The AI Threat: Deepfake or Deep Fake? Unraveling the True Security Risks

When it comes to adversarial use of AI, the real question is whether the AI threat is a deep fake, or whether the deepfake is the AI threat.
The post The AI Threat: Deepfake or Deep Fake? Unraveling the True Security Risks appeared first on SecurityWeek.
Continue reading The AI Threat: Deepfake or Deep Fake? Unraveling the True Security Risks

UK Data Centers Gain Critical Infrastructure Status, Raising Green Belt Controversy

The designation of UK data centers as Critical National Infrastructure strengthens cyber defenses, but a proposed £3.75B data center on protected Green Belt land sparks debate.
The post UK Data Centers Gain Critical Infrastructure Status, Raising Green… Continue reading UK Data Centers Gain Critical Infrastructure Status, Raising Green Belt Controversy

The AI Convention: Lofty Goals, Legal Loopholes, and National Security Caveats

Signed on September 5, 2024, the AI Convention is a laudable intent but suffers from the usual exclusions and exemptions necessary to satisfy multiple nations.
The post The AI Convention: Lofty Goals, Legal Loopholes, and National Security Caveats appe… Continue reading The AI Convention: Lofty Goals, Legal Loopholes, and National Security Caveats

Acuvity Raises $9 Million Seed Funding for Gen-AI Governance and In-house Development

Activity emerged from stealth with $9 million seed funding to provide solutions for enterprises to safely adopt GenAI.
The post Acuvity Raises $9 Million Seed Funding for Gen-AI Governance and In-house Development appeared first on SecurityWeek.
Continue reading Acuvity Raises $9 Million Seed Funding for Gen-AI Governance and In-house Development

When Convenience Costs: CISOs Struggle With SaaS Security Oversight

SaaS applications are so easy to use, the decision, and the deployment, is sometimes undertaken by the business unit user with little reference to, nor oversight from, the security team.
The post When Convenience Costs: CISOs Struggle With SaaS Securit… Continue reading When Convenience Costs: CISOs Struggle With SaaS Security Oversight

China-Linked ‘Velvet Ant’ Hackers Exploited Zero-Day to Deploy Malware on Cisco Nexus Switches

Hackers gained access to the switch using valid administrator credentials, and then ‘jailbroke’ from the application level into the OS level.
The post China-Linked ‘Velvet Ant’ Hackers Exploited Zero-Day to Deploy Malware on Cisco Nexus Switches … Continue reading China-Linked ‘Velvet Ant’ Hackers Exploited Zero-Day to Deploy Malware on Cisco Nexus Switches

Why LinkedIn Developed Its Own AI-Powered Security Platform

An inside look at how LinkedIn developed an internal AI-assisted vulnerability management system to protect its massive infrastructure and user base.
The post Why LinkedIn Developed Its Own AI-Powered Security Platform appeared first on SecurityWeek.
Continue reading Why LinkedIn Developed Its Own AI-Powered Security Platform