{"id":2858,"date":"2023-04-30T10:12:30","date_gmt":"2023-04-30T10:12:30","guid":{"rendered":"https:\/\/mpelembe.net\/?p=2858"},"modified":"2023-04-30T10:15:58","modified_gmt":"2023-04-30T10:15:58","slug":"if-code-could-be-generated-why-cant-it-generate-security-controls","status":"publish","type":"post","link":"https:\/\/mpelembe.net\/index.php\/if-code-could-be-generated-why-cant-it-generate-security-controls\/","title":{"rendered":"If code could be generated, why can\u2019t it generate security controls?"},"content":{"rendered":"<div class=\"chat-history-scroll-container ng-tns-c1398032670-1 show-bottom-shadow ng-trigger ng-trigger-resetChat ng-animate-disabled\">\n<div class=\"chat-history ng-tns-c1398032670-1 ng-star-inserted\">\n<div class=\"conversation-container ng-tns-c1398032670-1 ng-star-inserted\">\n<div class=\"response-container response-container-has-multiple-responses ng-star-inserted response-container-small-bottom\">\n<div class=\"presented-response-container\">\n<div class=\"response-container-content\">\n<div class=\"model-with-gutter\">\n<p>April 30, 2023 \/Technology\/ &#8212; As generative AI continues to develop, it is likely that we will see even more innovative and effective ways to use this technology to protect our data and our systems. By creating predictive models, generating simulated environments, and analyzing large volumes of data, generative AI can help identify and respond to threats before they cause damage. Generative AI has enormous potential to transform cybersecurity, including cloud, device, and even home security systems.<!--more--><\/p>\n<p>Sec-PaLM is a generative AI model that is fine-tuned for security use cases. It is powered by Google Cloud Security AI Workbench, an industry-first extensible platform that provides businesses with a suite of tools to help them address their security challenges. Sec-PaLM can be used to perform a variety of security tasks, including:<!--more--><\/p>\n<ul>\n<li><strong>Identifying and analyzing threats:<\/strong>\u00a0Sec-PaLM can be used to identify and analyze threats by analyzing large volumes of data, including security logs, threat intelligence reports, and social media posts. This information can be used to identify potential threats and to develop mitigation strategies.<\/li>\n<li><strong>Investigating security incidents:<\/strong>\u00a0Sec-PaLM can be used to investigate security incidents by analyzing data from security logs, network traffic, and endpoint devices. This information can be used to identify the source of the attack and to develop a plan to remediate the incident.<\/li>\n<li><strong>Responding to security breaches:<\/strong>\u00a0Sec-PaLM can be used to respond to security breaches by analyzing data from security logs, network traffic, and endpoint devices. This information can be used to identify the extent of the breach and to develop a plan to contain the breach and to recover from the damage.<\/li>\n<li><strong>Developing and deploying security controls:<\/strong>\u00a0Sec-PaLM can be used to develop and deploy security controls by analyzing data from security logs, network traffic, and endpoint devices. This information can be used to identify security gaps and to develop security controls that can mitigate these gaps.<\/li>\n<li><strong>Improving security compliance:<\/strong>\u00a0Sec-PaLM can be used to improve security compliance by analyzing data from security logs, network traffic, and endpoint devices. This information can be used to identify areas where security compliance is lacking and to develop plans to improve compliance.<\/li>\n<\/ul>\n<p>Sec-PaLM is a powerful tool that can help businesses to improve their security posture. It is still under development, but it has the potential to revolutionize the way that businesses think about security.<\/p>\n<p>Start-prompt can be used to engineer a security use case on this platform while keeping their data as their data. Here are the steps involved:<\/p>\n<ol>\n<li>The user provides Start-prompt with a description of the security use case. This description can be in the form of natural language, code, or a combination of both.<\/li>\n<li>Start-prompt uses its knowledge of security engineering to generate a set of security controls that meet the requirements of the use case.<\/li>\n<li>The user reviews the security controls and makes any necessary changes.<\/li>\n<li>The user deploys the security controls to their environment.<\/li>\n<\/ol>\n<p>Start-prompt can generate security controls because it has been trained on a massive dataset of security-related information. This dataset includes security policies, security best practices, and security controls. Start-prompt uses this information to generate security controls that are tailored to the specific needs of the user.<\/p>\n<p>It is important to note that Start-prompt is not a replacement for security professionals. Security professionals have the knowledge and experience to assess the security risks of a particular environment and to develop appropriate security controls. Start-prompt can be a valuable tool for security professionals, but it should not be used as a substitute for their expertise.<\/p>\n<p>Here are some of the benefits of using Start-prompt to engineer security use cases:<\/p>\n<ul>\n<li>It can help to save time and money. Security professionals can use Start-prompt to generate security controls quickly and easily. This can free up their time to focus on other tasks, such as assessing security risks and developing security policies.<\/li>\n<li>It can help to improve the quality of security controls. Start-prompt is trained on a massive dataset of security-related information. This information helps to ensure that the security controls that it generates are up-to-date and effective.<\/li>\n<li>It can help to improve security compliance. Start-prompt can be used to generate security controls that meet the requirements of various security standards. This can help organizations to demonstrate that they are in compliance with these standards.<\/li>\n<\/ul>\n<p class=\"markdown\">Overall, Start-prompt is a valuable tool that can be used to engineer security use cases. It can help to save time, improve the quality of security controls, and improve security compliance.<\/p>\n<p class=\"markdown\">S<span style=\"font-family: Bitter, Georgia, serif; font-size: 22px;\">earch related topics<\/span><\/p>\n<p class=\"markdown\"><a class=\"factuality-link mdc-button mat-mdc-button mat-primary gmat-mdc-button-with-prefix mat-mdc-button-base gmat-mdc-button ng-star-inserted\" href=\"https:\/\/cse.google.com\/cse?cx=904a948de889c47dc#gsc.tab=0&amp;gsc.q=Sec-PaLM\" target=\"_blank\" rel=\"noopener noreferrer\" aria-disabled=\"false\"><span class=\"mdc-button__label\">Sec-PaLM<\/span><\/a><br \/>\n<a class=\"factuality-link mdc-button mat-mdc-button mat-primary gmat-mdc-button-with-prefix mat-mdc-button-base gmat-mdc-button ng-star-inserted\" href=\"https:\/\/cse.google.com\/cse?cx=904a948de889c47dc#gsc.tab=0&amp;gsc.q=How%20Security%20AI%20Workbench%20helps%20in%20cybersecurity\" target=\"_blank\" rel=\"noopener noreferrer\" aria-disabled=\"false\"><span class=\"mdc-button__label\">How Security AI Workbench helps in cybersecurity<\/span><\/a><br \/>\n<a class=\"factuality-link mdc-button mat-mdc-button mat-primary gmat-mdc-button-with-prefix mat-mdc-button-base gmat-mdc-button ng-star-inserted\" href=\"https:\/\/cse.google.com\/cse?cx=904a948de889c47dc#gsc.tab=0&amp;gsc.q=What%20role%20can%20artificial%20intelligence%20AI%20play%20in%20cybersecurity%3F\" target=\"_blank\" rel=\"noopener noreferrer\" aria-disabled=\"false\"><span class=\"mdc-button__label\">What role can artificial intelligence AI play in cybersecurity?<\/span><\/a><\/p>\n<div class=\"input-area-container ng-tns-c1398032670-1\">\n<div class=\"input-area ng-tns-c3407578184-2\">\n<div class=\"mat-mdc-text-field-wrapper mdc-text-field ng-tns-c4052629296-3 mdc-text-field--outlined mdc-text-field--no-label\">\n<div class=\"mat-mdc-form-field-flex ng-tns-c4052629296-3\">\n<div class=\"mdc-notched-outline ng-tns-c4052629296-3 mdc-notched-outline--no-label ng-star-inserted\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"input-area-container ng-tns-c1398032670-1\">\n<div class=\"input-area ng-tns-c3407578184-2\">\n<div class=\"mat-mdc-text-field-wrapper mdc-text-field ng-tns-c4052629296-3 mdc-text-field--outlined mdc-text-field--no-label\">\n<div class=\"mat-mdc-form-field-flex ng-tns-c4052629296-3\">\n<div class=\"mdc-notched-outline ng-tns-c4052629296-3 mdc-notched-outline--no-label ng-star-inserted\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>April 30, 2023 \/Technology\/ &#8212; As generative AI continues to develop, it is likely that we will see even more innovative and effective ways<a class=\"moretag\" href=\"https:\/\/mpelembe.net\/index.php\/if-code-could-be-generated-why-cant-it-generate-security-controls\/\">Read More&#8230;<\/a><\/p>\n","protected":false},"author":1,"featured_media":2859,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"googlesitekit_rrm_CAowu7GVCw:productID":"","_crdt_document":"","activitypub_content_warning":"","activitypub_content_visibility":"","activitypub_max_image_attachments":3,"activitypub_interaction_policy_quote":"anyone","activitypub_status":"","footnotes":""},"categories":[43],"tags":[6648,2144,2146,1404,2246,6647,6645,6649,1406,1401,1407,2143,1246],"class_list":["post-2858","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","tag-cloud-computing-security","tag-computer-network-security","tag-computer-security","tag-crime-prevention","tag-data-security","tag-database-security","tag-information-security","tag-loglogic","tag-national-security","tag-prevention","tag-security","tag-security-engineering","tag-washington"],"featured_image_src":"https:\/\/mpelembe.net\/wp-content\/uploads\/2023\/04\/Cybersecurity-Generative-AI-.png","blog_images":{"medium":"https:\/\/mpelembe.net\/wp-content\/uploads\/2023\/04\/Cybersecurity-Generative-AI--300x269.png","large":"https:\/\/mpelembe.net\/wp-content\/uploads\/2023\/04\/Cybersecurity-Generative-AI-.png"},"ams_acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>If code could be generated, why can\u2019t it generate security controls? - Mpelembe Network<\/title>\n<meta name=\"description\" content=\"Generative AI has enormous potential to transform cybersecurity, including cloud, device, and even home security systems.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/mpelembe.net\/index.php\/if-code-could-be-generated-why-cant-it-generate-security-controls\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"If code could be generated, why can\u2019t it generate security controls? - Mpelembe Network\" \/>\n<meta property=\"og:description\" content=\"Generative AI has enormous potential to transform cybersecurity, including cloud, device, and even home security systems.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/mpelembe.net\/index.php\/if-code-could-be-generated-why-cant-it-generate-security-controls\/\" \/>\n<meta property=\"og:site_name\" content=\"Mpelembe Network\" \/>\n<meta property=\"article:published_time\" content=\"2023-04-30T10:12:30+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-04-30T10:15:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/mpelembe.net\/wp-content\/uploads\/2023\/04\/Cybersecurity-Generative-AI-.png\" \/>\n\t<meta property=\"og:image:width\" content=\"723\" \/>\n\t<meta property=\"og:image:height\" content=\"648\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/mpelembe.net\\\/index.php\\\/if-code-could-be-generated-why-cant-it-generate-security-controls\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/mpelembe.net\\\/index.php\\\/if-code-could-be-generated-why-cant-it-generate-security-controls\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/mpelembe.net\\\/#\\\/schema\\\/person\\\/2421ebbf3150931b1066b10a196d7608\"},\"headline\":\"If code could be generated, why can\u2019t it generate security controls?\",\"datePublished\":\"2023-04-30T10:12:30+00:00\",\"dateModified\":\"2023-04-30T10:15:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/mpelembe.net\\\/index.php\\\/if-code-could-be-generated-why-cant-it-generate-security-controls\\\/\"},\"wordCount\":773,\"image\":{\"@id\":\"https:\\\/\\\/mpelembe.net\\\/index.php\\\/if-code-could-be-generated-why-cant-it-generate-security-controls\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/mpelembe.net\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/Cybersecurity-Generative-AI-.png\",\"keywords\":[\"Cloud computing security\",\"Computer network security\",\"Computer security\",\"Crime prevention\",\"Data security\",\"Database security\",\"Information security\",\"LogLogic\",\"National security\",\"Prevention\",\"Security\",\"Security engineering\",\"Washington\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/mpelembe.net\\\/index.php\\\/if-code-could-be-generated-why-cant-it-generate-security-controls\\\/\",\"url\":\"https:\\\/\\\/mpelembe.net\\\/index.php\\\/if-code-could-be-generated-why-cant-it-generate-security-controls\\\/\",\"name\":\"If code could be generated, why can\u2019t it generate security controls? - Mpelembe Network\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/mpelembe.net\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/mpelembe.net\\\/index.php\\\/if-code-could-be-generated-why-cant-it-generate-security-controls\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/mpelembe.net\\\/index.php\\\/if-code-could-be-generated-why-cant-it-generate-security-controls\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/mpelembe.net\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/Cybersecurity-Generative-AI-.png\",\"datePublished\":\"2023-04-30T10:12:30+00:00\",\"dateModified\":\"2023-04-30T10:15:58+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/mpelembe.net\\\/#\\\/schema\\\/person\\\/2421ebbf3150931b1066b10a196d7608\"},\"description\":\"Generative AI has enormous potential to transform cybersecurity, including cloud, device, and even home security systems.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/mpelembe.net\\\/index.php\\\/if-code-could-be-generated-why-cant-it-generate-security-controls\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/mpelembe.net\\\/index.php\\\/if-code-could-be-generated-why-cant-it-generate-security-controls\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/mpelembe.net\\\/index.php\\\/if-code-could-be-generated-why-cant-it-generate-security-controls\\\/#primaryimage\",\"url\":\"https:\\\/\\\/mpelembe.net\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/Cybersecurity-Generative-AI-.png\",\"contentUrl\":\"https:\\\/\\\/mpelembe.net\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/Cybersecurity-Generative-AI-.png\",\"width\":723,\"height\":648},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/mpelembe.net\\\/index.php\\\/if-code-could-be-generated-why-cant-it-generate-security-controls\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/mpelembe.net\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"If code could be generated, why can\u2019t it generate security controls?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/mpelembe.net\\\/#website\",\"url\":\"https:\\\/\\\/mpelembe.net\\\/\",\"name\":\"Mpelembe Network\",\"description\":\"Collaboration Platform\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/mpelembe.net\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/mpelembe.net\\\/#\\\/schema\\\/person\\\/2421ebbf3150931b1066b10a196d7608\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c66a2765397adfb52418f6f2310640167a0af23ce662da1b68c8a0b8650de556?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c66a2765397adfb52418f6f2310640167a0af23ce662da1b68c8a0b8650de556?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c66a2765397adfb52418f6f2310640167a0af23ce662da1b68c8a0b8650de556?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/mpelembe.net\"],\"url\":\"https:\\\/\\\/mpelembe.net\\\/index.php\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"If code could be generated, why can\u2019t it generate security controls? - Mpelembe Network","description":"Generative AI has enormous potential to transform cybersecurity, including cloud, device, and even home security systems.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/mpelembe.net\/index.php\/if-code-could-be-generated-why-cant-it-generate-security-controls\/","og_locale":"en_US","og_type":"article","og_title":"If code could be generated, why can\u2019t it generate security controls? - Mpelembe Network","og_description":"Generative AI has enormous potential to transform cybersecurity, including cloud, device, and even home security systems.","og_url":"https:\/\/mpelembe.net\/index.php\/if-code-could-be-generated-why-cant-it-generate-security-controls\/","og_site_name":"Mpelembe Network","article_published_time":"2023-04-30T10:12:30+00:00","article_modified_time":"2023-04-30T10:15:58+00:00","og_image":[{"width":723,"height":648,"url":"https:\/\/mpelembe.net\/wp-content\/uploads\/2023\/04\/Cybersecurity-Generative-AI-.png","type":"image\/png"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/mpelembe.net\/index.php\/if-code-could-be-generated-why-cant-it-generate-security-controls\/#article","isPartOf":{"@id":"https:\/\/mpelembe.net\/index.php\/if-code-could-be-generated-why-cant-it-generate-security-controls\/"},"author":{"name":"admin","@id":"https:\/\/mpelembe.net\/#\/schema\/person\/2421ebbf3150931b1066b10a196d7608"},"headline":"If code could be generated, why can\u2019t it generate security controls?","datePublished":"2023-04-30T10:12:30+00:00","dateModified":"2023-04-30T10:15:58+00:00","mainEntityOfPage":{"@id":"https:\/\/mpelembe.net\/index.php\/if-code-could-be-generated-why-cant-it-generate-security-controls\/"},"wordCount":773,"image":{"@id":"https:\/\/mpelembe.net\/index.php\/if-code-could-be-generated-why-cant-it-generate-security-controls\/#primaryimage"},"thumbnailUrl":"https:\/\/mpelembe.net\/wp-content\/uploads\/2023\/04\/Cybersecurity-Generative-AI-.png","keywords":["Cloud computing security","Computer network security","Computer security","Crime prevention","Data security","Database security","Information security","LogLogic","National security","Prevention","Security","Security engineering","Washington"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/mpelembe.net\/index.php\/if-code-could-be-generated-why-cant-it-generate-security-controls\/","url":"https:\/\/mpelembe.net\/index.php\/if-code-could-be-generated-why-cant-it-generate-security-controls\/","name":"If code could be generated, why can\u2019t it generate security controls? - Mpelembe Network","isPartOf":{"@id":"https:\/\/mpelembe.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/mpelembe.net\/index.php\/if-code-could-be-generated-why-cant-it-generate-security-controls\/#primaryimage"},"image":{"@id":"https:\/\/mpelembe.net\/index.php\/if-code-could-be-generated-why-cant-it-generate-security-controls\/#primaryimage"},"thumbnailUrl":"https:\/\/mpelembe.net\/wp-content\/uploads\/2023\/04\/Cybersecurity-Generative-AI-.png","datePublished":"2023-04-30T10:12:30+00:00","dateModified":"2023-04-30T10:15:58+00:00","author":{"@id":"https:\/\/mpelembe.net\/#\/schema\/person\/2421ebbf3150931b1066b10a196d7608"},"description":"Generative AI has enormous potential to transform cybersecurity, including cloud, device, and even home security systems.","breadcrumb":{"@id":"https:\/\/mpelembe.net\/index.php\/if-code-could-be-generated-why-cant-it-generate-security-controls\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/mpelembe.net\/index.php\/if-code-could-be-generated-why-cant-it-generate-security-controls\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mpelembe.net\/index.php\/if-code-could-be-generated-why-cant-it-generate-security-controls\/#primaryimage","url":"https:\/\/mpelembe.net\/wp-content\/uploads\/2023\/04\/Cybersecurity-Generative-AI-.png","contentUrl":"https:\/\/mpelembe.net\/wp-content\/uploads\/2023\/04\/Cybersecurity-Generative-AI-.png","width":723,"height":648},{"@type":"BreadcrumbList","@id":"https:\/\/mpelembe.net\/index.php\/if-code-could-be-generated-why-cant-it-generate-security-controls\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/mpelembe.net\/"},{"@type":"ListItem","position":2,"name":"If code could be generated, why can\u2019t it generate security controls?"}]},{"@type":"WebSite","@id":"https:\/\/mpelembe.net\/#website","url":"https:\/\/mpelembe.net\/","name":"Mpelembe Network","description":"Collaboration Platform","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/mpelembe.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/mpelembe.net\/#\/schema\/person\/2421ebbf3150931b1066b10a196d7608","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/c66a2765397adfb52418f6f2310640167a0af23ce662da1b68c8a0b8650de556?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c66a2765397adfb52418f6f2310640167a0af23ce662da1b68c8a0b8650de556?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c66a2765397adfb52418f6f2310640167a0af23ce662da1b68c8a0b8650de556?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/mpelembe.net"],"url":"https:\/\/mpelembe.net\/index.php\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/mpelembe.net\/index.php\/wp-json\/wp\/v2\/posts\/2858","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mpelembe.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mpelembe.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mpelembe.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mpelembe.net\/index.php\/wp-json\/wp\/v2\/comments?post=2858"}],"version-history":[{"count":4,"href":"https:\/\/mpelembe.net\/index.php\/wp-json\/wp\/v2\/posts\/2858\/revisions"}],"predecessor-version":[{"id":2863,"href":"https:\/\/mpelembe.net\/index.php\/wp-json\/wp\/v2\/posts\/2858\/revisions\/2863"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mpelembe.net\/index.php\/wp-json\/wp\/v2\/media\/2859"}],"wp:attachment":[{"href":"https:\/\/mpelembe.net\/index.php\/wp-json\/wp\/v2\/media?parent=2858"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mpelembe.net\/index.php\/wp-json\/wp\/v2\/categories?post=2858"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mpelembe.net\/index.php\/wp-json\/wp\/v2\/tags?post=2858"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}