{"id":263,"date":"2024-09-17T08:00:00","date_gmt":"2024-09-17T08:00:00","guid":{"rendered":"https:\/\/cybersecurityinfocus.com\/?p=263"},"modified":"2024-09-17T08:00:00","modified_gmt":"2024-09-17T08:00:00","slug":"will-potential-security-gaps-derail-microsofts-copilot","status":"publish","type":"post","link":"https:\/\/cybersecurityinfocus.com\/?p=263","title":{"rendered":"Will potential security gaps derail Microsoft\u2019s Copilot?"},"content":{"rendered":"<div>\n<div class=\"grid grid--cols-10@md grid--cols-8@lg article-column\">\n<div class=\"col-12 col-10@md col-6@lg col-start-3@lg\">\n<div class=\"article-column__content\">\n<div class=\"container\"><\/div>\n<p>Microsoft has bet big on <a href=\"https:\/\/www.computerworld.com\/article\/1629974\/m365-copilot-microsofts-generative-ai-tool-explained.html\">Copilot<\/a>, the generative AI (genAI) assistant it\u2019s integrating into nearly its entire product line, notably <a href=\"https:\/\/www.computerworld.com\/article\/1710782\/office-2021-vs-microsoft-365-office-365-how-to-choose.html\">Microsoft 365<\/a>. The company believes businesses of all sizes will buy into the productivity gains the tool might deliver \u2014 and in so doing, deliver billions of dollars to Microsoft\u2019s bottom line.\u00a0<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Microsoft has bet big on Copilot, the generative AI (genAI) assistant it\u2019s integrating into nearly its entire product line, notably Microsoft 365. The company believes businesses of all sizes will buy into the productivity gains the tool might deliver \u2014 and in so doing, deliver billions of dollars to Microsoft\u2019s bottom line.\u00a0<\/p>\n","protected":false},"author":0,"featured_media":264,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-263","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-education"],"_links":{"self":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/263"}],"collection":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=263"}],"version-history":[{"count":0,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/263\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/media\/264"}],"wp:attachment":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=263"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=263"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=263"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}