Leveraging AI for enhanced compliance and governance

In this Help Net Security interview, Dr. Joseph Sweeney, Advisor at IBRS, discusses the risks of integrating AI into information management systems. He talks about emerging trends such as content cognition. He predicts advancements in AI-driven informa… Continue reading Leveraging AI for enhanced compliance and governance

37% of publicly shared files expose personal information

Many sensitive documents stored on platforms such as Google Drive, Slack, and other collaborative work applications have been left unattended for several months or even years. This has led to data sprawl challenges for companies and significant data se… Continue reading 37% of publicly shared files expose personal information

AI risks under the auditor’s lens more than ever

According to a recent Gartner survey, widespread GenAI adoption has resulted in a scramble to provide audit coverage for potential risks arising from the technology’s use. In this Help Net Security video, Thomas Teravainen, a Research Specialist … Continue reading AI risks under the auditor’s lens more than ever

Data Security Firm Cyera Raises $300 Million at $1.4 Billion Valuation

Data security company Cyera’s latest $300 million funding round brings the total raised by the firm to $460 million, at unicorn valuation.
The post Data Security Firm Cyera Raises $300 Million at $1.4 Billion Valuation appeared first on SecurityWeek.
Continue reading Data Security Firm Cyera Raises $300 Million at $1.4 Billion Valuation

6 keys to navigating security and app development team tensions

There will always be a natural tension between cybersecurity teams and developers. After all, it’s the developer’s role to “develop.” They want and are paid to create and ship new applications and features that help move the org… Continue reading 6 keys to navigating security and app development team tensions

3 Strategies to overcome data security challenges in 2024

There are over 17 billion internet-connected devices in the world — and experts expect that number will surge to almost 30 billion by 2030. This rapidly growing digital ecosystem makes it increasingly challenging to protect people’s privacy. Attackers only need to be right once to seize databases of personally identifiable information (PII), including payment card […]

The post 3 Strategies to overcome data security challenges in 2024 appeared first on Security Intelligence.

Continue reading 3 Strategies to overcome data security challenges in 2024

Malware stands out as the fastest-growing threat of 2024

93% of IT professionals believe security threats are increasing in volume or severity, a significant rise from 47% last year, according to Thales. The number of enterprises experiencing ransomware attacks surged by over 27% in the past year. Despite th… Continue reading Malware stands out as the fastest-growing threat of 2024

Proofpoint: APAC Employees Are Choosing Convenience, Speed Over Cyber Security

Risky cyber security behaviours are putting employees at risk of phishing and other attacks, according to Proofpoint research, with many employees still unclear security is their responsibility, too. Continue reading Proofpoint: APAC Employees Are Choosing Convenience, Speed Over Cyber Security

How AI can be hacked with prompt injection: NIST report

The National Institute of Standards and Technology (NIST) closely observes the AI lifecycle, and for good reason. As AI proliferates, so does the discovery and exploitation of AI cybersecurity vulnerabilities. Prompt injection is one such vulnerability that specifically attacks generative AI. In Adversarial Machine Learning: A Taxonomy and Terminology of Attacks and Mitigations, NIST defines […]

The post How AI can be hacked with prompt injection: NIST report appeared first on Security Intelligence.

Continue reading How AI can be hacked with prompt injection: NIST report