We’re Entering the Age of Unethical Voice Tech

In 2019, Google released a synthetic speech database with a very specific goal: stopping audio deepfakes.  “Malicious actors may synthesize speech to try to fool voice authentication systems,” the Google News Initiative blog reported at the time. “Perhaps equally concerning, public awareness of “deep fakes” (audio or video clips generated by deep learning models) can […]

The post We’re Entering the Age of Unethical Voice Tech appeared first on Security Intelligence.

Continue reading We’re Entering the Age of Unethical Voice Tech

Security Automation Can Save You $3.05M in a Data Breach

When it comes to reducing security breach costs, companies with security artificial intelligence (AI) and automation can save millions, per a new report. According to the most recent IBM Cost of a Data Breach Report, organizations with fully deployed security AI and automation save $3.05 million per data breach compared to those without. That’s a 65.2% […]

The post Security Automation Can Save You $3.05M in a Data Breach appeared first on Security Intelligence.

Continue reading Security Automation Can Save You $3.05M in a Data Breach

What’s New in the 2022 Cost of a Data Breach Report

The average cost of a data breach reached an all-time high of $4.35 million this year, according to newly published 2022 Cost of a Data Breach Report, an increase of 2.6% from a year ago and 12.7% since 2020.

The post What’s New in the 2022 Cost of a Data Breach Report appeared first on Security Intelligence.

Continue reading What’s New in the 2022 Cost of a Data Breach Report

White House backed fund promises to accelerate ‘deep tech’ advancements in cybersecurity

The fund will focus on quantum computing, artificial intelligence, and microelectronics, all of which CEO Gilman Louie sees as critical to cybersecurity and U.S. national security.

The post White House backed fund promises to accelerate ‘deep tech’ advancements in cybersecurity appeared first on CyberScoop.

Continue reading White House backed fund promises to accelerate ‘deep tech’ advancements in cybersecurity

What Is Endpoint Detection and Response?

Endpoint Detection and Response: How To Choose the Right EDR Solution A rise in remote work trends has led to a rapid increase and interconnectivity of endpoints and data in recent years. This ‘next normal’ way of working comes with its own set of security challenges – from the rise in sophisticated and automated attacks […]

The post What Is Endpoint Detection and Response? appeared first on Security Intelligence.

Continue reading What Is Endpoint Detection and Response?

4 Ways AI Capabilities Transform Security

Many industries have had to tighten belts in the “new normal”. In cybersecurity, artificial intelligence (AI) can help.   Every day of the new normal we learn how the pandemic sped up digital transformation, as reflected in the new opportunities and new risks. For many, organizational complexity and legacy infrastructure and support processes are the […]

The post 4 Ways AI Capabilities Transform Security appeared first on Security Intelligence.

Continue reading 4 Ways AI Capabilities Transform Security

Five Key Trends on SOC Modernization

For SOCs looking to improve their ability to detect and respond to threats efficiently and effectively, Extended Detection and Response (XDR) has generated increasing amounts of excitement and discourse in the industry. XDR was one of the hottest topics at RSA 2022, but like with many “hot new trends,” perspectives on what XDR actually is, […]

The post Five Key Trends on SOC Modernization appeared first on Security Intelligence.

Continue reading Five Key Trends on SOC Modernization

Real Security Concerns Are Scarier Than Doomsday Predictions

The metaverse, artificial intelligence (AI) run amok, the singularity … many far-out situations have become a dinner-table conversation. Will AI take over the world? Will you one day have a computer chip in your brain? These science fiction ideas may never come to fruition, but some do point to existing security risks. While nobody can […]

The post Real Security Concerns Are Scarier Than Doomsday Predictions appeared first on Security Intelligence.

Continue reading Real Security Concerns Are Scarier Than Doomsday Predictions

Head of DOD artificial intelligence command warns Pentagon must improve to beat China on AI

The Pentagon’s top commander overseeing AI said the military must quickly adapt if it is to keep up with China in the race to achieve AI supremacy.

The post Head of DOD artificial intelligence command warns Pentagon must improve to beat China on AI appeared first on CyberScoop.

Continue reading Head of DOD artificial intelligence command warns Pentagon must improve to beat China on AI

Solving the Data Problem Within Incident Response

One of the underappreciated aspects of incident response (IR) is that it often starts as a data problem. In many cases, IR teams are presented with an effect such as malware or adversary activity and charged with determining the cause through the identification of evidence that ties the cause and effect together within an environment […]

The post Solving the Data Problem Within Incident Response appeared first on Security Intelligence.

Continue reading Solving the Data Problem Within Incident Response