In the early days of threat intelligence, organizations were primarily consuming reports and "linking things together. But now more entities are moving toward "operationalization out-of-the-box" with their threat intelligence programs, said Jason Passwaters, CEO of Intel 471.
Ransomware attacks have slightly declined in frequency but have grown more sophisticated and costly over the past five years. Sophos Field CTO John Shier shared insights from the latest annual report on the state of ransomware, revealing trends that challenge even the most fortified defenses.
With the potential to break existing encryption standards, quantum computing poses an exponential threat to cybersecurity. Marc Witteman, CEO, Riscure, discusses the need to accelerate development and deployment of new cryptography standards as well as challenges around their widespread adoption.
AI is a new attack surface with data volumes that have turned a small problem into a big one. Incumbents struggle with new attack surfaces while startups move faster, not burdened by technical debt - and they are looking to use AI to do whatever incumbents can't do.
If there's one data breach trend that stands out, it's hackers' vigorous focus on finding zero-day or recently patched flaws and exploiting them through automated scanning. "There are people scanning the whole wide internet," said Alex Pinto, senior manager, Verizon Threat Research Advisory Center.
Robert Tripp, special agent in charge of the San Francisco Field Office of the FBI, details the effect of AI on cyber and financial crime, giving the example of how a few seconds of a blank call resulted in a woman losing a substantial sum to a hacker using AI voice cloning.
David Bradbury, chief security officer at Okta, discusses the shift in the cyberthreat battleground, the effect of artificial intelligence technology on identity protection, Okta's investments into its own security and lessons learned along the way.
John Scimone, president and chief security officer, Dell Technologies, sheds light on the need for developing AI governance frameworks, stopping AI-powered criminal exploitation and enhancing cybersecurity measures. He also discusses how Dell Technologies navigates the AI security challenge.
As enterprises face growing complexities in data management, leaders seek innovative solutions to protect sensitive information. Manny Rivelo, CEO of Forcepoint, highlights the transition from traditional data loss prevention to more nuanced, AI-driven security models that address these challenges.
The cybersecurity industry is significantly transforming, moving from a reactive to a proactive approach. Ryan Permeh, operating partner at SYN Ventures, shares why it is important for startups to have a unique and defensible position that attracts venture capitalists looking for innovation.
With employees spending 90% of their time using web browsers, these apps have become primary targets for attackers. Even secure web gateways and web application firewalls cannot offer adequate protection, said Vivek Ramachandran, founder of SquareX. He offered strategies to stop web-based attacks.
Elia Zaitsev, chief technology officer at cybersecurity company CrowdStrike, discusses how legacy SIEM technology falls short in today's security landscape and how artificial intelligence is enhancing the analytical capabilities of SIEM systems - with human oversight.
As the cyber insurance market matures, insurers are leveraging artificial intelligence technology and cloud security metrics to better assess risks and provide broader coverage, said Monica Shokrai, head of business risk and insurance at Google Cloud.
Floor Jansen, deputy head of the National High Tech Crime Unit within the Dutch National Police Agency, discusses the unit's role in preventing cybercrime and elucidates the role of advanced technologies such as AI and big data in identifying the unknown unknowns.
Clarence Worrell, senior data scientist, CERT Division of Carnegie Mellon University's Software Engineering Institute, discusses how machine learning transforms threat detection and highlights practical applications and emerging challenges in cybersecurity.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.