OwlCyberSecurity - MANAGER
Edit File: 57235648c2d2b69b
LSCHѡ)hQ�2h \B f � h � /wp-json/oembed/1.0/embed?url=https%3A%2F%2Ftimerealise.com%2Fgenerative-ai-application-landscape-1%2Fe9a_default,e9a_URL.68aabdb0eb7eace3280542683198c644,e9a_REST,e9a_x-powered-by: PHP/8.1.32 set-cookie: PHPSESSID=vi8ovau8n2o1pg5g9edtqsejp7; path=/; secure expires: Thu, 19 Nov 1981 08:52:00 GMT cache-control: no-store, no-cache, must-revalidate pragma: no-cache content-type: application/json; charset=UTF-8 x-robots-tag: noindex link: <https://timerealise.com/wp-json/>; rel="https://api.w.org/" x-content-type-options: nosniff access-control-expose-headers: X-WP-Total, X-WP-TotalPages, Link access-control-allow-headers: Authorization, X-WP-Nonce, Content-Disposition, Content-MD5, Content-Type allow: GET vary: Origin x-litespeed-cache-control: public,max-age=604800 x-litespeed-tag: e9a_default,e9a_URL.68aabdb0eb7eace3280542683198c644,e9a_REST,e9a_ etag: "912966-1747558865;;;" {"version":"1.0","provider_name":"Time Realise","provider_url":"https:\/\/timerealise.com","author_name":"Charles Vincent","author_url":"https:\/\/timerealise.com\/author\/charles-vincent\/","title":"generative ai application landscape 1 - Time Realise","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"AiI7pEIjii\"><a href=\"https:\/\/timerealise.com\/generative-ai-application-landscape-1\/\">generative ai application landscape 1<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/timerealise.com\/generative-ai-application-landscape-1\/embed\/#?secret=AiI7pEIjii\" width=\"600\" height=\"338\" title=\"“generative ai application landscape 1” — Time Realise\" data-secret=\"AiI7pEIjii\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n<\/script>\n","description":"Impact and Influence of GenAI on Project Managers Generative AI to Combat Cyber Security Threats For instance, adversaries use generative AI to create sophisticated threats at scale, identify vulnerabilities, and bypass security protocols. Notably, social engineers employ generative AI to craft convincing phishing scams and deepfakes, thus amplifying the threat landscape[4]. Despite these risks, generative..."}