There are several security risks associated with generative AI, including AI-powered social engineering attacks and evasion of traditional security defenses.
Search Results: phishing (84)
The potential of generative AI goes far beyond image generation and blog writing—it is a game-changer for staying ahead of evolving cybersecurity threats.
New research from Lookout identifies key pain points impacting the cybersecurity readiness of financial services firms, and recommends new approaches.
Fortinet’s “Cyber Threat Predictions for 2023” report examines the rise of ransomware, the mainstreaming of edge attacks, and the weaponization of AI.
It’s essential that everyone in the workforce understand how to keep their mobile phones, laptops, and other endpoint devices secure, writes Chris Hughes.
Bill Doerrfeld explains how AI is improving endpoint threat detection and accelerating response times.
Endpoint security tools like Palo Alto Networks’ Cortex protect organizations from cyber threats and are especially necessary in the era of remote work.
Excerpted from the session on “AI, Cybersecurity, and Innovation,” this CIO Digital Summit moment features a cautionary tale about what caused a security breach at the SBA.
Key RSA 2023 takeaways include a strong emphasis on AI defense, the push for an identity-centric security model, and management of the increasingly complex modern attack surface.
New service built specifically for managed security service providers (MSSPs) help them secure the most common mobile devices and encourages self-remediation when issues occur.
The latest Growth Swarm podcast covers cybersecurity as a business enabler from the CEO perspective, the CMO perspective, and the industry perspective.
Knowledge is power, and in the world of cybersecurity, the threat intelligence lifecycle is key to unlocking that power.
Cybersecurity data can empower C-suite executives to make informed decisions, protect their organization, and drive business growth.
Day 3 of Acceleration Economy’s Digital CIO Summit included a CISO panel, discussions around cybersecurity, digital natives, and co-creation.
Bill Doerrfeld recomienda algunas buenas prácticas de usar Inteligencia Artificial aplicada a la detección automatizada de vulnerabilidades en finanzas.
Metrics are a critical part of implementing zero trust.
New data from Palo Alto Networks’ incident response team highlights the expanding set of extortion tactics being used as part of ransomware attacks.
Environmental, social, and governance frameworks are on the rise, and they must be crafted with enough security considerations to ward off increased cyber threats.
Frank Domizio explora el uso de Inteligencia Artificial en un entorno dinámico de ciberseguridad, sus beneficios y retos.
An in-depth look at automated vulnerability scanning within financial software, how it works, as well as top tools and best practices to get the job done.