Orca Security CEO Gil Geron outlines the integration of AI for advanced security posture management. He emphasizes the importance of deep visibility into cloud environments, customer adoption and preventing security issues early in the development life cycle.
A new artificial intelligence-based protection system developed by the German government-funded SecDER project is revolutionizing the security of virtual power plants by detecting cyberattacks and predicting failures, according to Fraunhofer SIT Institute Darmstadt.
HR experts at Lattice had a vision of treating AI bots as human employees, with a place on the org chart, training, key performance metrics - and a boss. But the workforce may not be ready for that, and the firm learned the hard way. Lattice scrapped its plan three days after announcing it.
Whistleblowers from OpenAI have reportedly complained to the Securities and Exchange Commission that the company unlawfully restricted employees from alerting regulators of the artificial intelligence technology's potential risks to humanity.
In the latest weekly update, ISMG editors discussed how the industry should handle ransomware vulnerabilities, the rise of fake generative AI assistants that spread malware, and the implications that recent U.S. Supreme Court decisions could have for cybersecurity and AI regulations.
Experts warned in congressional testimony to the Senate Commerce Committee on Thursday that the absence of a comprehensive privacy bill in the United States is hindering economic competition for technology companies and jeopardizing the privacy of the American public.
In today's rapidly evolving threat landscape, traditional Security Operations Centers (SOCs) face significant challenges in detecting and responding to cyber threats swiftly and effectively. Analysts are overwhelmed with alert fatigue and manual, labor-intensive tasks — decreasing operational resilience and...
We have entered an era of unprecedented data growth and utilization. With cloud resources available at our fingertips, data is just as easily created as it is shared. This raises the question: do organizations have full control and visibility of their data and are able to properly manage and secure it.
Download this...
The Senate Armed Services Committee's fiscal year 2025 National Defense Authorization Act includes a significant focus on military cyber preparedness, with plans to develop capabilities to prevent threats from drones, as well as investments in quantum and artificial intelligence research.
The new U.K. Labour government is expected to significantly shift AI and data protection regulations. Jonathan Armstrong, legal expert and partner at Punter Southall Law, discussed the Labour Party's likely move toward stricter AI regulations, aligning more closely with EU standards.
CISOs Shefali Mookencherry and Kenneth Townsend examine the implications of AI for copyright infringement and consent. They discuss the need for clear governance and responsible use of data and the evolving landscape of AI privacy issues in both the healthcare and non-healthcare sectors.
U.S. federal authorities seized two web domains they said supported an artificial intelligence-driven disinformation network run by the Russian domestic intelligence agency and affiliates of a state-run propaganda broadcaster. Authorities searched nearly 1,000 accounts on social media platform X.
The threat landscape is becoming more hazardous. AI and deepfake technologies are emerging as major new tools used by cybercriminals to create more effective campaigns. And advanced persistent threat actors are getting more brazen, said Preston Miller, director at Unit 42, Palo Alto Networks.
Integrating cyberthreat intelligence across all business operations is essential for enhancing security and managing risks effectively. But that valuable threat intel should not be limited to security operations centers, said Tim Gallo, head of global solutions architects, Google.
Accenture's Daniel Kendzior and Palo Alto Networks' Rich Campagna discuss the need to implement robust AI security measures. They highlight the importance of controlling third-party AI access, safeguarding AI infrastructure and evolving cybersecurity strategies to counter AI-driven attacks.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.