Security, the cloud, and AI: building powerful outcomes while simplifying your experience

Security, the cloud, and AI: building powerful outcomes while simplifying your experience

Over the past year, I’ve spoken with hundreds of professionals about what they expect from their network security. This question is mostly met with equal parts enthusiasm and angst. As we wrap up another successful Cisco Live, I’m eager to share the deep insights I’ve gathered from these extensive conversations and how Cisco is actively addressing your security needs. As organizations navigate application transformations and grapple with the intricacies of defending increasingly complex networks, they’re…

Read More

Microsoft: 87% of UK Businesses Are Unprepared for Cyberattacks

Microsoft: 87% of UK Businesses Are Unprepared for Cyberattacks

A report from Microsoft and Goldsmiths, University of London has found that just 13% of U.K. businesses are resilient to cyberattacks, with 48% deemed vulnerable and the remaining 39% facing high risk. A survey of 1,039 senior business decision-makers and 1,051 employees revealed that the majority of U.K. organisations lacked adequate cybersecurity tools or processes. Microsoft warned that this left 87% of organisations exposed to security threats at a time when bad actors were using…

Read More

Report: AI cybersecurity market projected to exceed $133 billion

Report: AI cybersecurity market projected to exceed 3 billion

A report by Techopedia has provided insights into the influence of AI on the cybersecurity industry. Key findings of the report include the projected value of the AI cybersecurity market, the expenses and savings associated with using AI to identify data breaches, and opinions on AI from cybersecurity professionals.  The report estimates that the value of the global AI cybersecurity market is expected to surpass $133 billion from 2023 to 2030. AI has strengthened cybersecurity…

Read More

ESET Threat Report: ChatGPT Name Abuses, Lumma Stealer Malware Increases, Android SpinOk SDK Spyware's Prevalence

ESET Threat Report: ChatGPT Name Abuses, Lumma Stealer Malware Increases, Android SpinOk SDK Spyware's Prevalence

Risk mitigation tips are provided for each of these cybersecurity threats. Cybersecurity company ESET released its H2 2023 threat report, and we’re highlighting three particularly interesting topics in it: the abuse of the ChatGPT name by cybercriminals, the rise of the Lumma Stealer malware and the Android SpinOk SDK spyware. Jump to: ChatGPT name is being abused by cybercriminals In the second half of 2023, ESET has blocked 650,000 attempts to access malicious domains whose…

Read More

Google Cloud's Cybersecurity Predictions of 2024 and Look Back at 2023

Google Cloud's Cybersecurity Predictions of 2024 and Look Back at 2023

Generative AI can be used by attackers, but security professionals shouldn’t lose sleep over it, according to a Google Cloud threat intelligence analyst. Find out why. Google Cloud’s team recently spoke about the most notable cybersecurity threats of 2023 — multi-faceted extortion and zero-day exploitation — and predicted more zero-day attacks in 2024, during two public, virtual sessions. Plus, Google predicts that both attackers and defenders will continue to use generative AI. However, generative AI…

Read More

New AI Security Guidelines Published by NCSC, CISA & More International Agencies

New AI Security Guidelines Published by NCSC, CISA & More International Agencies

The U.K.’s National Cyber Security Centre, the U.S.’s Cybersecurity and Infrastructure Security Agency and international agencies from 16 other countries have released new guidelines on the security of artificial intelligence systems. The Guidelines for Secure AI System Development are designed to guide developers in particular through the design, development, deployment and operation of AI systems and ensure that security remains a core component throughout their life cycle. However, other stakeholders in AI projects should find…

Read More

G7 Countries Establish Voluntary AI Code of Conduct

G7 Countries Establish Voluntary AI Code of Conduct

The code of conduct provides guidelines for AI regulation across G7 countries and includes cybersecurity considerations and international standards. The Group of Seven countries have created a voluntary AI code of conduct, released on October 30, regarding the use of advanced artificial intelligence. The code of conduct focuses on but is not limited to foundation models and generative AI. As a point of reference, the G7 countries are the U.K., Canada, France, Germany, Italy, Japan…

Read More

81% of organizations have implemented policies around generative AI

81% of organizations have implemented policies around generative AI

81% of organizations have implemented policies around generative AI | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

A generative AI guidebook was released for CISOs

A generative AI guidebook was released for CISOs

A generative AI guidebook was released for CISOs | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Add ‘prompt’ to the long list of injection attacks

Add ‘prompt’ to the long list of injection attacks

Add ‘prompt’ to the long list of injection attacks | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More
1 2