Mitigating AI Threats: Bridging the Gap Between AI and Legacy Security

Adopting a layered defense strategy that includes human-centric tools and updating security components.
The post Mitigating AI Threats: Bridging the Gap Between AI and Legacy Security appeared first on SecurityWeek.
Continue reading Mitigating AI Threats: Bridging the Gap Between AI and Legacy Security

How Amazon Web Services uses AI to be a security ‘force multiplier’

AWS CSO Stephen Schmidt says AI is transforming the way the company does security reviews and incident response.

The post How Amazon Web Services uses AI to be a security ‘force multiplier’ appeared first on CyberScoop.

Continue reading How Amazon Web Services uses AI to be a security ‘force multiplier’

CISO 3.0: Leading AI governance and security in the boardroom

In this Help Net Security interview, Aaron McCray, Field CISO at CDW, discusses how AI is transforming the CISO role from a tactical cybersecurity guardian into a strategic enterprise risk advisor. With AI now embedded across business functions, CISOs … Continue reading CISO 3.0: Leading AI governance and security in the boardroom

Security awareness training isn’t stopping breaches. Can AI help?

In this Help Net Security video, Mick Leach, Field CISO at Abnormal AI, explores why security awareness training (SAT) is failing to reduce human error, the top cause of cybersecurity incidents. He discusses how AI can transform SAT into a smarter, mor… Continue reading Security awareness training isn’t stopping breaches. Can AI help?

Jericho Security Gets $15 Million for AI-Powered Awareness Training

Jericho Security has raised $15 million in Series A funding for its AI-powered employee cybersecurity training platform.
The post Jericho Security Gets $15 Million for AI-Powered Awareness Training appeared first on SecurityWeek.
Continue reading Jericho Security Gets $15 Million for AI-Powered Awareness Training

How to build an effective cybersecurity simulation

Most people groan at the prospect of security training. It’s typically delivered through dull online videos or uninspiring exercises that fail to capture real-world urgency. To make a real difference in cyber crisis readiness, personnel need the opport… Continue reading How to build an effective cybersecurity simulation

MITRE Caldera RCE vulnerability with public PoC fixed, patch ASAP! (CVE-2025–27364)

Users of the MITRE Caldera cyber security platform have been urged to plug a critical hole (CVE-2025–27364) that may allow unauthenticated attackers to achieve remote code execution. About MITRE Caldera MITRE Caldera is a platform built on the MITRE AT… Continue reading MITRE Caldera RCE vulnerability with public PoC fixed, patch ASAP! (CVE-2025–27364)