C-suite weighs in on generative AI and security

Generative AI (GenAI) is poised to deliver significant benefits to enterprises and their ability to readily respond to and effectively defend against cyber threats. But AI that is not itself secured may introduce a whole new set of threats to businesses. Today IBM’s Institute for Business Value published “The CEO’s guide to generative AI: Cybersecurity,” […]

The post C-suite weighs in on generative AI and security appeared first on Security Intelligence.

Continue reading C-suite weighs in on generative AI and security

What to know about new generative AI tools for criminals

Large language model (LLM)-based generative AI chatbots like OpenAI’s ChatGPT took the world by storm this year. ChatGPT became mainstream by making the power of artificial intelligence accessible to millions. The move inspired other companies (which had been working on comparable AI in labs for years) to introduce their own public LLM services, and thousands […]

The post What to know about new generative AI tools for criminals appeared first on Security Intelligence.

Continue reading What to know about new generative AI tools for criminals

Data never dies: The immortal battle of data privacy

More than two hundred years ago, Benjamin Franklin said there is nothing certain but death and taxes. If Franklin were alive today, he would add one more certainty to his list: your digital profile. Between the data compiled and stored by employers, private businesses, government agencies and social media sites, the personal information of nearly […]

The post Data never dies: The immortal battle of data privacy appeared first on Security Intelligence.

Continue reading Data never dies: The immortal battle of data privacy

How IBM secures the U.S. Open

More than 15 million tennis fans around the world visited the US Open app and website this year, checking scores, poring over statistics and watching highlights from hundreds of matches over the two weeks of the tournament. To help develop this world-class digital experience, IBM Consulting worked closely with the USTA, developing powerful generative AI […]

The post How IBM secures the U.S. Open appeared first on Security Intelligence.

Continue reading How IBM secures the U.S. Open

DHS warns of malicious AI use against critical infrastructure

The DHS report warns of state-backed hackers using AI for both malware development and election interference.

The post DHS warns of malicious AI use against critical infrastructure appeared first on CyberScoop.

Continue reading DHS warns of malicious AI use against critical infrastructure

What you need to know about protecting your data across the hybrid cloud

The adoption of hybrid cloud environments driving business operations has become an ever-increasing trend for organizations. The hybrid cloud combines the best of both worlds, offering the flexibility of public cloud services and the security of private on-premises infrastructure. We also see an explosion of SaaS platforms and applications, such as Salesforce or Slack, where […]

The post What you need to know about protecting your data across the hybrid cloud appeared first on Security Intelligence.

Continue reading What you need to know about protecting your data across the hybrid cloud

Online influence operators continue fine-tuning use of AI to deceive their targets, researchers say

The use of artificial intelligence for malign purposes is limited but growing and maturing in key ways, researchers with Google’s Mandiant said Thursday.

The post Online influence operators continue fine-tuning use of AI to deceive their targets, researchers say appeared first on CyberScoop.

Continue reading Online influence operators continue fine-tuning use of AI to deceive their targets, researchers say

X-Force releases detection & response framework for managed file transfer software

How AI can help defenders scale detection guidance for enterprise software tools If we look back at mass exploitation events that shook the security industry like Log4j, Atlassian, and Microsoft Exchange when these solutions were actively being exploited by attackers, the exploits may have been associated with a different CVE, but the detection and response […]

The post X-Force releases detection & response framework for managed file transfer software appeared first on Security Intelligence.

Continue reading X-Force releases detection & response framework for managed file transfer software

Unmasking hypnotized AI: The hidden risks of large language models

The emergence of Large Language Models (LLMs) is redefining how cybersecurity teams and cybercriminals operate. As security teams leverage the capabilities of generative AI to bring more simplicity and speed into their operations, it’s important we recognize that cybercriminals are seeking the same benefits. LLMs are a new type of attack surface poised to make […]

The post Unmasking hypnotized AI: The hidden risks of large language models appeared first on Security Intelligence.

Continue reading Unmasking hypnotized AI: The hidden risks of large language models

Artificial intelligence threats in identity management

The 2023 Identity Security Threat Landscape Report from CyberArk identified some valuable insights. 2,300 security professionals surveyed responded with some sobering figures: 68% are concerned about insider threats from employee layoffs and churn 99% expect some type of identity compromise driven by financial cutbacks, geopolitical factors, cloud applications and hybrid work environments 74% are concerned […]

The post Artificial intelligence threats in identity management appeared first on Security Intelligence.

Continue reading Artificial intelligence threats in identity management