{"id":15,"date":"2024-04-18T13:16:58","date_gmt":"2024-04-18T17:16:58","guid":{"rendered":"https:\/\/community.mis.temple.edu\/sgirase\/blog\/points\/technical-architects-stay-ahead-of-the-top-6-genai-security-risks\/"},"modified":"2024-04-18T13:16:58","modified_gmt":"2024-04-18T17:16:58","slug":"technical-architects-stay-ahead-of-the-top-6-genai-security-risks","status":"publish","type":"points","link":"https:\/\/community.mis.temple.edu\/sgirase\/points\/technical-architects-stay-ahead-of-the-top-6-genai-security-risks\/","title":{"rendered":"Technical Architects, Stay Ahead of the Top 6 GenAI Security Risks"},"content":{"rendered":"<p>This webinar was about how GenAI raises security risks and threats for organizations and what steps technical architects can take to make sure the company can implement GenAI more securely.<\/p>\n","protected":false},"author":30114,"featured_media":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-15","points","type-points","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/sgirase\/wp-json\/wp\/v2\/points\/15","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/sgirase\/wp-json\/wp\/v2\/points"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/sgirase\/wp-json\/wp\/v2\/types\/points"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/sgirase\/wp-json\/wp\/v2\/users\/30114"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/sgirase\/wp-json\/wp\/v2\/comments?post=15"}],"version-history":[{"count":0,"href":"https:\/\/community.mis.temple.edu\/sgirase\/wp-json\/wp\/v2\/points\/15\/revisions"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/sgirase\/wp-json\/wp\/v2\/media?parent=15"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}