI in their organization range, from data security and governance, transparency and accountability to regulatory compliance.<sup>1<\/sup> In this paper, the first in a series on AI compliance, governance, and safety from the Microsoft Security team, we provide business and technical leaders with an overview of potential security risks when deploying generative AI, along with insights into recommended safeguards and approaches to adopt the technology responsibly and effectively.<\/p>\n<h2 class=\"wp-block-heading\" id=\"learn-how-to-deploy-generative-ai-securely-and-responsibly\">Learn how to deploy generative AI securely and responsibly<\/h2>\n<p>In the paper, we explore five critical areas to help ensure the responsible and effective deployment of generative AI: data security, managing hallucinations and overreliance, addressing biases, legal and regulatory compliance, and defending against threat actors. Each section provides essential insights and practical strategies for navigating these challenges.&nbsp;<\/p>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/wp-content\/uploads\/2024\/11\/Screenshot-2024-10-31-151302.webp\" alt class=\"wp-image-3967 webp-format\" srcset data-orig-src=\"https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/wp-content\/uploads\/2024\/11\/Screenshot-2024-10-31-151302.webp\"><\/figure>\n<h3 class=\"wp-block-heading\" id=\"data-security\">Data security<\/h3>\n<p>Data security is a top concern for business and cybersecurity leaders. Specific worries include data leakage, over-permissioned data, and improper internal sharing. Traditional methods like applying data permissions and lifecycle management can enhance security.&nbsp;<\/p>\n<h3 class=\"wp-block-heading\" id=\"managing-hallucinations-and-overreliance\">Managing hallucinations and overreliance<\/h3>\n<p><a href=\"https:\/\/news.microsoft.com\/source\/features\/company-news\/why-ai-sometimes-gets-it-wrong-and-big-strides-to-address-it\/\">Generative AI hallucinations<\/a> can lead to inaccurate data and flawed decisions. We explore techniques to help ensure AI output accuracy and minimize overreliance risks, including grounding data on trusted sources and using AI red teaming.&nbsp;<\/p>\n<h3 class=\"wp-block-heading\" id=\"defending-against-threat-actors\">Defending against threat actors<\/h3>\n<p>Threat actors use AI for cyberattacks, making safeguards essential. We cover protecting against malicious model instructions, AI system jailbreaks, and AI-driven attacks, emphasizing authentication measures and insider risk programs.&nbsp;<\/p>\n<div class=\"wp-block-msxcm-cta-block\" data-moray data-bi-an=\"CTA Block\">\n<div class=\"card d-block mx-ng mx-md-0\">\n<div class=\"row no-gutters\">\n<div class=\"d-flex col-md\">\n<div class=\"card-body align-self-center p-4 p-md-5\">\n<h2>Grow Your Business with AI You Can Trust<\/h2>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"col-md-4\"> <img loading=\"lazy\" decoding=\"async\" width=\"497\" height=\"267\" src=\"https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/wp-content\/uploads\/2024\/11\/Screenshot-2024-10-30-073916.png\" class=\"card-img img-object-cover\" alt srcset=\"https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/wp-content\/uploads\/2024\/11\/Screenshot-2024-10-30-073916.webp 497w, https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/wp-content\/uploads\/2024\/11\/Screenshot-2024-10-30-073916-300x161.webp 300w\" sizes=\"auto, (max-width: 497px) 100vw, 497px\"> <\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/div>\n<h3 class=\"wp-block-heading\" id=\"addressing-biases\">Addressing biases<\/h3>\n<p>Reducing bias is crucial to help ensure fair AI use. We discuss methods to identify and mitigate biases from training data and generative systems, emphasizing the role of ethics committees and diversity practices.<\/p>\n<h3 class=\"wp-block-heading\" id=\"legal-and-regulatory-compliance\">Legal and regulatory compliance<\/h3>\n<div class=\"wp-block-msxcm-kicker-container\" readability=\"4.9411764705882\">\n<div class=\" wp-block-msxcm-kicker-block wp-block-msxcm-kicker--align-right\" data-bi-an=\"Kicker Right\" readability=\"5.7647058823529\">\n<p class=\"wp-block-msxcm-kicker__title small text-neutral-400 text-uppercase\"> Microsoft\u2019s journey to redefine legal support with AI <\/p>\n<p> <a class=\"wp-block-msxcm-kicker__cta btn btn-link p-0 text-decoration-none\" href=\"https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/2024\/06\/11\/all-in-on-ai-explore-microsofts-journey-to-redefining-legal-support-with-ai\/\"> <span>All in on AI<\/span> <span class=\"glyph-append glyph-append-xsmall wp-block-msxcm-kicker__glyph glyph-append-chevron-right\"><\/span> <\/a> <\/div>\n<\/div>\n<p>Navigating AI regulations is challenging due to unclear guidelines and global disparities. We offer best practices for aligning AI initiatives with legal and ethical standards, including establishing ethics committees and leveraging frameworks like the NIST AI Risk Management Framework.<\/p>\n<h2 class=\"wp-block-heading\" id=\"explore-concrete-actions-for-the-future\">Explore concrete actions for the future<\/h2>\n<p>As your organization adopts generative AI, it\u2019s critical to implement <a href=\"https:\/\/www.microsoft.com\/en-us\/ai\/principles-and-approach\/\" target=\"_blank\" rel=\"noreferrer noopener\">responsible AI principles<\/a>\u2014including fairness, reliability, safety, privacy, inclusiveness, transparency, and accountability. In this paper, we provide an effective approach that uses the \u201cmap, measure, and manage\u201d framework as a guide; as well as explore the importance of experimentation, efficiency, and continuous improvement in your AI deployment.<\/p>\n<p>I\u2019m excited to launch this series on AI compliance, governance, and safety with a strategy paper on minimizing risk and enabling your organization to reap the benefits of generative AI. We hope this series serves as a guide to unlock the full potential of generative AI while ensuring security, compliance, and ethical use\u2014and trust the guidance will empower your organization with the knowledge and tools needed to thrive in this new era for business.<\/p>\n<h3 class=\"wp-block-heading\" id=\"additional-resources\">Additional resources<\/h3>\n<p><em>Get more insights from Bret Arsenault on emerging security challenges from his <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/bret-arsenault\/\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Security blogs<\/a> covering topics like next generation built-in security, insider risk management, managing hybrid work, and more.<\/em><\/p>\n<hr class=\"wp-block-separator has-alpha-channel-opacity divider my-3\">\n<p><sup>1, 2<\/sup> <a href=\"https:\/\/www.onetrust.com\/resources\/ismg-first-annual-generative-ai-study-business-rewards-vs-security-risks-research-report\/\" target=\"_blank\" rel=\"noreferrer noopener\">ISMG\u2019s First annual generative AI study \u2013 Business rewards vs. security risks: Research report<\/a>, ISMG.<\/p>\n<p> READ MORE <a href=\"https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/2024\/11\/04\/more-value-less-risk-how-to-implement-generative-ai-across-the-organization-securely-and-responsibly\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The technology landscape is undergoing a massive transformation, and AI is at the center of this change.<br \/>\nThe post More value, less risk: How to implement generative AI across the organization securely and responsibly appeared first on Microsoft Security Blog. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":57648,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[276],"tags":[],"class_list":["post-57647","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-secure"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>More value, less risk: How to implement generative AI across the organization securely and responsibly 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/more-value-less-risk-how-to-implement-generative-ai-across-the-organization-securely-and-responsibly\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"More value, less risk: How to implement generative AI across the organization securely and responsibly 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/more-value-less-risk-how-to-implement-generative-ai-across-the-organization-securely-and-responsibly\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2024-11-07T17:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/wp-content\/uploads\/2024\/11\/Screenshot-2024-10-30-093729.png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/more-value-less-risk-how-to-implement-generative-ai-across-the-organization-securely-and-responsibly\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/more-value-less-risk-how-to-implement-generative-ai-across-the-organization-securely-and-responsibly\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"More value, less risk: How to implement generative AI across the organization securely and responsibly\",\"datePublished\":\"2024-11-07T17:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/more-value-less-risk-how-to-implement-generative-ai-across-the-organization-securely-and-responsibly\\\/\"},\"wordCount\":699,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/more-value-less-risk-how-to-implement-generative-ai-across-the-organization-securely-and-responsibly\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/more-value-less-risk-how-to-implement-generative-ai-across-the-organization-securely-and-responsibly.png\",\"articleSection\":[\"Microsoft Secure\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/more-value-less-risk-how-to-implement-generative-ai-across-the-organization-securely-and-responsibly\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/more-value-less-risk-how-to-implement-generative-ai-across-the-organization-securely-and-responsibly\\\/\",\"name\":\"More value, less risk: How to implement generative AI across the organization securely and responsibly 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/more-value-less-risk-how-to-implement-generative-ai-across-the-organization-securely-and-responsibly\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/more-value-less-risk-how-to-implement-generative-ai-across-the-organization-securely-and-responsibly\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/more-value-less-risk-how-to-implement-generative-ai-across-the-organization-securely-and-responsibly.png\",\"datePublished\":\"2024-11-07T17:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/more-value-less-risk-how-to-implement-generative-ai-across-the-organization-securely-and-responsibly\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/more-value-less-risk-how-to-implement-generative-ai-across-the-organization-securely-and-responsibly\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/more-value-less-risk-how-to-implement-generative-ai-across-the-organization-securely-and-responsibly\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/more-value-less-risk-how-to-implement-generative-ai-across-the-organization-securely-and-responsibly.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/more-value-less-risk-how-to-implement-generative-ai-across-the-organization-securely-and-responsibly.png\",\"width\":535,\"height\":385},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/more-value-less-risk-how-to-implement-generative-ai-across-the-organization-securely-and-responsibly\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"More value, less risk: How to implement generative AI across the organization securely and responsibly\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"More value, less risk: How to implement generative AI across the organization securely and responsibly 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/more-value-less-risk-how-to-implement-generative-ai-across-the-organization-securely-and-responsibly\/","og_locale":"en_US","og_type":"article","og_title":"More value, less risk: How to implement generative AI across the organization securely and responsibly 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/more-value-less-risk-how-to-implement-generative-ai-across-the-organization-securely-and-responsibly\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2024-11-07T17:00:00+00:00","og_image":[{"url":"https:\/\/www.microsoft.com\/en-us\/microsoft-cloud\/blog\/wp-content\/uploads\/2024\/11\/Screenshot-2024-10-30-093729.png","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/more-value-less-risk-how-to-implement-generative-ai-across-the-organization-securely-and-responsibly\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/more-value-less-risk-how-to-implement-generative-ai-across-the-organization-securely-and-responsibly\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"More value, less risk: How to implement generative AI across the organization securely and responsibly","datePublished":"2024-11-07T17:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/more-value-less-risk-how-to-implement-generative-ai-across-the-organization-securely-and-responsibly\/"},"wordCount":699,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/more-value-less-risk-how-to-implement-generative-ai-across-the-organization-securely-and-responsibly\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/11\/more-value-less-risk-how-to-implement-generative-ai-across-the-organization-securely-and-responsibly.png","articleSection":["Microsoft Secure"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/more-value-less-risk-how-to-implement-generative-ai-across-the-organization-securely-and-responsibly\/","url":"https:\/\/www.threatshub.org\/blog\/more-value-less-risk-how-to-implement-generative-ai-across-the-organization-securely-and-responsibly\/","name":"More value, less risk: How to implement generative AI across the organization securely and responsibly 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/more-value-less-risk-how-to-implement-generative-ai-across-the-organization-securely-and-responsibly\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/more-value-less-risk-how-to-implement-generative-ai-across-the-organization-securely-and-responsibly\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/11\/more-value-less-risk-how-to-implement-generative-ai-across-the-organization-securely-and-responsibly.png","datePublished":"2024-11-07T17:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/more-value-less-risk-how-to-implement-generative-ai-across-the-organization-securely-and-responsibly\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/more-value-less-risk-how-to-implement-generative-ai-across-the-organization-securely-and-responsibly\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/more-value-less-risk-how-to-implement-generative-ai-across-the-organization-securely-and-responsibly\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/11\/more-value-less-risk-how-to-implement-generative-ai-across-the-organization-securely-and-responsibly.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/11\/more-value-less-risk-how-to-implement-generative-ai-across-the-organization-securely-and-responsibly.png","width":535,"height":385},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/more-value-less-risk-how-to-implement-generative-ai-across-the-organization-securely-and-responsibly\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"More value, less risk: How to implement generative AI across the organization securely and responsibly"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/57647","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=57647"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/57647\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/57648"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=57647"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=57647"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=57647"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}