{"version":"1.0","provider_name":"The Kolabtree Blog","provider_url":"https:\/\/www.kolabtree.com\/blog\/ja\/","author_name":"Ramya Sriram","author_url":"https:\/\/www.kolabtree.com\/blog\/ja\/author\/ramyas\/","title":"Employing AI for Cybersecurity: Benefits and Challenges","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"jCxPnZw3yU\"><a href=\"https:\/\/www.kolabtree.com\/blog\/ja\/employing-ai-for-cybersecurity-benefits-and-challenges\/\">\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306bAI\u3092\u63a1\u7528\u3059\u308b\u3053\u3068\u3067\u30e1\u30ea\u30c3\u30c8\u3068\u8ab2\u984c<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.kolabtree.com\/blog\/ja\/employing-ai-for-cybersecurity-benefits-and-challenges\/embed\/#?secret=jCxPnZw3yU\" width=\"600\" height=\"338\" title=\"&#8220;Employing AI for Cybersecurity: Benefits and Challenges&#8221; &#8212; The Kolabtree Blog\" data-secret=\"jCxPnZw3yU\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/*! This file is auto-generated *\/\n!function(c,d){\"use strict\";var e=!1,o=!1;if(d.querySelector)if(c.addEventListener)e=!0;if(c.wp=c.wp||{},c.wp.receiveEmbedMessage);else if(c.wp.receiveEmbedMessage=function(e){var t=e.data;if(!t);else if(!(t.secret||t.message||t.value));else if(\/[^a-zA-Z0-9]\/.test(t.secret));else{for(var r,s,a,i=d.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),n=d.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),o=new RegExp(\"^https?:$\",\"i\"),l=0;l<n.length;l++)n[l].style.display=\"none\";for(l=0;l<i.length;l++)if(r=i[l],e.source!==r.contentWindow);else{if(r.removeAttribute(\"style\"),\"height\"===t.message){if(1e3<(s=parseInt(t.value,10)))s=1e3;else if(~~s<200)s=200;r.height=s}if(\"link\"===t.message)if(s=d.createElement(\"a\"),a=d.createElement(\"a\"),s.href=r.getAttribute(\"src\"),a.href=t.value,!o.test(a.protocol));else if(a.host===s.host)if(d.activeElement===r)c.top.location.href=t.value}}},e)c.addEventListener(\"message\",c.wp.receiveEmbedMessage,!1),d.addEventListener(\"DOMContentLoaded\",t,!1),c.addEventListener(\"load\",t,!1);function t(){if(o);else{o=!0;for(var e,t,r,s=-1!==navigator.appVersion.indexOf(\"MSIE 10\"),a=!!navigator.userAgent.match(\/Trident.*rv:11\\.\/),i=d.querySelectorAll(\"iframe.wp-embedded-content\"),n=0;n<i.length;n++){if(!(r=(t=i[n]).getAttribute(\"data-secret\")))r=Math.random().toString(36).substr(2,10),t.src+=\"#?secret=\"+r,t.setAttribute(\"data-secret\",r);if(s||a)(e=t.cloneNode(!0)).removeAttribute(\"security\"),t.parentNode.replaceChild(e,t);t.contentWindow.postMessage({message:\"ready\",secret:r},\"*\")}}}}(window,document);\n<\/script>","thumbnail_url":"https:\/\/www.kolabtree.com\/blog\/wp-content\/uploads\/2020\/05\/ai-cybersecurity.png","thumbnail_width":1280,"thumbnail_height":720,"description":"Within the domains of technology, security is one issue that has remained sensitive and elusive. Security experts have progressively identified areas that they consider of greater risk,\u00a0 indexed spheres of a higher threat, including mapping sections that they perceive to be potentially vulnerable. The aim being to sustain a robust and manageable security program effectively. From both technical and non-technical approach cybersecurity remains an uncharted sea of personal and organizational area of concern. The entry of advanced technologies have birthed the realm of artificial intelligence and cybersecurity. Exploring diverse tenets of cybersecurity, the entry of AI is timely, productive and also a threat in itself. Proper and satisfactory security protocolsRead More"}