The Challenges of Building Generative AI Applications in Cybersecurity

The Challenges of Building Generative AI Applications in Cybersecurity

In July, I started an exciting journey with Cisco via the acquisition of Armorblox. Armorblox was acquired by Cisco to further their  AI-first Security Cloud by bringing generative AI experiences to Cisco’s security solutions. The transition was filled with excitement and a touch of nostalgia, as building Armorblox had been my focus for the past three years. Quickly, however, a new mission came my way: Build generative AI Assistants that will allow cybersecurity administrators to…

Read More

Give Your Firewall Admins Superpowers with the Cisco AI Assistant for Security

Give Your Firewall Admins Superpowers with the Cisco AI Assistant for Security

At its core, a firewall is a shield that protects your network from malicious traffic. Sounds simple, but those who work with firewalls every day know the reality: An average firewall has thousands of rules governing how traffic should be handled, many of which may be outdated, redundant, or contradictory. In fact, a Cybersecurity Insiders report revealed that 58% of organizations have more than 1,000 firewall rules, but we know of customers with highly complex…

Read More

AI & Your Family: The Wows and Potential Risks | McAfee Blog

AI & Your Family: The Wows and Potential Risks | McAfee Blog

When we come across the term Artificial Intelligence (AI), our mind often ventures into the realm of sci-fi movies like I, Robot, Matrix, and Ex Machina. We’ve always perceived AI as a futuristic concept, something that’s happening in a galaxy far, far away. However, AI is not only here in our present but has also been a part of our lives for several years in the form of various technological devices and applications. In our…

Read More

How CBA Is Managing Cyber Security in an Age of ‘Infinite Signals’

How CBA Is Managing Cyber Security in an Age of ‘Infinite Signals’

Commonwealth Bank of Australia cyber defence operations leader Andrew Pade is building an AI legacy that will protect customers from cyber attacks and security professionals from career burnout. Image: Timon/Adobe Stock Andrew Pade took on the role of general manager of cyber defence operations and security integration at CBA just over three years ago. Yet in that time, according to Pade, the number of signals coming into its cyber practice has grown from 80 million…

Read More

White House Executive Order on AI Provides Guidelines for AI Privacy and Safety

White House Executive Order on AI Provides Guidelines for AI Privacy and Safety

The Biden administration directed government organizations, including NIST, to encourage responsible and innovative use of generative AI. Image: Maksym Yemelyanov/Adobe Stock Today, U.S. President Joe Biden released an executive order on the use and regulation of artificial intelligence. The executive order features wide-ranging guidance on maintaining safety, civil rights and privacy within government agencies while promoting AI innovation and competition throughout the U.S. Although the executive order doesn’t specify generative artificial intelligence, it was likely…

Read More

Shifting Cybersecurity: The Impact and Implications of LLMs

Shifting Cybersecurity: The Impact and Implications of LLMs

Artificial Intelligence & Machine Learning , Fraud Management & Cybercrime , Next-Generation Technologies & Secure Development Proofpoint CEO Ashan Willy on Taking an Experimental Approach to Applying Gen AI Tom Field (SecurityEditor) • August 25, 2023     Ashan Willy, CEO, Proofpoint While a significant number of attacks are not yet AI-driven, there’s a noticeable shift in the creation of generative malware and lures for business email compromise, warned Ashan Willy, CEO at Proofpoint….

Read More

How to Protect School Children From Deep Fakes | McAfee Blog

How to Protect School Children From Deep Fakes | McAfee Blog

Deep fakes are a growing concern in the age of digital media and can be extremely dangerous for school children. Deep fakes are digital images, videos, or audio recordings that have been manipulated to look or sound like someone else. They can be used to spread misinformation, create harassment, and even lead to identity theft. With the prevalence of digital media, it’s important to protect school children from deep fakes.   Here are some tips…

Read More

The security implications of using ChatGPT in the workplace

The security implications of using ChatGPT in the workplace

The security implications of using ChatGPT in the workplace | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

80% of security leaders predict increase in cybersecurity automation

80% of security leaders predict increase in cybersecurity automation

80% of security leaders predict increase in cybersecurity automation | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Will AI make organizations more secure?

Will AI make organizations more secure?

Will AI make organizations more secure? | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More
1 4 5 6 7