{"id":86731,"date":"2024-09-04T17:02:49","date_gmt":"2024-09-04T09:02:49","guid":{"rendered":"https:\/\/version-2.com\/?p=86731"},"modified":"2024-08-29T17:04:27","modified_gmt":"2024-08-29T09:04:27","slug":"the-evolution-of-it-security-compliance-in-the-age-of-genai","status":"publish","type":"post","link":"https:\/\/version-2.com\/en\/2024\/09\/the-evolution-of-it-security-compliance-in-the-age-of-genai\/","title":{"rendered":"The Evolution of IT Security Compliance in the Age of GenAI"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"86731\" class=\"elementor elementor-86731\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-35fe5dd post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"35fe5dd\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;cef08c3&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-409a2e9a\" data-id=\"409a2e9a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5a8be8f elementor-widget elementor-widget-text-editor\" data-id=\"5a8be8f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-medium\" src=\"https:\/\/www.portnox.com\/wp-content\/uploads\/2024\/08\/it-security-compliance-tile.png\" width=\"1200\" height=\"798\" \/><div class=\"fl-module-content fl-node-content\">\n\t\t<p>Just when we thought we had seen it all\u2014from phishing schemes that could fool even the most paranoid, to ransomware attacks that would make your average Bond villain blush\u2014<a href=\"https:\/\/www.portnox.com\/blog\/security-trends\/the-impact-of-genai-risks-on-security-postures\/\" target=\"_blank\" rel=\"noopener\">along comes Generative AI (GenAI)<\/a>. If you\u2019ve ever played with one of those AI tools that can write poems, paint portraits, or even generate code snippets, you might have thought, \u201cThis is cool!\u201d Well, so did the cybercriminals. And not in a good way.<\/p>\n<p>Welcome to the new frontier of cybersecurity, where GenAI is the latest weapon in the hacker\u2019s arsenal, and conversely, the new shield for those on the defense. It\u2019s a cat-and-mouse game where both the cat and the mouse have just discovered rocket boosters. As we dive into this brave new world, let\u2019s take a look at how IT security compliance is evolving, and where it\u2019s headed.<\/p>\n<h2>GenAI: The Cybercriminal\u2019s New Favorite Toy<\/h2>\n<p>Remember when hacking used to involve a hoodie, a dark room, and endless lines of code? Those were the good old days. Now, with GenAI, the barrier to entry has lowered significantly. <a href=\"https:\/\/cybermagazine.com\/articles\/cybercriminals-are-creating-a-darker-side-to-ai\" target=\"_blank\" rel=\"noopener\">Today\u2019s cybercriminals can deploy AI tools<\/a> to generate convincing phishing emails, automate the creation of malware, and even simulate entire social engineering scenarios with frightening accuracy.<\/p>\n<p>Take, for example, deepfakes\u2014those AI-generated videos that can make it seem like anyone is saying or doing anything. A little creepy, right? Now imagine a cybercriminal using that technology to impersonate a company\u2019s CEO in a video message, instructing employees to transfer funds or divulge sensitive information. Suddenly, that phishy email from a \u201cNigerian prince\u201d seems downright quaint.<\/p>\n<p>GenAI can also be weaponized to exploit zero-day vulnerabilities more efficiently. By analyzing vast amounts of data at an astonishing speed, AI can identify weaknesses in systems before they are widely known and patchable. And once those vulnerabilities are found, GenAI can help create and deploy exploits faster than you can say, \u201cDidn\u2019t we just update the firewall?\u201d<\/p>\n<h2>Cybersecurity: Fighting Fire with Fire<\/h2>\n<p>But all is not lost\u2014cybersecurity companies have their own GenAI tricks up their sleeves. In fact, the same technology that\u2019s making hackers more formidable is also giving the good guys some powerful new tools.<\/p>\n<p>One of the key ways AI is being infused into cybersecurity is through predictive analytics. By analyzing patterns and trends in vast amounts of data, AI can predict potential threats before they even happen. It\u2019s like having a crystal ball, but instead of foretelling who\u2019s going to win the next reality TV show, it\u2019s predicting the next big ransomware attack.<\/p>\n<p>GenAI is also being used to enhance threat detection. Traditional security systems often rely on signatures\u2014known patterns of malicious activity\u2014to identify threats. The problem? Signatures can only detect what they already know, making them useless against new, unknown threats. Enter AI, which can analyze behaviors rather than just signatures, allowing it to identify anomalies that might indicate a cyberattack in progress, even if it\u2019s something the system has never seen before.<\/p>\n<p>And let\u2019s not forget about response times. In the high-stakes world of cybersecurity, every second counts. AI-powered systems can respond to threats in real-time, automatically shutting down attacks as they happen and minimizing damage. It\u2019s the digital equivalent of having an elite SWAT team on standby, ready to storm in and neutralize the threat before anyone even realizes there\u2019s a problem.<\/p>\n<h2>IT Security Compliance: Playing Catch-Up<\/h2>\n<p>With all this innovation in the cybersecurity landscape, you might think that IT security compliance standards would be sprinting to keep up. Unfortunately, it\u2019s more of a brisk walk. Compliance frameworks, by nature, <a href=\"https:\/\/www.portnox.com\/blog\/iot-security\/security-compliance-conundrum-iot-hybrid-work-ai\/\" target=\"_blank\" rel=\"noopener\">tend to be reactive rather than proactive<\/a>. They\u2019re the rules and regulations designed to ensure that organizations maintain a certain level of security, often dictated by what\u2019s come before rather than what\u2019s coming next.<\/p>\n<p>However, the rise of GenAI is forcing a reevaluation. Compliance standards are beginning to recognize that traditional check-the-box approaches are no longer sufficient. It\u2019s not enough to have firewalls, antivirus software, and regular updates. Organizations now need to demonstrate that they\u2019re using advanced, AI-driven tools to proactively identify and mitigate risks.<\/p>\n<p>Moreover, compliance is increasingly focusing on data governance\u2014how organizations manage and protect the data they collect. With GenAI capable of analyzing and generating data on an unprecedented scale, the potential for misuse is staggering. New regulations are emerging that require organizations to not only secure their data but to do so in ways that account for the unique challenges posed by AI technologies.<\/p>\n<p>Another key area where compliance is evolving is in the realm of AI ethics. As organizations deploy their own AI tools, they must ensure that these tools are used responsibly. This includes everything from preventing AI from making biased decisions to ensuring that AI-generated content is accurate and not misleading. In other words, it\u2019s not just about using AI\u2014it\u2019s about using it in a way that\u2019s fair, transparent, and ethical.<\/p>\n<h2>The Road Ahead: Where Do We Go From Here?<\/h2>\n<p>So, where does IT security compliance go from here? If the past few years are any indication, <a href=\"https:\/\/www.crn.com\/news\/security\/2024\/which-side-wins-with-gena-cybercrime-or-cyberdefense\" target=\"_blank\" rel=\"noopener\">we\u2019re in for a wild ride<\/a>.<\/p>\n<p>First, we can expect to see more dynamic and flexible compliance standards. Instead of rigid rules that are updated every few years, we\u2019ll likely see frameworks that are designed to evolve in real-time, incorporating the latest AI technologies and threat intelligence as they emerge. This will require closer collaboration between regulatory bodies, cybersecurity experts, and organizations themselves.<\/p>\n<p>Second, we\u2019ll see a greater emphasis on continuous monitoring and assessment. Rather than relying on periodic audits, organizations will need to demonstrate ongoing compliance through real-time reporting and automated assessments. This is where AI can once again play a key role, enabling continuous monitoring of systems and generating compliance reports automatically.<\/p>\n<p>Finally, as AI continues to evolve, we\u2019ll likely see new forms of compliance emerge that focus specifically on AI governance. This could include everything from ensuring that AI systems are transparent and explainable to implementing safeguards that prevent AI from being used for malicious purposes. In essence, we\u2019ll need compliance frameworks that are as smart and adaptive as the AI technologies they\u2019re designed to regulate.<\/p>\n<h2>Welcome to the AI-Powered IT Security Compliance Future<\/h2>\n<p>The integration of GenAI into both cybercriminal tactics and cybersecurity defenses marks a new chapter in the ongoing battle between good and evil in the digital realm. While the challenges are significant, so too are the opportunities. As IT security compliance evolves to meet these new realities, organizations will need to be more agile, more proactive, and more innovative than ever before.<\/p>\n<p>So, buckle up. The future of IT security compliance is going to be anything but boring. And if nothing else, it\u2019s a great excuse to finally upgrade that ancient firewall. After all, in the age of AI, you never know when a deepfake CEO might drop by with some \u201curgent\u201d instructions.<\/p>\n\t<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2004c86 elementor-widget elementor-widget-shortcode\" data-id=\"2004c86\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18148\" class=\"elementor elementor-18148\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5420368 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"5420368\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c976b64\" data-id=\"c976b64\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-24257f7 elementor-widget elementor-widget-text-editor\" data-id=\"24257f7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About Portnox<\/strong><br \/>Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit <a href=\"http:\/\/www.portnox.com\" rel=\"nofollow\">http:\/\/www.portnox.com<\/a>, and follow us on Twitter and LinkedIn.\u3002<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Just when we thought we had seen it all\u2014from phishing s [&hellip;]<\/p>","protected":false},"author":149011790,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1273,424,61],"tags":[1272,352,423],"class_list":["post-86731","post","type-post","status-publish","format-standard","hentry","category-1273","category-portnox","category-press-release","tag-1272","tag-network","tag-portnox"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The Evolution of IT Security Compliance in the Age of GenAI - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.portnox.com\/blog\/compliance-regulations\/the-evolution-of-it-security-compliance-in-the-age-of-genai\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Evolution of IT Security Compliance in the Age of GenAI - Version 2\" \/>\n<meta property=\"og:description\" content=\"Just when we thought we had seen it all\u2014from phishing s [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.portnox.com\/blog\/compliance-regulations\/the-evolution-of-it-security-compliance-in-the-age-of-genai\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2024-09-04T09:02:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.portnox.com\/wp-content\/uploads\/2024\/08\/it-security-compliance-tile.png\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/compliance-regulations\\\/the-evolution-of-it-security-compliance-in-the-age-of-genai\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/09\\\/the-evolution-of-it-security-compliance-in-the-age-of-genai\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"The Evolution of IT Security Compliance in the Age of GenAI\",\"datePublished\":\"2024-09-04T09:02:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/09\\\/the-evolution-of-it-security-compliance-in-the-age-of-genai\\\/\"},\"wordCount\":1187,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/compliance-regulations\\\/the-evolution-of-it-security-compliance-in-the-age-of-genai\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.portnox.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/it-security-compliance-tile.png\",\"keywords\":[\"2024\",\"Network\",\"Portnox\"],\"articleSection\":[\"2024\",\"Portnox\",\"Press Release\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/09\\\/the-evolution-of-it-security-compliance-in-the-age-of-genai\\\/\",\"url\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/compliance-regulations\\\/the-evolution-of-it-security-compliance-in-the-age-of-genai\\\/\",\"name\":\"The Evolution of IT Security Compliance in the Age of GenAI - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/compliance-regulations\\\/the-evolution-of-it-security-compliance-in-the-age-of-genai\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/compliance-regulations\\\/the-evolution-of-it-security-compliance-in-the-age-of-genai\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.portnox.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/it-security-compliance-tile.png\",\"datePublished\":\"2024-09-04T09:02:49+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/compliance-regulations\\\/the-evolution-of-it-security-compliance-in-the-age-of-genai\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.portnox.com\\\/blog\\\/compliance-regulations\\\/the-evolution-of-it-security-compliance-in-the-age-of-genai\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/compliance-regulations\\\/the-evolution-of-it-security-compliance-in-the-age-of-genai\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.portnox.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/it-security-compliance-tile.png\",\"contentUrl\":\"https:\\\/\\\/www.portnox.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/it-security-compliance-tile.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/compliance-regulations\\\/the-evolution-of-it-security-compliance-in-the-age-of-genai\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Evolution of IT Security Compliance in the Age of GenAI\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/en\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Evolution of IT Security Compliance in the Age of GenAI - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.portnox.com\/blog\/compliance-regulations\/the-evolution-of-it-security-compliance-in-the-age-of-genai\/","og_locale":"en_US","og_type":"article","og_title":"The Evolution of IT Security Compliance in the Age of GenAI - Version 2","og_description":"Just when we thought we had seen it all\u2014from phishing s [&hellip;]","og_url":"https:\/\/www.portnox.com\/blog\/compliance-regulations\/the-evolution-of-it-security-compliance-in-the-age-of-genai\/","og_site_name":"Version 2","article_published_time":"2024-09-04T09:02:49+00:00","og_image":[{"url":"https:\/\/www.portnox.com\/wp-content\/uploads\/2024\/08\/it-security-compliance-tile.png","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"Written by":"tracylamv2","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.portnox.com\/blog\/compliance-regulations\/the-evolution-of-it-security-compliance-in-the-age-of-genai\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2024\/09\/the-evolution-of-it-security-compliance-in-the-age-of-genai\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"The Evolution of IT Security Compliance in the Age of GenAI","datePublished":"2024-09-04T09:02:49+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2024\/09\/the-evolution-of-it-security-compliance-in-the-age-of-genai\/"},"wordCount":1187,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/www.portnox.com\/blog\/compliance-regulations\/the-evolution-of-it-security-compliance-in-the-age-of-genai\/#primaryimage"},"thumbnailUrl":"https:\/\/www.portnox.com\/wp-content\/uploads\/2024\/08\/it-security-compliance-tile.png","keywords":["2024","Network","Portnox"],"articleSection":["2024","Portnox","Press Release"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2024\/09\/the-evolution-of-it-security-compliance-in-the-age-of-genai\/","url":"https:\/\/www.portnox.com\/blog\/compliance-regulations\/the-evolution-of-it-security-compliance-in-the-age-of-genai\/","name":"The Evolution of IT Security Compliance in the Age of GenAI - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.portnox.com\/blog\/compliance-regulations\/the-evolution-of-it-security-compliance-in-the-age-of-genai\/#primaryimage"},"image":{"@id":"https:\/\/www.portnox.com\/blog\/compliance-regulations\/the-evolution-of-it-security-compliance-in-the-age-of-genai\/#primaryimage"},"thumbnailUrl":"https:\/\/www.portnox.com\/wp-content\/uploads\/2024\/08\/it-security-compliance-tile.png","datePublished":"2024-09-04T09:02:49+00:00","breadcrumb":{"@id":"https:\/\/www.portnox.com\/blog\/compliance-regulations\/the-evolution-of-it-security-compliance-in-the-age-of-genai\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.portnox.com\/blog\/compliance-regulations\/the-evolution-of-it-security-compliance-in-the-age-of-genai\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.portnox.com\/blog\/compliance-regulations\/the-evolution-of-it-security-compliance-in-the-age-of-genai\/#primaryimage","url":"https:\/\/www.portnox.com\/wp-content\/uploads\/2024\/08\/it-security-compliance-tile.png","contentUrl":"https:\/\/www.portnox.com\/wp-content\/uploads\/2024\/08\/it-security-compliance-tile.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.portnox.com\/blog\/compliance-regulations\/the-evolution-of-it-security-compliance-in-the-age-of-genai\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"The Evolution of IT Security Compliance in the Age of GenAI"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/en\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-myT","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/86731","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/comments?post=86731"}],"version-history":[{"count":4,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/86731\/revisions"}],"predecessor-version":[{"id":86735,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/86731\/revisions\/86735"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/media?parent=86731"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/categories?post=86731"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/tags?post=86731"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}