3 recommendations for adopting generative AI for cyber defense

In the past eighteen months, generative AI (gen AI) has gone from being the source of jaw-dropping demos to a top strategic priority in nearly every industry. A majority of CEOs report feeling under pressure to invest in gen AI. Product teams are now scrambling to build gen AI into their solutions and services. The […]

The post 3 recommendations for adopting generative AI for cyber defense appeared first on Security Intelligence.

Continue reading 3 recommendations for adopting generative AI for cyber defense

97% of organizations hit by ransomware turn to law enforcement

Sophos has released additional findings from its annual “State of Ransomware 2024” survey. According to the report, among organizations surveyed, 97% of those hit by ransomware over the past year engaged with law enforcement and/or official government … Continue reading 97% of organizations hit by ransomware turn to law enforcement

Google Debuts New Security Products, Hyping AI and Mandiant Expertise

Google rolls out new threat-intel and security operations products and looks to the magic of AI to tap into the booming cybersecurity market.
The post Google Debuts New Security Products, Hyping AI and Mandiant Expertise appeared first on SecurityWeek.
Continue reading Google Debuts New Security Products, Hyping AI and Mandiant Expertise

What we can learn from the best collegiate cyber defenders

This year marked the 19th season of the National Collegiate Cyber Defense Competition (NCCDC). For those unfamiliar, CCDC is a competition that puts student teams in charge of managing IT for a fictitious company as the network is undergoing a fundamental transformation. This year the challenge involved a common scenario: a merger. Ten finalist teams […]

The post What we can learn from the best collegiate cyber defenders appeared first on Security Intelligence.

Continue reading What we can learn from the best collegiate cyber defenders

What is cybersecurity mesh architecture (CSMA)?

Cybersecurity mesh architecture (CSMA) is a set of organizing principles used to create an effective security framework. Using a CSMA approach means designing a security architecture that is composable and scalable with easily extensible interfaces, a … Continue reading What is cybersecurity mesh architecture (CSMA)?

Change Healthcare Cyberattack Was Due to a Lack of Multifactor Authentication, UnitedHealth CEO says

UnitedHealth CEO Andrew Witty said in a U.S. Senate hearing that his company is still trying to understand why the server did not have the additional protection.
The post Change Healthcare Cyberattack Was Due to a Lack of Multifactor Authentication, Un… Continue reading Change Healthcare Cyberattack Was Due to a Lack of Multifactor Authentication, UnitedHealth CEO says

UnitedHealth CEO Says Hackers Lurked in Network for Nine Days Before Ransomware Strike

UnitedHealth Group’s CEO Andrew Witty shares details on the damaging cyberattack in testimony before a US Congress committee set for May 1, 2024.
The post UnitedHealth CEO Says Hackers Lurked in Network for Nine Days Before Ransomware Strike appeared f… Continue reading UnitedHealth CEO Says Hackers Lurked in Network for Nine Days Before Ransomware Strike

How does COBIT address the management of security incidents in its framework? [closed]

COBIT (Control Objectives for Information and Related Technology) is a framework for IT governance that includes controls for physical security. The framework is designed to help organizations achieve their business objectives by providing… Continue reading How does COBIT address the management of security incidents in its framework? [closed]