Zero trust: The next evolution in cybersecurity

Zero trust: The next evolution in cybersecurity

As the number of connected devices continues to grow, so does the vulnerability of networks to cyber-attacks. The rise of the Internet of Things (IoT) and the Industrial Internet of Things (IIoT) has exponentially expanded the attack surface for cybercriminals. Traditional perimeter-based security models are no longer sufficient in this environment, leading to the adoption of a more comprehensive security framework: zero trust. What is zero trust? At its core, zero trust operates on a…

Read More

Integrated security: AI is a cost-effective path to safer schools

Integrated security: AI is a cost-effective path to safer schools

Nearly 1 in 4 public school teachers say their school had a gun-related lockdown last year, according to Pew Research. For the more than 50 million children in public schools, these lockdowns exact a heavy toll on their mental health. The constant threat of violence inflicts immense harm. Schools need a solution. This is a pressing challenge for K-12 schools, which are entrusted with the education — and lives — of our children. Schools are…

Read More

Balancing Risk and Innovation – A CISO Perspective

Balancing Risk and Innovation – A CISO Perspective

In this episode of The Security Podcasts featuring Jill Knesek, CISO of Blackline, and former FBI Special Agent in the Cyber Crime Squad, we talk about balancing risk & innovation from a CISO’s perspective. “The message I like to give is we can be both innovative and secure.,” Knesek says. “They’re not mutually exclusive, and they shouldn’t be. By shifting left and embedding strong security practices and controls earlier into our development lifecycle, we can…

Read More

Transform what video intelligence can become with AI

Transform what video intelligence can become with AI

AI-powered video analytics are turning security cameras into robust sensors that can improve how you monitor security at your sites. With artificial intelligence (AI), cameras can detect threats independently and accurately, without the need for a human to constantly watch video feeds. No surprise there — this has been a key part of several megatrends from the Security Industry Association (SIA) for the past few years. But thanks to technology advancements and network convergence, they…

Read More

Generative AI poses several security risks

Generative AI poses several security risks

Generative artificial intelligence (GenAI) was analyzed in a recent report by Transmit. The report includes screenshots of dark web forums, marketplaces and subscription-based services.  According to the report, Blackhat Gen-AI tools make it easier to create and automate fraud campaigns, resulting in an increased volume, velocity and variety of attacks. GenAI tools automate pentesting to find enterprise vulnerabilities and circumvent security used by specific targets. Configuration (config) files, generated with the assistance of GenAI, are used for…

Read More

Protecting financial institutions in the era of AI-driven threats

Protecting financial institutions in the era of AI-driven threats

As open-source AI tools become more accessible, ransomware attacks are growing increasingly sophisticated. Scammers are now using AI in targeted spear phishing attacks, where highly personalized information is used to gain access to medical or financial information.  Financial service organizations are particularly at risk when it comes to these kinds of attacks — not only do they hold and exchange large sums of money, they also store and process highly sensitive information of their customers. …

Read More

Small businesses need to secure data before tapping into AI

Small businesses need to secure data before tapping into AI

AI is the acronym on everyone’s lips this summer. Generative AI tools have gone mainstream, and nearly everyone has heard an AI use case that piques their interest. But you’ve got questions about the cost, the security, and how to use your data because you’re a small business, not an enterprise with massive resources. AI is a growth tool that can be a game-changer for smaller businesses. Using existing AI tools to automate and streamline…

Read More

Will decentralized identity unlock the future of identity protection?

Will decentralized identity unlock the future of identity protection?

All eyes have been on AI over the last few years and how it has impacted businesses’ daily operations — both positively and negatively. It goes without saying that it’s a challenging moment for those working in digital identity and security as technology is evolving at an unprecedented pace. AI-powered cyber threats and identity attacks are about to explode at rates never seen before. According to results from a recent survey, over 40% of businesses…

Read More

AI arms race: Cybersecurity defenders in the age of evolving threats

AI arms race: Cybersecurity defenders in the age of evolving threats

As web application cyberattacks surge, defenders are on the frontline of an ever-evolving battlefield. With adversaries leveraging artificial intelligence (AI) to sharpen their assaults, defenders face unprecedented challenges. However, AI isn’t just empowering attackers — it’s also emerging as a crucial ally for defenders. Organizations can use AI’s capabilities and implement strong security training to identify and neutralize threats.  Rest assured, the rise in web application attacks signifies a persistent shift rather than a passing…

Read More

Does GPT-4 risk accelerating cybercrime?

Does GPT-4 risk accelerating cybercrime?

Artificial intelligence is continuing to evolve and advance at a rapid rate. Its heightened integration into business models has grown, with large language models (LLMs) like GPT-4 (the one that is arguably dominating most of the recent discourse) continuing to illustrate possibilities and risks. While the technological breakthrough of GPT-4 holds immense potential for streamlining tasks and augmenting human teams, it also raises several security concerns and risks accelerating cybercrime. A recent report suggested that…

Read More
1 2 3 4 7