{"id":805,"date":"2024-05-01T06:00:00","date_gmt":"2024-05-01T13:00:00","guid":{"rendered":"https:\/\/www.cycognito.com\/blog\/?p=805"},"modified":"2024-05-21T10:59:32","modified_gmt":"2024-05-21T17:59:32","slug":"ai-at-cycognito","status":"publish","type":"post","link":"https:\/\/www.cycognito.com\/blog\/ai-at-cycognito\/","title":{"rendered":"AI at CyCognito"},"content":{"rendered":"\n<p>Since our beginning, <a href=\"\/ai\/\">CyCognito has integrated AI techniques<\/a> to power robust and accurate attack surface discovery and testing. And we\u2019re also adding new capabilities all the time. In this post, we\u2019ll share with you some of the tasks that CyCognito\u2019s AI helps power or simplify, along with a primer of the various techniques we leverage.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What You Can Do with CyCognito\u2019s AI<\/h2>\n\n\n<div class=\"inset pullquote right\" style=\"margin-top: 22px !important;\">\n<h6 class=\"small orange pixel-orange\">Can Humans Keep Up with\u00a0Discovery?<\/h6>\n<p class=\"blurb\">Assuming a human could find all of the information the CyCognito platform does (up to fifty data points per asset, including IP address, name, type, owner, location, included technologies, related assets, known vulnerabilities, and threats), we estimate it would take at least one hour per asset on average for initial discovery and 30 minutes per asset to keep all of the asset metadata up to date.<\/p>\n<p class=\"blurb\">So, one hour per asset, multiplied by a midsized attack surface of 5,000 assets, that&#8217;s 5,000 hours, or over two work-years just for initial discovery. Spending 30 minutes per asset once per year to keep it up to date would add another 2,500 hours &#8211; over one additional work-year. On top of that, company attack surfaces fluctuate by +\/- 10 percent monthly, adding even more hours of initial discovery per year for newly added assets. Lastly, the average attack surface size for an enterprise is 50,000 assets, not 5,000. That\u2019s 30 work-years.<\/p>\n<\/div>\n\n\n<h5 class=\"wp-block-heading\">Discover <strong>All<\/strong> of Your Assets<\/h5>\n\n\n\n<p>CyCognito\u2019s asset discovery process starts with a single data point &#8211; the name of your organization &#8211; and then uses AI to crawl and understand financial databases, news sites and hundreds of websites. The result is a complete view of all of the brands, subsidiaries, joint ventures and other entities related to your organization. Once the organizational structure is understood, our platform populates the model with web applications, services, IP ranges, APIs and more, giving you the full picture of your attack surface.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">Get Full Asset Context<\/h5>\n\n\n\n<p>CyCognito builds context around all of the assets it discovers. Our AI maps each asset to a business unit or brand, and adds details like the type of asset, underlying technology, related applications, and if there is potentially exposed customer data. The riskiness and attractiveness to attackers is also automatically added. Figure 1 below shows how this is displayed in the UI of the CyCognito platform.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1280\" height=\"794\" src=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-48-1280x794.png\" alt=\"\" class=\"wp-image-832\" srcset=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-48-1280x794.png 1280w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-48-512x318.png 512w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-48-768x477.png 768w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-48-1536x953.png 1536w, https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-48.png 1600w\" sizes=\"auto, (max-width: 1280px) 100vw, 1280px\" \/><\/figure><\/div>\n\n\n<p>Figure 1. Acme Corporation, its subsidiaries and their assets after being mapped by AI.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">Classify Assets by Type or Risk<\/h5>\n\n\n\n<p>Assets can be easily organized by type or risk. Our AI classifies assets by examining their API call responses and types of data they store. All of this information is added to the graph.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">Ask Any Question<\/h5>\n\n\n\n<p>Want to see all of your ecommerce servers not protected by a WAF? Just ask: \u201cShow me all ecommerce servers not protected by a WAF.\u201d Our AI language processing allows you to ask almost any question about what you own and if it\u2019s at risk without using a specialized query language.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">Automatically Configure Tests<\/h5>\n\n\n\n<p>No more time consuming test configuration. Our AI understands the type of assets you own and automatically configures the test engine to run the proper test types with the right payloads. These varying tests run across thousands of assets and take into account business context, technology type, potential threats, issue types and applicable compliance regime.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">AI Techniques CyCognito Uses<\/h2>\n\n\n\n<p>CyCognito uses a number of AI techniques and technologies to create high-precision discovery and testing. Let\u2019s look at some of them and how they are applied in the platform.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">Bayesian Machine Learning<\/h5>\n\n\n\n<p>Bayesian Machine Learning (BML) combines statistical inference with machine learning. BML allows learning to evolve with the accumulation of evidence. While traditional machine learning excels with abundant data, BML shines when the data is sparse, yet the model is complex, as is the case with attack surfaces. CyCognito uses BML to structure graph data models and test hypotheses around asset ownership and type.&nbsp;<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">Generative Pre-trained Transformers<\/h5>\n\n\n\n<p>Generative Pre-trained Transformers (GPT) are large-scale machine learning models trained to generate text based on the input received. These models <em>generate<\/em> new information from data on which they were<em> pre-trained<\/em> and <em>transform<\/em> relationships into new content. CyCognito uses GPT to summarize the relationship between organizations or entities and to create answers to user search queries.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">Generative AI<\/h5>\n\n\n\n<p>Generative AI (GenAI) is a branch of artificial intelligence focused on creating new content, whether it&#8217;s text, images, or other media. It employs generative models that learn from existing data to produce novel outputs that mirror the characteristics of the training data. Popular models include Bard, Claude and GPT. CyCognito uses GPT-3.5\/4 to summarize the relationship between organizations or entities, and to create answers to user search queries.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">Graph-based AI<\/h5>\n\n\n\n<p>Graph-based AI (GraphAI) is the practice of using graph data models in conjunction with AI. Graph data models show how data is interlinked, expressing relationships within the data that cannot be communicated using tabular models. Graphs are an excellent tool for inferring relationships and enhancing artificial intelligence by presenting context. CyCognito uses GraphAI to represent assets and their relationships to organizations, people, threats and other technologies.<\/p>\n\n\n\n<figure class=\"wp-block-table aligncenter\"><table><tbody><tr><td rowspan=\"2\"><strong>The Attack Surface<\/strong><\/td><td rowspan=\"2\"><strong>Connections on the Graph<\/strong><\/td><td colspan=\"2\"><strong>Hypotheses<\/strong><\/td><td rowspan=\"2\"><strong>Exploring the Attack Surface<\/strong><\/td><\/tr><tr><td><strong>Creating Hypotheses<\/strong><\/td><td><strong>Fine Tuning Hypotheses<\/strong><\/td><\/tr><tr><td>The attack surface is represented as a graph data model including business entities, IT entities, and cybersecurity entities.<\/td><td>Connections (<em>edges<\/em> in graph lingo) among entities are given confidence scores.&nbsp;They are treated as hypotheses rather than facts.A customer can tune its attack surface confidence threshold.<\/td><td>Hypotheses are generated using various ML techniques, revolving mostly around NLP over multiple data sources.<\/td><td>Hypotheses are fine tuned using both a singular approach to validate the connection (mostly using LLMs) and a graph neighborhood approach where we aim to &#8220;balance&#8221; the graph (using Bayesian ML over the graph data model).<\/td><td>LLMs and GenAI are used to help the customer to explore and analyze the attack surface in the most natural way<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>Table 1. The attack surface is represented as a graph model. Connections are created as hypotheses and then confirmed when a confidence threshold is reached. The graph can then be explored.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">Large Language Models<\/h5>\n\n\n\n<p>Large Language Models (LLMs) are advanced machine learning models trained on vast amounts of textual data, enabling them to understand and generate human-like text across diverse topics and styles. While many machine learning models are designed for tasks ranging from image recognition to game playing, LLMs are specialized for text. This specialization allows them to tackle language-based tasks with a depth and breadth unmatched by smaller models. CyCognito uses LLMs for several tasks, including asset discovery, ownership attribution, data enrichment, and search.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">Natural Language Processing<\/h5>\n\n\n\n<p>Natural Language Processing (NLP) is a subfield of artificial intelligence that focuses on enabling computers to understand, interpret, generate, and respond to human language. Most of us use NLP when digital assistants like Alexa and Siri interpret our voice commands. There are several other subfields, however. Two that are especially useful in cybersecurity are <em>information retrieval<\/em>, which extracts relevant information from a larger dataset, and <em>named entity recognition<\/em>, which identifies particular entities such as names, organizations, and locations within a text. CyCognito uses NLP to understand organizational structure by extracting information from business databases and websites, and then matching entities mentioned within. NLP has a significant performance advantage over LLMs &#8211; milliseconds vs. seconds &#8211; and is a better choice for large scale applications like attack surface discovery.<\/p>\n\n\n\n<p>The development team at CyCognito continues to experiment with new applications of all the techniques about. We\u2019ll have more to talk about on LLMs and GenAI in the near future.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Since its inauguration, CyCognito has integrated AI techniques to power the platform&#8217;s robust and accurate attack surface discovery and testing capabilities. And it continues to add new capabilities all the time. Read the blog post to learn some of the tasks that CyCognito\u2019s AI helps power or simplify and the various techniques it leverages.<\/p>\n","protected":false},"author":10,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[150,11,151,32,77,152],"class_list":["post-805","post","type-post","status-publish","format-standard","hentry","category-product","tag-artificial-intelligence-ai","tag-discovery","tag-risk-contextualization","tag-risk-management","tag-risk-prioritization","tag-search-capabilities"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>AI at CyCognito | CyCognito Blog<\/title>\n<meta name=\"description\" content=\"Since its inauguration, CyCognito has integrated AI techniques to power the platform&#039;s robust and accurate attack surface discovery and testing capabilities. And it continues to add new capabilities all the time. Read the blog post to learn some of the tasks that CyCognito\u2019s AI helps power or simplify and the various techniques it leverages.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cycognito.com\/blog\/ai-at-cycognito\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"AI at CyCognito | CyCognito Blog\" \/>\n<meta property=\"og:description\" content=\"Since its inauguration, CyCognito has integrated AI techniques to power the platform&#039;s robust and accurate attack surface discovery and testing capabilities. And it continues to add new capabilities all the time. Read the blog post to learn some of the tasks that CyCognito\u2019s AI helps power or simplify and the various techniques it leverages.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cycognito.com\/blog\/ai-at-cycognito\/\" \/>\n<meta property=\"og:site_name\" content=\"CyCognito Blog\" \/>\n<meta property=\"article:published_time\" content=\"2024-05-01T13:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-21T17:59:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-48-1280x794.png\" \/>\n<meta name=\"author\" content=\"Tim Matthews\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Tim Matthews\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/ai-at-cycognito\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/ai-at-cycognito\/\"},\"author\":{\"name\":\"Tim Matthews\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/17004ccbc53269f484e688caf8533230\"},\"headline\":\"AI at CyCognito\",\"datePublished\":\"2024-05-01T13:00:00+00:00\",\"dateModified\":\"2024-05-21T17:59:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/ai-at-cycognito\/\"},\"wordCount\":1262,\"publisher\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/ai-at-cycognito\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-48-1280x794.png\",\"keywords\":[\"Artificial Intelligence (AI)\",\"Discovery\",\"Risk Contextualization\",\"Risk Management\",\"Risk Prioritization\",\"Search Capabilities\"],\"articleSection\":[\"Product\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/ai-at-cycognito\/\",\"url\":\"https:\/\/www.cycognito.com\/blog\/ai-at-cycognito\/\",\"name\":\"AI at CyCognito | CyCognito Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/ai-at-cycognito\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/ai-at-cycognito\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-48-1280x794.png\",\"datePublished\":\"2024-05-01T13:00:00+00:00\",\"dateModified\":\"2024-05-21T17:59:32+00:00\",\"description\":\"Since its inauguration, CyCognito has integrated AI techniques to power the platform's robust and accurate attack surface discovery and testing capabilities. And it continues to add new capabilities all the time. Read the blog post to learn some of the tasks that CyCognito\u2019s AI helps power or simplify and the various techniques it leverages.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/ai-at-cycognito\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cycognito.com\/blog\/ai-at-cycognito\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/ai-at-cycognito\/#primaryimage\",\"url\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-48.png\",\"contentUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-48.png\",\"width\":1600,\"height\":993},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/ai-at-cycognito\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cycognito.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"AI at CyCognito\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#website\",\"url\":\"https:\/\/www.cycognito.com\/blog\/\",\"name\":\"Cycognito Blog\",\"description\":\"Research, Product News and Latest Updates\",\"publisher\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cycognito.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\",\"name\":\"Cycognito\",\"url\":\"https:\/\/www.cycognito.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png\",\"contentUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png\",\"width\":1720,\"height\":550,\"caption\":\"Cycognito\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/17004ccbc53269f484e688caf8533230\",\"name\":\"Tim Matthews\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d7b50f723af945532afa09969dd8aa1e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d7b50f723af945532afa09969dd8aa1e?s=96&d=mm&r=g\",\"caption\":\"Tim Matthews\"},\"description\":\"Was Chief Marketing Officer\",\"url\":\"https:\/\/www.cycognito.com\/blog\/author\/tim-matthews\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"AI at CyCognito | CyCognito Blog","description":"Since its inauguration, CyCognito has integrated AI techniques to power the platform's robust and accurate attack surface discovery and testing capabilities. And it continues to add new capabilities all the time. Read the blog post to learn some of the tasks that CyCognito\u2019s AI helps power or simplify and the various techniques it leverages.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cycognito.com\/blog\/ai-at-cycognito\/","og_locale":"en_US","og_type":"article","og_title":"AI at CyCognito | CyCognito Blog","og_description":"Since its inauguration, CyCognito has integrated AI techniques to power the platform's robust and accurate attack surface discovery and testing capabilities. And it continues to add new capabilities all the time. Read the blog post to learn some of the tasks that CyCognito\u2019s AI helps power or simplify and the various techniques it leverages.","og_url":"https:\/\/www.cycognito.com\/blog\/ai-at-cycognito\/","og_site_name":"CyCognito Blog","article_published_time":"2024-05-01T13:00:00+00:00","article_modified_time":"2024-05-21T17:59:32+00:00","og_image":[{"url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-48-1280x794.png","type":"","width":"","height":""}],"author":"Tim Matthews","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Tim Matthews","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cycognito.com\/blog\/ai-at-cycognito\/#article","isPartOf":{"@id":"https:\/\/www.cycognito.com\/blog\/ai-at-cycognito\/"},"author":{"name":"Tim Matthews","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/17004ccbc53269f484e688caf8533230"},"headline":"AI at CyCognito","datePublished":"2024-05-01T13:00:00+00:00","dateModified":"2024-05-21T17:59:32+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cycognito.com\/blog\/ai-at-cycognito\/"},"wordCount":1262,"publisher":{"@id":"https:\/\/www.cycognito.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/ai-at-cycognito\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-48-1280x794.png","keywords":["Artificial Intelligence (AI)","Discovery","Risk Contextualization","Risk Management","Risk Prioritization","Search Capabilities"],"articleSection":["Product"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cycognito.com\/blog\/ai-at-cycognito\/","url":"https:\/\/www.cycognito.com\/blog\/ai-at-cycognito\/","name":"AI at CyCognito | CyCognito Blog","isPartOf":{"@id":"https:\/\/www.cycognito.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cycognito.com\/blog\/ai-at-cycognito\/#primaryimage"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/ai-at-cycognito\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-48-1280x794.png","datePublished":"2024-05-01T13:00:00+00:00","dateModified":"2024-05-21T17:59:32+00:00","description":"Since its inauguration, CyCognito has integrated AI techniques to power the platform's robust and accurate attack surface discovery and testing capabilities. And it continues to add new capabilities all the time. Read the blog post to learn some of the tasks that CyCognito\u2019s AI helps power or simplify and the various techniques it leverages.","breadcrumb":{"@id":"https:\/\/www.cycognito.com\/blog\/ai-at-cycognito\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cycognito.com\/blog\/ai-at-cycognito\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/ai-at-cycognito\/#primaryimage","url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-48.png","contentUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/image-48.png","width":1600,"height":993},{"@type":"BreadcrumbList","@id":"https:\/\/www.cycognito.com\/blog\/ai-at-cycognito\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cycognito.com\/blog\/"},{"@type":"ListItem","position":2,"name":"AI at CyCognito"}]},{"@type":"WebSite","@id":"https:\/\/www.cycognito.com\/blog\/#website","url":"https:\/\/www.cycognito.com\/blog\/","name":"Cycognito Blog","description":"Research, Product News and Latest Updates","publisher":{"@id":"https:\/\/www.cycognito.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cycognito.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cycognito.com\/blog\/#organization","name":"Cycognito","url":"https:\/\/www.cycognito.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png","contentUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png","width":1720,"height":550,"caption":"Cycognito"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/17004ccbc53269f484e688caf8533230","name":"Tim Matthews","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d7b50f723af945532afa09969dd8aa1e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d7b50f723af945532afa09969dd8aa1e?s=96&d=mm&r=g","caption":"Tim Matthews"},"description":"Was Chief Marketing Officer","url":"https:\/\/www.cycognito.com\/blog\/author\/tim-matthews\/"}]}},"_links":{"self":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/805","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/comments?post=805"}],"version-history":[{"count":19,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/805\/revisions"}],"predecessor-version":[{"id":833,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/805\/revisions\/833"}],"wp:attachment":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/media?parent=805"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/categories?post=805"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/tags?post=805"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}