{"id":677158,"date":"2024-12-13T22:31:00","date_gmt":"2024-12-13T22:31:00","guid":{"rendered":"https:\/\/www.capgemini.com\/gb-en\/?post_type=research-and-insight&#038;p=677158"},"modified":"2026-01-22T07:48:57","modified_gmt":"2026-01-22T07:48:57","slug":"generative-ai-and-cybersecurity-a-revisited-classic","status":"publish","type":"research-and-insight","link":"https:\/\/www.capgemini.com\/gb-en\/insights\/research-library\/generative-ai-and-cybersecurity-a-revisited-classic\/","title":{"rendered":"Generative AI and Cybersecurity: A revisited classic"},"content":{"rendered":"\n<header class=\"wp-block-cg-blocks-hero-reusable header heroReusable  \"><div class=\"header-bgs\"><picture><source srcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2024\/12\/Gen-AI-and-Cybersecurity-web-banner-2024a.jpg?w=2880&amp;quality=70 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2024\/12\/Gen-AI-and-Cybersecurity-web-banner-2024a.jpg?w=2880&amp;quality=70 2x\" media=\"(min-width: 1500px)\"\/><source srcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2024\/12\/Gen-AI-and-Cybersecurity-web-banner-2024a.jpg?w=1440&amp;quality=70 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2024\/12\/Gen-AI-and-Cybersecurity-web-banner-2024a.jpg?w=2880&amp;quality=70 2x\" media=\"(min-width: 992px)\"\/><source srcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2024\/12\/Gen-AI-and-Cybersecurity-web-banner-2024a.jpg?w=1024&amp;quality=70 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2024\/12\/Gen-AI-and-Cybersecurity-web-banner-2024a.jpg?w=1024&amp;quality=70 2x\" media=\"(min-width: 768px)\"\/><source srcset=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2024\/12\/Gen-AI-and-Cybersecurity-web-banner-2024a.jpg?w=768&amp;quality=70 1x, https:\/\/www.capgemini.com\/wp-content\/uploads\/2024\/12\/Gen-AI-and-Cybersecurity-web-banner-2024a.jpg?w=768&amp;quality=70 2x\" media=\"(min-width: 0)\"\/><img decoding=\"async\" src=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2024\/12\/Gen-AI-and-Cybersecurity-web-banner-2024a.jpg\" class=\"header-img header-img-d\" alt=\"\" style=\"object-fit:cover;object-position:50% 50%\" loading=\"eager\"\/><\/picture><\/div><div class=\"heroPictureCardHeaderShape\"><\/div><div class=\"container\"><div class=\"row\"><div class=\"col-md-12\"><div class=\"box\"><div class=\"boxTagWrapper\"><div class=\"tagInfo\"><div><span class=\"box-tag\">Cybersecurity<\/span><\/div><\/div><\/div><div class=\"box-title\"><h1 data-maxlength=\"34\">Generative AI and Cybersecurity: A<br>revisited classic<\/h1><\/div><div class=\"inner-row-insight download-btn\"><div class=\"col-md-4 downloadFiles addPadding\"><a class=\"button-download--small\" type=\"download\" href=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2024\/12\/Gen-Ai-and-Cybersecurity-POV-2024a.pdf\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"opens in a new window\"><span>Download PoV<\/span><span class=\"type\">2 MB  pdf<\/span><\/a><\/div><\/div><\/div><\/div><\/div><\/div><\/header>\n\n\n\n<section class=\"wp-block-cg-blocks-group undefined section section--article-content\"><div class=\"article-main-content\"><div class=\"container\"><div class=\"row\"><div class=\"col-12 col-md-1\"><nav class=\"article-social\"><ul class=\"social-nav\"><li class=\"ip-order-fb\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/www.capgemini.com\/?post_type=research-and-insight&amp;p=1081284\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"opens in a new window\"><i aria-hidden=\"true\" class=\"icon-fb\"><\/i><span class=\"sr-only\">Facebook<\/span><\/a><\/li><li class=\"ip-order-li\"><a href=\"https:\/\/www.linkedin.com\/shareArticle?url=https:\/\/www.capgemini.com\/?post_type=research-and-insight&amp;p=1081284\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"opens in a new window\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><span class=\"sr-only\">Linkedin<\/span><\/a><\/li><\/ul><\/nav><\/div><div class=\"col-12 col-md-11 col-lg-10\"><div class=\"article-text article-quote-text\">\n<h2 class=\"wp-block-heading\" id=\"h-security-does-not-have-to-be-a-barrier-to-tapping-into-generative-ai-s-power-when-done-well-it-can-accelerate-value-creation\">Security does not have to be a barrier to tapping into generative AI\u2019s power. When done well, it can accelerate value creation.<\/h2>\n\n\n\n<p>Integrating generative AI (Gen AI) into business environments involves addressing critical needs for robust data security, ethical considerations, and effective risk management. It\u2019s essential to protect sensitive information, ensure compliance with regulations, and maintain the integrity of AI models to prevent issues like data leaks, biased outcomes, and model hallucinations. Governance frameworks, secure infrastructure, and continuous monitoring play vital roles in mitigating these risks. A balanced approach is necessary to harness the potential of Gen AI while safeguarding against its inherent challenges.<\/p>\n\n\n\n<p>In this PoV, our expert, Michael Wasielewski, discusses the challenges and strategies for securely integrating Gen AI into business operations, emphasising data protection, ethical considerations, risk management, and regulatory compliance.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-key-takeaways\">Key takeaways<\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Data protection<\/strong>: Learn how to safeguard your data against leaks and unauthorised access.<\/li>\n\n\n\n<li><strong>Risk management<\/strong>: Understand the importance of governance and risk frameworks.<\/li>\n\n\n\n<li><strong>Model integrity<\/strong>: Discover strategies to ensure the trustworthiness of AI outputs.<\/li>\n\n\n\n<li><strong>Infrastructure security<\/strong>: Get insights into securing your AI applications and infrastructure.<\/li>\n<\/ul>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--1\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2024\/12\/Gen-Ai-and-Cybersecurity-POV-2024a.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Download the PoV<\/a><\/div>\n<\/div>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-capgemini-s-ai-and-cybersecurity-experience\">Capgemini\u2019s AI and cybersecurity experience<\/h2>\n\n\n\n<p>At Capgemini, we combine our expertise in AI and cybersecurity to help you navigate the complexities of Gen AI. Our solutions are designed to accelerate innovation while ensuring robust security and compliance. Our experts and partners deliver advice, systems, tools, and operations to help you achieve the promise of Gen AI quickly and securely.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/section>\n\n\n\n<section class=\"wp-block-cg-blocks-wrapper-people-slider section section--expert-slider wrapper-people-slider undefined\"><div class=\"container\"><div class=\"content-title\"><h2 data-maxlength=\"34\" class=\"people-heading-title\">Meet our expert<\/h2><\/div><\/div><div class=\"slider slider-boxed\"><div class=\"container\"><div class=\"slider-window\"><div class=\"slider-list\">\t\t<div class=\"slide\">\n\t\t\t<div class=\"box\">\n\t\t\t\t<div class=\"row\">\n\t\t\t\t\t<div class=\"col-md-6 col-lg-4 box-img-wrapper\">\n\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/gb-en\/wp-content\/uploads\/sites\/5\/2022\/12\/Profile.png\" alt=\"Michael Wasielewski Jr\"\/>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"col-md-6 col-lg-8 box-inner\">\n\t\t\t\t\t\t<div class=\"row title-social-media-header\">\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 mbl-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Opens in a new window\" href=\"https:\/\/www.linkedin.com\/in\/mwasielewskijr\/\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 box-container\">\n\t\t\t\t\t\t\t\t<div class=\"box-title\">\n\t\t\t\t\t\t\t\t\t<h3 class=\"people-profile-title\">Michael Wasielewski Jr<\/h3>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>Global Head of Cloud Security Services, Capgemini<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 social-box-container dkt-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><a aria-label=\"Linkedin\" target=\"_blank\" title=\"Opens in a new window\" href=\"https:\/\/www.linkedin.com\/in\/mwasielewskijr\/\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"people-info\">Michael is responsible for global cloud security and next-gen secure architecture portfolio development. He brings a robust background ranging from network operations and engineering to running global information security teams and modernising enterprises through their cloud and workplace journeys, as well as executing as a global cloud security specialist for AWS. When not playing video games with his two kids or struggling to learn French, you can often find Michael arguing about what zero trust really means, why you are almost always more secure in the cloud, and why New York-style pizza is the best.<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div><\/div><\/div><div class=\"slider-nav\"><button class=\"slider-prev inactive\" aria-label=\"Slider-previous\" tabindex=\"-1\"><\/button><ul class=\"slider-paginator\"><\/ul><button class=\"slider-next\" aria-label=\"Slider-next\"><\/button><\/div><\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":440,"featured_media":677159,"template":"","meta":{"cg_dt_proposed_to":[],"cg_seo_hreflang_relations":"[]","cg_seo_canonical_relation":"","cg_seo_hreflang_x_default_relation":"{\"uuid\":\"0504e8b2-ff84-42c1-a65c-48c0609b6942\",\"blogId\":\"\",\"domain\":\"\",\"sitePath\":\"\",\"postLink\":\"\",\"postId\":null,\"isSaved\":true,\"isCrossLink\":false,\"hasCrossLink\":false}","cg_dt_approved_content":true,"cg_dt_mandatory_content":false,"cg_dt_notes":"","cg_dg_source_changed":true,"cg_dt_link_disabled":false,"footnotes":"","related_resource_url":"","related_resource_id":0,"related_resource_size":"","related_resource_type":"","cg_author":0,"_yoast_wpseo_primary_theme":48,"primary_term":"Cybersecurity","featured_focal_points":""},"tags":[],"research-and-insight-type":[85],"theme":[48],"brand":[],"service":[],"industry":[],"partners":[],"content-group":[],"class_list":["post-677158","research-and-insight","type-research-and-insight","status-publish","has-post-thumbnail","hentry","research-and-insight-type-point-of-view","theme-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.8 (Yoast SEO v22.8) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Generative AI and Cybersecurity: A revisited classic - Capgemini UK<\/title>\n<meta name=\"description\" content=\"Security does not have to be a barrier to tapping into generative AI\u2019s power. When done well, it can accelerate value creation.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.capgemini.com\/gb-en\/insights\/research-library\/generative-ai-and-cybersecurity-a-revisited-classic\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Generative AI and Cybersecurity: A revisited classic\" \/>\n<meta property=\"og:description\" content=\"Security does not have to be a barrier to tapping into generative AI\u2019s power. When done well, it can accelerate value creation.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.capgemini.com\/gb-en\/insights\/research-library\/generative-ai-and-cybersecurity-a-revisited-classic\/\" \/>\n<meta property=\"og:site_name\" content=\"Capgemini UK\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-22T07:48:57+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.capgemini.com\/gb-en\/wp-content\/uploads\/sites\/5\/2024\/12\/Gen-AI-and-Cybersecurity-web-banner-2024a.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.capgemini.com\/gb-en\/insights\/research-library\/generative-ai-and-cybersecurity-a-revisited-classic\/\",\"url\":\"https:\/\/www.capgemini.com\/gb-en\/insights\/research-library\/generative-ai-and-cybersecurity-a-revisited-classic\/\",\"name\":\"Generative AI and Cybersecurity: A revisited classic - Capgemini UK\",\"isPartOf\":{\"@id\":\"https:\/\/www.capgemini.com\/gb-en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.capgemini.com\/gb-en\/insights\/research-library\/generative-ai-and-cybersecurity-a-revisited-classic\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/gb-en\/insights\/research-library\/generative-ai-and-cybersecurity-a-revisited-classic\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.capgemini.com\/gb-en\/wp-content\/uploads\/sites\/5\/2024\/12\/Gen-AI-and-Cybersecurity-web-banner-2024a.jpg\",\"datePublished\":\"2024-12-13T22:31:00+00:00\",\"dateModified\":\"2026-01-22T07:48:57+00:00\",\"description\":\"Security does not have to be a barrier to tapping into generative AI\u2019s power. When done well, it can accelerate value creation.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.capgemini.com\/gb-en\/insights\/research-library\/generative-ai-and-cybersecurity-a-revisited-classic\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.capgemini.com\/gb-en\/insights\/research-library\/generative-ai-and-cybersecurity-a-revisited-classic\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.capgemini.com\/gb-en\/insights\/research-library\/generative-ai-and-cybersecurity-a-revisited-classic\/#primaryimage\",\"url\":\"https:\/\/www.capgemini.com\/gb-en\/wp-content\/uploads\/sites\/5\/2024\/12\/Gen-AI-and-Cybersecurity-web-banner-2024a.jpg\",\"contentUrl\":\"https:\/\/www.capgemini.com\/gb-en\/wp-content\/uploads\/sites\/5\/2024\/12\/Gen-AI-and-Cybersecurity-web-banner-2024a.jpg\",\"width\":2881,\"height\":1801,\"caption\":\"genai-cybersecurity\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.capgemini.com\/gb-en\/insights\/research-library\/generative-ai-and-cybersecurity-a-revisited-classic\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Research &amp; insights\",\"item\":\"https:\/\/www.capgemini.com\/gb-en\/research-and-insight\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Generative AI and Cybersecurity: A revisited classic\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.capgemini.com\/gb-en\/#website\",\"url\":\"https:\/\/www.capgemini.com\/gb-en\/\",\"name\":\"Capgemini UK\",\"description\":\"Get the future you want\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.capgemini.com\/gb-en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-GB\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Generative AI and Cybersecurity: A revisited classic - Capgemini UK","description":"Security does not have to be a barrier to tapping into generative AI\u2019s power. When done well, it can accelerate value creation.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.capgemini.com\/gb-en\/insights\/research-library\/generative-ai-and-cybersecurity-a-revisited-classic\/","og_locale":"en_GB","og_type":"article","og_title":"Generative AI and Cybersecurity: A revisited classic","og_description":"Security does not have to be a barrier to tapping into generative AI\u2019s power. When done well, it can accelerate value creation.","og_url":"https:\/\/www.capgemini.com\/gb-en\/insights\/research-library\/generative-ai-and-cybersecurity-a-revisited-classic\/","og_site_name":"Capgemini UK","article_modified_time":"2026-01-22T07:48:57+00:00","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.capgemini.com\/gb-en\/wp-content\/uploads\/sites\/5\/2024\/12\/Gen-AI-and-Cybersecurity-web-banner-2024a.jpg","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/gb-en\/insights\/research-library\/generative-ai-and-cybersecurity-a-revisited-classic\/","url":"https:\/\/www.capgemini.com\/gb-en\/insights\/research-library\/generative-ai-and-cybersecurity-a-revisited-classic\/","name":"Generative AI and Cybersecurity: A revisited classic - Capgemini UK","isPartOf":{"@id":"https:\/\/www.capgemini.com\/gb-en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.capgemini.com\/gb-en\/insights\/research-library\/generative-ai-and-cybersecurity-a-revisited-classic\/#primaryimage"},"image":{"@id":"https:\/\/www.capgemini.com\/gb-en\/insights\/research-library\/generative-ai-and-cybersecurity-a-revisited-classic\/#primaryimage"},"thumbnailUrl":"https:\/\/www.capgemini.com\/gb-en\/wp-content\/uploads\/sites\/5\/2024\/12\/Gen-AI-and-Cybersecurity-web-banner-2024a.jpg","datePublished":"2024-12-13T22:31:00+00:00","dateModified":"2026-01-22T07:48:57+00:00","description":"Security does not have to be a barrier to tapping into generative AI\u2019s power. When done well, it can accelerate value creation.","breadcrumb":{"@id":"https:\/\/www.capgemini.com\/gb-en\/insights\/research-library\/generative-ai-and-cybersecurity-a-revisited-classic\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.capgemini.com\/gb-en\/insights\/research-library\/generative-ai-and-cybersecurity-a-revisited-classic\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.capgemini.com\/gb-en\/insights\/research-library\/generative-ai-and-cybersecurity-a-revisited-classic\/#primaryimage","url":"https:\/\/www.capgemini.com\/gb-en\/wp-content\/uploads\/sites\/5\/2024\/12\/Gen-AI-and-Cybersecurity-web-banner-2024a.jpg","contentUrl":"https:\/\/www.capgemini.com\/gb-en\/wp-content\/uploads\/sites\/5\/2024\/12\/Gen-AI-and-Cybersecurity-web-banner-2024a.jpg","width":2881,"height":1801,"caption":"genai-cybersecurity"},{"@type":"BreadcrumbList","@id":"https:\/\/www.capgemini.com\/gb-en\/insights\/research-library\/generative-ai-and-cybersecurity-a-revisited-classic\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Research &amp; insights","item":"https:\/\/www.capgemini.com\/gb-en\/research-and-insight\/"},{"@type":"ListItem","position":2,"name":"Generative AI and Cybersecurity: A revisited classic"}]},{"@type":"WebSite","@id":"https:\/\/www.capgemini.com\/gb-en\/#website","url":"https:\/\/www.capgemini.com\/gb-en\/","name":"Capgemini UK","description":"Get the future you want","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.capgemini.com\/gb-en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-GB"}]}},"theme_term_info":[{"id":48,"name":"Cybersecurity"}],"industry_term_info":[],"services_term_info":[],"partners_term_info":[],"brand_term_info":[],"brand_term":[],"parsely":{"version":"1.1.0","canonical_url":"https:\/\/capgemini.com\/gb-en\/insights\/research-library\/generative-ai-and-cybersecurity-a-revisited-classic\/","smart_links":{"inbound":0,"outbound":0},"traffic_boost_suggestions_count":0,"meta":{"@context":"https:\/\/schema.org","@type":"NewsArticle","headline":"Generative AI and Cybersecurity: A revisited classic","url":"https:\/\/www.capgemini.com\/gb-en\/insights\/research-library\/generative-ai-and-cybersecurity-a-revisited-classic\/","mainEntityOfPage":{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/gb-en\/insights\/research-library\/generative-ai-and-cybersecurity-a-revisited-classic\/"},"thumbnailUrl":"https:\/\/www.capgemini.com\/gb-en\/wp-content\/uploads\/sites\/5\/2024\/12\/Gen-AI-and-Cybersecurity-web-banner-2024a.jpg?w=150&h=150&crop=1","image":{"@type":"ImageObject","url":"https:\/\/www.capgemini.com\/gb-en\/wp-content\/uploads\/sites\/5\/2024\/12\/Gen-AI-and-Cybersecurity-web-banner-2024a.jpg"},"articleSection":"Uncategorized","author":[],"creator":[],"publisher":{"@type":"Organization","name":"Capgemini UK","logo":""},"keywords":[],"dateCreated":"2024-12-13T22:31:00Z","datePublished":"2024-12-13T22:31:00Z","dateModified":"2026-01-22T07:48:57Z"},"rendered":"<meta name=\"parsely-title\" content=\"Generative AI and Cybersecurity: A revisited classic\" \/>\n<meta name=\"parsely-link\" content=\"https:\/\/www.capgemini.com\/gb-en\/insights\/research-library\/generative-ai-and-cybersecurity-a-revisited-classic\/\" \/>\n<meta name=\"parsely-type\" content=\"post\" \/>\n<meta name=\"parsely-image-url\" content=\"https:\/\/www.capgemini.com\/gb-en\/wp-content\/uploads\/sites\/5\/2024\/12\/Gen-AI-and-Cybersecurity-web-banner-2024a.jpg?w=150&amp;h=150&amp;crop=1\" \/>\n<meta name=\"parsely-pub-date\" content=\"2024-12-13T22:31:00Z\" \/>\n<meta name=\"parsely-section\" content=\"Uncategorized\" \/>","tracker_url":"https:\/\/cdn.parsely.com\/keys\/capgemini.com\/p.js"},"archive_status":false,"featured_image_src":"https:\/\/www.capgemini.com\/gb-en\/wp-content\/uploads\/sites\/5\/2024\/12\/Gen-AI-and-Cybersecurity-web-banner-2024a.jpg","featured_image_alt":"genai-cybersecurity","jetpack_sharing_enabled":true,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Capgemini UK","distributor_original_site_url":"https:\/\/www.capgemini.com\/gb-en","push-errors":false,"tag_names":[],"featured_image_url":"https:\/\/www.capgemini.com\/gb-en\/wp-content\/uploads\/sites\/5\/2024\/12\/Gen-AI-and-Cybersecurity-web-banner-2024a.jpg","_links":{"self":[{"href":"https:\/\/www.capgemini.com\/gb-en\/wp-json\/wp\/v2\/research-and-insight\/677158","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.capgemini.com\/gb-en\/wp-json\/wp\/v2\/research-and-insight"}],"about":[{"href":"https:\/\/www.capgemini.com\/gb-en\/wp-json\/wp\/v2\/types\/research-and-insight"}],"author":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/gb-en\/wp-json\/wp\/v2\/users\/440"}],"version-history":[{"count":2,"href":"https:\/\/www.capgemini.com\/gb-en\/wp-json\/wp\/v2\/research-and-insight\/677158\/revisions"}],"predecessor-version":[{"id":682369,"href":"https:\/\/www.capgemini.com\/gb-en\/wp-json\/wp\/v2\/research-and-insight\/677158\/revisions\/682369"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/gb-en\/wp-json\/wp\/v2\/media\/677159"}],"wp:attachment":[{"href":"https:\/\/www.capgemini.com\/gb-en\/wp-json\/wp\/v2\/media?parent=677158"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.capgemini.com\/gb-en\/wp-json\/wp\/v2\/tags?post=677158"},{"taxonomy":"research-and-insight-type","embeddable":true,"href":"https:\/\/www.capgemini.com\/gb-en\/wp-json\/wp\/v2\/research-and-insight-type?post=677158"},{"taxonomy":"theme","embeddable":true,"href":"https:\/\/www.capgemini.com\/gb-en\/wp-json\/wp\/v2\/theme?post=677158"},{"taxonomy":"brand","embeddable":true,"href":"https:\/\/www.capgemini.com\/gb-en\/wp-json\/wp\/v2\/brand?post=677158"},{"taxonomy":"service","embeddable":true,"href":"https:\/\/www.capgemini.com\/gb-en\/wp-json\/wp\/v2\/service?post=677158"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/www.capgemini.com\/gb-en\/wp-json\/wp\/v2\/industry?post=677158"},{"taxonomy":"partners","embeddable":true,"href":"https:\/\/www.capgemini.com\/gb-en\/wp-json\/wp\/v2\/partners?post=677158"},{"taxonomy":"content-group","embeddable":true,"href":"https:\/\/www.capgemini.com\/gb-en\/wp-json\/wp\/v2\/content-group?post=677158"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}