How AI can be hacked with prompt injection: NIST report

The National Institute of Standards and Technology (NIST) closely observes the AI lifecycle, and for good reason. As AI proliferates, so does the discovery and exploitation of AI cybersecurity vulnerabilities. Prompt injection is one such vulnerability that specifically attacks generative AI. In Adversarial Machine Learning: A Taxonomy and Terminology of Attacks and Mitigations, NIST defines […]

The post How AI can be hacked with prompt injection: NIST report appeared first on Security Intelligence.

Continue reading How AI can be hacked with prompt injection: NIST report

Nurturing a Relationship between AI and the Security Team

No matter the industry, adding AI technologies to work processes has made a lot of employees nervous. There is fear that automation is taking over and that robots will eventually push out the human workforce. To quell these fears, it’s the respo… Continue reading Nurturing a Relationship between AI and the Security Team

Using IAM Solutions to Beat Deepfakes and Fraud

AI and ML technologies have made great strides in helping organizations with cybersecurity, as well as with other tasks like chatbots that help with customer service. Cybercriminals have also made great strides in using AI and ML for fraud. “Today, fr… Continue reading Using IAM Solutions to Beat Deepfakes and Fraud

IT’s Confidence in Mitigating Cyberthreats Low

As cyberthreats evolve and increase in both voracity and velocity, many IT professionals are becoming increasingly worried about their organization’s ability to deal with those threats. That’s according to the results of a recent survey conducte… Continue reading IT’s Confidence in Mitigating Cyberthreats Low

Guide: How to Choose an AI-Based Cybersecurity Platform

Most cybersecurity vendors today tout some form of “Artificial Intelligence” as an underlying mechanism for the differentiation of their product among the market. But if everyone is saying they have AI, and everyone is also claiming theirs … Continue reading Guide: How to Choose an AI-Based Cybersecurity Platform

Why The Future of Cybersecurity Needs Both Humans and AI Working Together

A recent WhiteHat Security survey revealed that more than 70 percent of respondents cited AI-based tools as contributing to more efficiency. More than 55 percent of mundane tasks have been replaced by AI, freeing up analysts for other departmental task… Continue reading Why The Future of Cybersecurity Needs Both Humans and AI Working Together

CTO Perspective: Machines Protecting Themselves – The Future of Cybersecurity

We interviewed MixMode CTO Dr. Igor Mezic to better understand how machines should be protecting themselves with AI, what roles humans play, and how the DoD and the private sector both benefit from rapid innovation in cybersecurity.
The post CTO Perspe… Continue reading CTO Perspective: Machines Protecting Themselves – The Future of Cybersecurity

IDC Report: MixMode – An Unsupervised AI-Driven Network Traffic Analysis Platform

IDC, the premier global market intelligence firm, recently released a vendor report on MixMode’s Next-Generation AI Powered network traffic analysis platform. Ritu Jyoti, Program Vice President, Artificial Intelligence (AI) Research with IDC&#821… Continue reading IDC Report: MixMode – An Unsupervised AI-Driven Network Traffic Analysis Platform

Hacking the Hackers: Adversarial AI and How to Fight It

Advances in Artificial Intelligence (AI) have led to smarter, more robust network security platforms that are quickly replacing legacy security solutions.
The post Hacking the Hackers: Adversarial AI and How to Fight It appeared first on Security Boule… Continue reading Hacking the Hackers: Adversarial AI and How to Fight It

Our Top 5 Cybersecurity Insights from 2019

This year on the MixMode blog, we have covered headline stories, analyzed every pain point within network security, and shared what we believe to be some of the most innovative solutions to help you analyze network traffic, surface threats and anomalie… Continue reading Our Top 5 Cybersecurity Insights from 2019