Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Truth About How Generative AI Can Be Used In Cybersecurity

Thanks to ChatGPT, you’ve probably heard a lot about generative AI technology over the last few years. Generative AI is artificial intelligence technology that works by taking input data like a request, processing it through different algorithms, and producing an output based on learned patterns. ChatGPT is a generative AI chatbot. 91% of security teams use generative AI, but 65% don’t fully understand the implications.

EP 65 - Machine Identities, AI and the Future of Security with the 'Identity Jedi'

In this episode of the Trust Issues podcast, host David Puner and David Lee, aka “The Identity Jedi,” delve into the evolving landscape of identity security. They discuss the critical challenges and advancements in securing both human and machine identities. Lee shares insights on the fear and misconceptions surrounding AI, drawing parallels to pop culture references like Marvel’s Jarvis.

CrowdStrike Launches AI Red Team Services to Secure AI Innovation

As organizations race to adopt generative AI (GenAI) to drive efficiency and innovation, they face a new and urgent security challenge. While AI-driven tools and large language models (LLMs) open vast opportunities, they also introduce unique vulnerabilities that adversaries are quick to exploit. From data exposure to supply-chain risks, the potential for threats to AI systems is growing just as fast as the technology itself.

Investigating iOS 18's AI Capabilities

With the release of iOS 18, Apple has continued to expand its integration of AI technologies, positioning the iPhone as a powerful personal assistant capable of smart recommendations, advanced text and image analysis, and even predictive suggestions. Leveraging on-device machine learning, iOS 18’s AI features tap into user data to provide a personalized experience.

Phishing Campaign Impersonates OpenAI To Collect Financial Data

Cybercriminals are impersonating OpenAI in a widespread phishing campaign designed to trick users into handing over financial information. The emails inform users that a payment for their ChatGPT subscription was declined, inviting them to click a link in order to update their payment method. The phishing emails appear fairly convincing, but trained users could spot some red flags. The most obvious giveaway is that the emails were sent from “info@mtacom,” which is clearly unrelated to OpenAI.

How AI Can Help Law Firms Ensure Cybersecurity

Artificial intelligence is now being used in many sectors and can have very positive effects. Routine jobs that people no longer want to deal with are given to artificial intelligence and completed efficiently. One of these sectors can be the cyber security sector. Many companies need to ensure their cyber security, including law firms, and artificial intelligence can help companies in this regard.

The Crucial Network Security Guardrails for Ensuring GenAI Success

Millions of organizations are actively deploying and leveraging generative AI (GenAI) applications in a bid to streamline productivity, reduce costs and improve efficiencies. A high percentage of enterprises are in the midst of trialing GenAI pilot programs, and by 2026, it is anticipated that more than 80% of enterprises will have deployed generative AI-enabled applications, according to Gartner.

Network Digital Twins Deliver Reliable AI Outcomes

In the realm of artificial intelligence (AI), especially when applied to networking and security, the accuracy and reliability of data are paramount. AI systems are only as good as the data they consume, and for network engineers, feeding these systems with up-to-date and precise information can make the difference between optimal performance and costly errors.

The Role of Cloud Computing in Enhancing Cybersecurity

Cloud computing revolutionizes how organizations approach data security and threat prevention. The transformation of traditional security measures into cloud-based solutions marks a significant shift in protecting sensitive information and maintaining business continuity.