The AI Convention: Lofty Goals, Legal Loopholes, and National Security Caveats

Signed on September 5, 2024, the AI Convention is a laudable intent but suffers from the usual exclusions and exemptions necessary to satisfy multiple nations.
The post The AI Convention: Lofty Goals, Legal Loopholes, and National Security Caveats appe… Continue reading The AI Convention: Lofty Goals, Legal Loopholes, and National Security Caveats

How human-led threat hunting complements automation in detecting cyber threats

In this Help Net Security interview, Shane Cox, Director, Cyber Fusion Center at MorganFranklin Consulting, discusses the evolving methodologies and strategies in threat hunting and explains how human-led approaches complement each other to form a robu… Continue reading How human-led threat hunting complements automation in detecting cyber threats

Accenture: Australian Firms Lag in Global Digital Transformation Race

New data reveals 40% of Australian companies are lagging in digital transformation. Explore the reasons behind this gap and its potential impacts. Continue reading Accenture: Australian Firms Lag in Global Digital Transformation Race

Apple Keynote 2024: Unveiling iPhone 16, New AirPods, Apple Intelligence, and More

All four variations of iPhone 16 and iPhone 16 Pro will be able to use Apple Intelligence when it arrives with iOS 18.1. Plus, check out new AirPods and Apple Watches. Continue reading Apple Keynote 2024: Unveiling iPhone 16, New AirPods, Apple Intelligence, and More

AI cybersecurity needs to be as multi-layered as the system it’s protecting

Cybercriminals are beginning to take advantage of the new malicious options that large language models (LLMs) offer them. LLMs make it possible to upload documents with hidden instructions that are executed by connected system components. This is a boo… Continue reading AI cybersecurity needs to be as multi-layered as the system it’s protecting

Best practices for implementing the Principle of Least Privilege

In this Help Net Security interview, Umaimah Khan, CEO of Opal Security, shares her insights on implementing the Principle of Least Privilege (PoLP). She discusses best practices for effective integration, benefits for operational efficiency and audit … Continue reading Best practices for implementing the Principle of Least Privilege

How cyber criminals are compromising AI software supply chains

With the adoption of artificial intelligence (AI) soaring across industries and use cases, preventing AI-driven software supply chain attacks has never been more important. Recent research by SentinelOne exposed a new ransomware actor, dubbed NullBulge, which targets software supply chains by weaponizing code in open-source repositories like Hugging Face and GitHub. The group, claiming to […]

The post How cyber criminals are compromising AI software supply chains appeared first on Security Intelligence.

Continue reading How cyber criminals are compromising AI software supply chains