In this episode of "Cybersecurity Unplugged," Chris "Tito" Sestito discusses technology to protect neural networks and artificial intelligence and machine-learning models, and John Kindervag explains how such technology fits into the zero trust framework.
Optiv has gone beyond examining log data and classic managed security services work to pursue threats across a broader swath of structured and unstructured data. The company has focused on finding threats outside of a log environment by examining system-to-system interfaces and transactional data.
Healthcare workers should think twice about using AI tools such as ChatGPT as productivity boosters, privacy experts warned after a Florida doctor publicized on TikTok how he had used one to write a letter to an insurer arguing for patient coverage. What are the risks?
Low-level hackers are probing the capacity of ChatGPT to generate scripts that could be used toward criminal ends, such as for stealing files or malicious encryption. One poster on a hacking forum described the process as writing pseudo-code. More sophisticated cases are likely a matter of time.
In this episode of "Cybersecurity Unplugged," Liran Paul Hason, co-founder and CEO of Aporia, discusses the current state of machine learning and artificial intelligence in cybersecurity and the most interesting and promising applications for these technologies right now.
ChatGPT, an AI-based chatbot that specializes in dialogue, is raising concern among security professionals about how criminals could use cheap, accessible natural language AI to write convincing phishing emails and pull off nefarious deepfake scams. Peter Cassidy discusses the implications.
Anything that can write a software code can also write malware. The latest AI technology can do it in seconds. Even worse, it could open the door to rapid innovation for hackers with little or no technical skills or help them overcome language barriers to writing the perfect phishing email.
Businesses should capitalize on AI, ML and robotic process automation to address every event rather than just ignoring the ones deemed unimportant by a SIEM. Palo Alto Networks founder and CTO Nir Zuk says AI can be used to probe security incidents in real time rather than waiting for a breach.
"Who here thinks your network or environment will become more complex next year?" a cybersecurity veteran asked the audience at Black Hat Europe this week in London. As attackers' capabilities continue to improve, Jeff Moss said defenders must learn to succeed or fail faster.
Open Systems has purchased an early-stage Microsoft-centric MSSP to help automate investigating, triaging and responding to basic security alerts. The Silicon Valley-based MDR provider says its acquisition of U.K.-based Tiberium will free up security analysts to focus on preventative defenses.
Over the past year, "enterprises continue to increase their use of AIOps platforms across various aspects of IT operations management (ITOM) and mature their use cases across DevOps and site reliability engineering (SRE) practices, according to Gartner. By doing so, enterprises are replacing some traditional...
The report distinguishes Splunk as a “Leader” and one of the only three “Outperformer” solutions. Splunk earned its top ranking on the list for delivering a highly scalable environment that integrates well into the larger observability platform:
“It provides full coverage from on-premises to hybrid- and...
DevSecOps has been described as part strategy, part toolkit, part training and part cultural shift.
However, there’s no universal playbook on how to implement DevSecOps, and there can be conflict between DevOps prioritizing speed to market, functionality and revenue generation, versus SecOps striving to eliminate...
Perennial leaders ForgeRock, Ping Identity and IBM, along with a surging Okta, set themselves apart from the pack of CIAM vendors in the latest report by KuppingerCole analysts. Ping Identity leapfrogged ForgeRock to capture the gold in product leadership, and IBM once again took the bronze.
Qualys has purchased a startup founded by longtime Qualcomm leaders to help detect supply chain infections, crypto miners and unauthorized activity in the cloud. The deal will allow customers to detect active exploitation, identify advanced threats and create an adaptive risk mitigation program.