AI may revolutionize security, but not without human intuition

AI may revolutionize security, but not without human intuition

Artificial intelligence (AI)-based cybersecurity isn’t a new concept. Machine learning algorithms, deep learning techniques and other AI technologies are being used to identify malicious patterns, detect anomalies, predict threats and respond to attacks. While there is a lot of excitement and optimism around AI, a certain question arises: Can AI replace human intuition? Can it substitute for security expertise? To answer this question, security leaders must understand the advantages of AI, its challenges and its…

Read More

Avoiding offboarding red flags

Avoiding offboarding red flags

In this episode of The Security Podcasts featuring Yoav Kalati, VP Product at Software as a Service Security Posture Management company Wing Security, we discuss the security challenges and red flags organizations face when it comes to offboarding employees. Or check it out on our Apple Podcasts or Spotify channels. Don’t forget to like, follow, and rate and review our podcasts! Source link

Read More

The intersection of cybersecurity and artificial intelligence

The intersection of cybersecurity and artificial intelligence

Cybersecurity and artificial intelligence (AI) are increasingly interconnected, with AI playing a significant role in enhancing cybersecurity measures. This integration is not new, but it has evolved over time as technology advances and cyber threats become more sophisticated. During the early days of cybersecurity, traditional methods such as firewalls and antivirus software were predominant. AI concepts were present, but practical applications were limited due to computing power and AI algorithm complexity. In the late 1990s…

Read More

Generative AI and IGA: Three considerations

Generative AI and IGA: Three considerations

The introduction of ChatGPT and the generative artificial intelligence (AI) model is one of the most significant new technology developments security leaders have seen. It’s impacting almost every sector of business, including identity governance. It can greatly lower the barrier to entry for the adoption of AI capabilities within a governance solution. With the help of AI, businesses can enhance their efficiency by automating numerous routine tasks and repetitive processes currently done by humans. It…

Read More

Why context matters in the future of enterprise security

Why context matters in the future of enterprise security

In 2022, human error was responsible for 82% of all breaches, reinforcing a lingering problem across the cybersecurity landscape. CISOs can invest in the latest technologies and solutions to secure the perimeter, endpoints, and applications only to have human negligence open the proverbial door for bad actors. Enterprises often see employees as their greatest vulnerability and as being victims of outside threats, but sometimes the latter is not true. According to Gartner, over 90% of…

Read More

AI security risks: Separating hype from reality

AI security risks: Separating hype from reality

The security community — along with its collaborators in fields such as risk, audit and governance — is actively grappling with the implications of generative artificial intelligence (AI). A recent ISACA survey on AI found that the majority of organizations do not provide training on the authorized use of generative AI, and three out of 10 organizations have established policies governing the use of AI technology. It is undeniable that AI poses substantive risks to…

Read More

Challenges of deep fakes in cybersecurity

Challenges of deep fakes in cybersecurity

Deepfakes have been making the headlines with the technology being utilized in social engineering attacks and phishing schemes. In this episode of The Security Podcasts featuring Brent Arnold, a partner practicing in Gowling WLG’s Advocacy department, we discuss the challenges the security industry faces with more and more convincing deepfakes making the rounds. Or check it out on our Apple Podcasts or Spotify channels. Don’t forget to like, follow, and rate and review our podcasts!…

Read More

Strong security posture means building effective partnerships

Strong security posture means building effective partnerships

Strong security posture means building effective partnerships | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

3 ways AI can handle third-party vendor and supplier risk challenges

3 ways AI can handle third-party vendor and supplier risk challenges

3 ways AI can handle third-party vendor and supplier risk challenges | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

Combatting the next wave of AI fraud

Combatting the next wave of AI fraud

Combatting the next wave of AI fraud | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More
1 2 3 4 5 6 7