{"id":57794,"date":"2024-12-01T00:00:00","date_gmt":"2024-12-01T00:00:00","guid":{"rendered":"urn:uuid:111ac01c-2bdf-2ea2-91cd-602c8e3907a4"},"modified":"2024-12-01T00:00:00","modified_gmt":"2024-12-01T00:00:00","slug":"ai-pulse-the-good-from-ai-and-the-promise-of-agentic","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/ai-pulse-the-good-from-ai-and-the-promise-of-agentic\/","title":{"rendered":"AI Pulse: The Good from AI and the Promise of Agentic"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/good-agentic-ai:Large?qlt=80\"><\/p>\n<div><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/thumbnails\/24\/good-agentic-ai.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p><span class=\"body-subhead-title\">What Good is AI?<\/span><\/p>\n<p>As a cybersecurity company, we at Trend Micro spend a lot of time in the \u2018risk zone\u2019: anticipating threats and figuring out how to neutralize them. But we appreciate it\u2019s also important to take a step back and consider the tremendous power of AI to bring positive change to humanity.<\/p>\n<p>This issue of <i>AI Pulse <\/i>looks at some of the collective action being taken to make AI safe and beneficial, including by strengthening cybersecurity through AI-enhanced vulnerability hunting and threat detection. And we consider how agentic AI will usher in whole new possibilities for making people\u2019s lives better as our civilization continues down the road toward artificial general intelligence (AGI).<\/p>\n<p><span class=\"body-subhead-title\">What\u2019s New: AI as a Force for Good<\/span><\/p>\n<p><b>In France, you can\u2019t spell peace\u2014\u201cpaix\u201d\u2014without AI<\/b><br \/>The <a href=\"https:\/\/newsroom.trendmicro.com\/2024-11-11-Trend-Micro-Partners-with-Paris-Peace-Forum-to-Drive-Secure-AI-Adoption\" target=\"_blank\" rel=\"noopener\">Paris Peace Forum<\/a> sees peace as more than just the absence of war: it\u2019s a cooperative approach to tackling challenges such as climate change, migration, and cyber threats\u2014big issues that affect all countries and have no regard for national borders. This year\u2019s Forum on November 11\u201312 made it clear that cyber threats (and opportunities) don\u2019t necessarily include AI. Sessions across the two days covered everything from responsible AI governance and bridging the AI divide to disinformation and women in AI.<\/p>\n<p>Trend was there and has announced plans to partner with the Forum on developing guidance for secure AI adoption and implementation. Trend will also take part in the upcoming February AI <i>Action Summit<\/i> led by French President Emmanuel Macron, sharing insights into AI threats and how to meet them with advanced cybersecurity tools and practices.<\/p>\n<p><b>Is agentic AI good for your health?<\/b><br \/>According to the <i>MIT Technology Review<\/i>, it very well could be. The journal <a href=\"https:\/\/www.technologyreview.com\/2024\/11\/13\/1106750\/unlocking-the-mysteries-of-complex-biological-systems-with-agentic-ai\/\" target=\"_blank\" rel=\"noopener\">recently ran a story<\/a> about the potential of agent-driven AI to unlock breakthroughs in biology. The piece was notable for a couple of reasons. First, it asserted that AI agents\u2019 unstructured, \u2018generalist\u2019 problem-solving approach stands to penetrate the complexity that has been a longtime barrier for human researchers. Second, the piece itself was written by an AI system\u2014Owkin, branded as \u201cthe world\u2019s first end-to-end AI biotech.\u201d<\/p>\n<p>The dual ability of AI to drive discovery and contribute to high-quality scientific communication has many observers excited. Of course, there are risks to manage: <a href=\"https:\/\/www.theverge.com\/2024\/10\/27\/24281170\/open-ai-whisper-hospitals-transcription-hallucinations-studies\" target=\"_blank\" rel=\"noopener\"><i>The Verge<\/i><\/a> recently reported on inappropriate hallucinated passages cropping up in AI-generated medical transcripts; and <a href=\"https:\/\/physicsworld.com\/a\/why-ai-is-a-force-for-good-in-science-communication\/\" target=\"_blank\" rel=\"noopener\"><i>Physics World<\/i><\/a> cited a study that found certain computer-aided diagnoses were less accurate for some patients than others due to biased datasets. But in the balance, the promise of agentic AI to improve lives and boost general scientific literacy seems like a net positive and a good use of transformative technology.<\/p>\n<p><b>Gossip on the AI grapevine<\/b><br \/>Every leap forward amplifies AI\u2019s capacity to do good, and the rumor mill is churning right now with hints of new releases from three major players. OpenAI CEO Sam Altman has denied it but word on the street is that the company will launch a platform\u2014possibly GPT-5, currently codenamed \u2018Orion\u2019\u2014as soon as December. An exec fueling the rumors has teased that the new platform <a href=\"https:\/\/www.theverge.com\/2024\/10\/24\/24278999\/openai-plans-orion-ai-model-release-december\" target=\"_blank\" rel=\"noopener\">could be 100 times more powerful than GPT-4<\/a>. According to <i>The Verge<\/i>, OpenAI\u2019s goal is to get closer to artificial general intelligence (AGI) by combining its various LLMs (though <a href=\"https:\/\/analyticsindiamag.com\/ai-breakthroughs\/meta-likely-to-release-llama-4-early-next-year-pushing-towards-autonomous-machine-intelligence-ami\/\" target=\"_blank\" rel=\"noopener\">some sources<\/a> say the company has already achieved AGI internally).<\/p>\n<p>Anthropic is working on the next iteration of its platform, <a href=\"https:\/\/blog.promptlayer.com\/everything-we-know-claude-3-5-opus\/\" target=\"_blank\" rel=\"noopener\">Claude 3.5 Opus<\/a>. CEO Dario Amodei is being similarly coy about a release date, but observers suspect to see something before the turn of the year. No specific enhancements have been announced, but \u201cfaster, better, smarter,\u201d seems a fair expectation, along with further proof of Anthropic\u2019s commitment to ethical AI development.<\/p>\n<p>Google is also said to be preparing the launch of Gemini 2.0 before the end of the year. Again, details are scant, though <a href=\"https:\/\/www.techradar.com\/computing\/artificial-intelligence\/googles-next-gen-gemini-2-0-ai-model-is-rumored-to-be-launching-in-december\" target=\"_blank\" rel=\"noopener\">TechRadar suggests<\/a> \u201csmarter answers, faster processing, support for longer inputs, and more reliable reasoning and coding\u201d are likely. A little farther on the horizon is the next release of Meta\u2019s Llama platform. A company spokesman has said Llama 4 can be expected early in the new year with <a href=\"https:\/\/analyticsindiamag.com\/ai-breakthroughs\/meta-likely-to-release-llama-4-early-next-year-pushing-towards-autonomous-machine-intelligence-ami\/\" target=\"_blank\" rel=\"noopener\">enhancements that approach autonomous machine intelligence<\/a> (AMI)\u2014\u201cperception, reasoning, and planning\u201d via techniques such as chain-of-thought. It&#8217;s clear from these rumors that competition remains fierce, with AGI the prize everyone is ultimately after.<\/p>\n<p><b>To be open or not open, that is the question<\/b><br \/>As the AI majors labor away on their new models, debate continues to swirl around the pros and cons of open-source AI. The con side worries open-source AI could easily be misused, which <a href=\"https:\/\/www.economist.com\/leaders\/2024\/11\/07\/why-open-source-ai-models-are-good-for-the-world\" target=\"_blank\" rel=\"noopener\">China\u2019s co-opting of Llama 2 for military use suggests is a genuine risk<\/a>. But those in the pro camp point to the success of open-source software in application spaces such as the internet and music streaming, pointing out that openness tends to produce stronger, more trustable solutions. A recent<i> Economist<\/i> <a href=\"https:\/\/www.economist.com\/leaders\/2024\/11\/07\/why-open-source-ai-models-are-good-for-the-world\" target=\"_blank\" rel=\"noopener\">opinion piece<\/a> applauded the at least partial openness of today\u2019s major AI models and urged governments to encourage open-source development through regulation and IP laws.<\/p>\n<p><span class=\"body-subhead-title\">Trends in AI-enabled Cybersecurity<\/span><\/p>\n<p> Read More <a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/24\/l\/good-agentic-ai.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The perils of AI get a lot of airtime, but what are the upsides? This issue of AI Pulse looks at some of the good AI can bring, from strengthening cybersecurity to driving health breakthroughs\u2014and how the coming wave of agentic AI is going to take those possibilities to a whole new level. Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":57795,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[9510,10938,9521,9511,9508,9534,9581,9535],"class_list":["post-57794","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trendmicro","tag-trend-micro-research-articles-news-reports","tag-trend-micro-research-artificial-intelligence-ai","tag-trend-micro-research-cyber-crime","tag-trend-micro-research-cyber-threats","tag-trend-micro-research-endpoints","tag-trend-micro-research-latest-news","tag-trend-micro-research-mobile","tag-trend-micro-research-web"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>AI Pulse: The Good from AI and the Promise of Agentic 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/ai-pulse-the-good-from-ai-and-the-promise-of-agentic\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"AI Pulse: The Good from AI and the Promise of Agentic 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/ai-pulse-the-good-from-ai-and-the-promise-of-agentic\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2024-12-01T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/good-agentic-ai:Large?qlt=80\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ai-pulse-the-good-from-ai-and-the-promise-of-agentic\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ai-pulse-the-good-from-ai-and-the-promise-of-agentic\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"AI Pulse: The Good from AI and the Promise of Agentic\",\"datePublished\":\"2024-12-01T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ai-pulse-the-good-from-ai-and-the-promise-of-agentic\\\/\"},\"wordCount\":866,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ai-pulse-the-good-from-ai-and-the-promise-of-agentic\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/ai-pulse-the-good-from-ai-and-the-promise-of-agentic.jpg\",\"keywords\":[\"Trend Micro Research : Articles, News, Reports\",\"Trend Micro Research : Artificial Intelligence (AI)\",\"Trend Micro Research : Cyber Crime\",\"Trend Micro Research : Cyber Threats\",\"Trend Micro Research : Endpoints\",\"Trend Micro Research : Latest News\",\"Trend Micro Research : Mobile\",\"Trend Micro Research : Web\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ai-pulse-the-good-from-ai-and-the-promise-of-agentic\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ai-pulse-the-good-from-ai-and-the-promise-of-agentic\\\/\",\"name\":\"AI Pulse: The Good from AI and the Promise of Agentic 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ai-pulse-the-good-from-ai-and-the-promise-of-agentic\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ai-pulse-the-good-from-ai-and-the-promise-of-agentic\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/ai-pulse-the-good-from-ai-and-the-promise-of-agentic.jpg\",\"datePublished\":\"2024-12-01T00:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ai-pulse-the-good-from-ai-and-the-promise-of-agentic\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ai-pulse-the-good-from-ai-and-the-promise-of-agentic\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ai-pulse-the-good-from-ai-and-the-promise-of-agentic\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/ai-pulse-the-good-from-ai-and-the-promise-of-agentic.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/ai-pulse-the-good-from-ai-and-the-promise-of-agentic.jpg\",\"width\":976,\"height\":533},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ai-pulse-the-good-from-ai-and-the-promise-of-agentic\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Trend Micro Research : Articles, News, Reports\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/trend-micro-research-articles-news-reports\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"AI Pulse: The Good from AI and the Promise of Agentic\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"AI Pulse: The Good from AI and the Promise of Agentic 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/ai-pulse-the-good-from-ai-and-the-promise-of-agentic\/","og_locale":"en_US","og_type":"article","og_title":"AI Pulse: The Good from AI and the Promise of Agentic 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/ai-pulse-the-good-from-ai-and-the-promise-of-agentic\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2024-12-01T00:00:00+00:00","og_image":[{"url":"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/good-agentic-ai:Large?qlt=80","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/ai-pulse-the-good-from-ai-and-the-promise-of-agentic\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/ai-pulse-the-good-from-ai-and-the-promise-of-agentic\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"AI Pulse: The Good from AI and the Promise of Agentic","datePublished":"2024-12-01T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/ai-pulse-the-good-from-ai-and-the-promise-of-agentic\/"},"wordCount":866,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/ai-pulse-the-good-from-ai-and-the-promise-of-agentic\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/12\/ai-pulse-the-good-from-ai-and-the-promise-of-agentic.jpg","keywords":["Trend Micro Research : Articles, News, Reports","Trend Micro Research : Artificial Intelligence (AI)","Trend Micro Research : Cyber Crime","Trend Micro Research : Cyber Threats","Trend Micro Research : Endpoints","Trend Micro Research : Latest News","Trend Micro Research : Mobile","Trend Micro Research : Web"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/ai-pulse-the-good-from-ai-and-the-promise-of-agentic\/","url":"https:\/\/www.threatshub.org\/blog\/ai-pulse-the-good-from-ai-and-the-promise-of-agentic\/","name":"AI Pulse: The Good from AI and the Promise of Agentic 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/ai-pulse-the-good-from-ai-and-the-promise-of-agentic\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/ai-pulse-the-good-from-ai-and-the-promise-of-agentic\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/12\/ai-pulse-the-good-from-ai-and-the-promise-of-agentic.jpg","datePublished":"2024-12-01T00:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/ai-pulse-the-good-from-ai-and-the-promise-of-agentic\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/ai-pulse-the-good-from-ai-and-the-promise-of-agentic\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/ai-pulse-the-good-from-ai-and-the-promise-of-agentic\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/12\/ai-pulse-the-good-from-ai-and-the-promise-of-agentic.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/12\/ai-pulse-the-good-from-ai-and-the-promise-of-agentic.jpg","width":976,"height":533},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/ai-pulse-the-good-from-ai-and-the-promise-of-agentic\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Trend Micro Research : Articles, News, Reports","item":"https:\/\/www.threatshub.org\/blog\/tag\/trend-micro-research-articles-news-reports\/"},{"@type":"ListItem","position":3,"name":"AI Pulse: The Good from AI and the Promise of Agentic"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/57794","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=57794"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/57794\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/57795"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=57794"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=57794"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=57794"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}