In this episode of "Cybersecurity Unplugged," Chris "Tito" Sestito discusses technology to protect neural networks and artificial intelligence and machine-learning models, and John Kindervag explains how such technology fits into the zero trust framework.
Optiv has gone beyond examining log data and classic managed security services work to pursue threats across a broader swath of structured and unstructured data. The company has focused on finding threats outside of a log environment by examining system-to-system interfaces and transactional data.
Healthcare workers should think twice about using AI tools such as ChatGPT as productivity boosters, privacy experts warned after a Florida doctor publicized on TikTok how he had used one to write a letter to an insurer arguing for patient coverage. What are the risks?
Technology implementations should be paired with a thought process of prioritizing automation, innovation and continuous improvement. Eliminating passwords and implementing AI/ML at the front end can reduce risks from human carelessness, says Nikhil Chawla of Colgate Global Business Services.
Low-level hackers are probing the capacity of ChatGPT to generate scripts that could be used toward criminal ends, such as for stealing files or malicious encryption. One poster on a hacking forum described the process as writing pseudo-code. More sophisticated cases are likely a matter of time.
In this episode of "Cybersecurity Unplugged," Liran Paul Hason, co-founder and CEO of Aporia, discusses the current state of machine learning and artificial intelligence in cybersecurity and the most interesting and promising applications for these technologies right now.
ChatGPT, an AI-based chatbot that specializes in dialogue, is raising concern among security professionals about how criminals could use cheap, accessible natural language AI to write convincing phishing emails and pull off nefarious deepfake scams. Peter Cassidy discusses the implications.
Anything that can write a software code can also write malware. The latest AI technology can do it in seconds. Even worse, it could open the door to rapid innovation for hackers with little or no technical skills or help them overcome language barriers to writing the perfect phishing email.
Businesses should capitalize on AI, ML and robotic process automation to address every event rather than just ignoring the ones deemed unimportant by a SIEM. Palo Alto Networks founder and CTO Nir Zuk says AI can be used to probe security incidents in real time rather than waiting for a breach.
Digital transformation, the accelerated speed of attacks and the growth of data are some of the biggest factors that have pushed organizations to realize the importance of security automation, regardless of industry.
Automation, coupled with the advantages of AI and Machine Learning, helps security teams to detect...
This report dives deep into the modern endpoint detection and response (EDR) platform that is driven by artificial intelligence/machine learning for security effectiveness.
Download this report and learn more about:
Advanced automated threat detection and response capabilities, with no need for human...
"Who here thinks your network or environment will become more complex next year?" a cybersecurity veteran asked the audience at Black Hat Europe this week in London. As attackers' capabilities continue to improve, Jeff Moss said defenders must learn to succeed or fail faster.
Open Systems has purchased an early-stage Microsoft-centric MSSP to help automate investigating, triaging and responding to basic security alerts. The Silicon Valley-based MDR provider says its acquisition of U.K.-based Tiberium will free up security analysts to focus on preventative defenses.
In India, ransomware attacks, phishing, botnets and nation-state attacks - including attacks on supply chains and critical infrastructure - are all on the rise. Plus, there's a huge cybersecurity skills gap. Terence Gomes of Microsoft in India discusses how the company addresses these issues.
Perennial leaders ForgeRock, Ping Identity and IBM, along with a surging Okta, set themselves apart from the pack of CIAM vendors in the latest report by KuppingerCole analysts. Ping Identity leapfrogged ForgeRock to capture the gold in product leadership, and IBM once again took the bronze.