AI's integration into cybersecurity demands a strong foundational approach. Many companies seek advanced AI solutions but struggle with basic cybersecurity practices such as managing assets and patching vulnerabilities, said Michael Thiessmeier, executive director of U.S. NAIC-ISAO.
RedSense’s Yelisey Bohuslavskiy and Marley Smith believe ransomware is declining but caution that it still poses a significant threat. While attackers recycle old methods, they're taking desperate measures to target vulnerable groups such as cancer centers and to stoke fears in the marketplace.
Shachar Menashe, senior director of security research at JFrog, discusses critical security risks in MLOps platforms - including code execution vulnerabilities in machine learning models - and why organizations must treat ML models as potentially malicious code to mitigate these inherent risks.
California state lawmakers watered down a bill aimed at preventing artificial intelligence disasters after hearing criticism from industry and federal representatives. The bill still faces opposition from Silicon Valley and Democratic lawmakers.
The ability to create real-time deepfakes of trusted figures has transformed the landscape of corporate security threats. Brandon Kovacs, senior red team consultant at Bishop Fox, details how attackers can now clone voices and video in real-time, enabling new forms of social engineering and fraud.
Brandon Pugh of R Street Institute discusses Congress' struggle to balance AI innovation and regulation, the U.S. approach compared to the EU, and the urgent need for privacy laws to protect AI-driven data. He emphasizes education on AI technologies and the ongoing challenge of defining key terms.
The CrowdStrike 2024 Threat Hunting Report highlights the trends the CrowdStrike OverWatch team observed from July 2023 to June 2024 and details how CrowdStrike OverWatch utilizes proactive, intelligence-informed threat hunting to relentlessly track, detect and ultimately disrupt the adversary no matter when or where...
Many cybersecurity organizations hope generative artificial intelligence and large language models will help them secure the enterprise and comply with the latest regulations. But to date, commercial LLMs have big problems - hallucinations and a lack of timely data, said NYU professor Brennan Lodge.
In an era where cyber threats are increasingly complex and AI-driven, selecting the right SIEM solution is more critical than ever. The right SIEM can be the cornerstone of an effective cyber defense strategy. However, the decision-making process is layered with complexities, from evaluating your current technology...
In an era where cyber threats evolve at an unprecedented pace, AI emerges as the ultimate cybersecurity “Swiss Army Knife.” With AI, your security operations become proactively fortified, turning defenses into an intelligent, adaptive, and resilient force against the next generation of cyber attacks.
By...
In the latest weekly update, ISMG editors discussed the Trump campaign's leaked documents and the many hacker groups targeting the U.S. presidential election, the potential for OpenAI's new voice feature to blur the line between AI and human relationships, and insights from the Black Hat Conference.
As cloud adoption accelerates, the unchecked growth of nonhuman identities is exposing companies to increased risks. Adam Cheriki, CTO and co-founder of Entro Security, explains why securing these identities is crucial and how the company's platform delivers a comprehensive solution.
As enterprises embrace generative AI, security concerns grow. Ravi Ithal, co-founder and CTO of Normalyze, outlines how large language models, or LLMs, increase risks such as data leakage and shadow AI, and he urges businesses to prioritize discovery and data protection.
Microsoft's Sherrod DeGrippo delves into the rise of SIM swapping, the role of social engineering in cyberattacks, and the emerging use of AI by threat actors. She emphasizes the need for real multifactor authentication and advanced strategies to counter these evolving threats.
Huntress CTO Chris Bisnett outlines the firm's innovative approach to simplifying SIEM by reducing data storage costs and focusing on relevant logs. These services support small and midsized businesses looking to enhance their security posture without the high expenses of a traditional SIEM.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.