4 steps organizations can take to get started with AI-powered SecOps

4 steps organizations can take to get started with AI-powered SecOps

Cybersecurity is under siege. While 74% of security leaders recognize the growing threat of AI-powered cyberattacks, only 40% feel confident in their ability to defend against them. The latest AI tools are making highly personalized phishing attacks and the ability to change the signatures and hashes associated with malware files easier than before. Not to mention, methods to identify exactly when and where AI is being applied are scarce. This leaves CISOs racing against the…

Read More

Transform what video intelligence can become with AI

Transform what video intelligence can become with AI

AI-powered video analytics are turning security cameras into robust sensors that can improve how you monitor security at your sites. With artificial intelligence (AI), cameras can detect threats independently and accurately, without the need for a human to constantly watch video feeds. No surprise there — this has been a key part of several megatrends from the Security Industry Association (SIA) for the past few years. But thanks to technology advancements and network convergence, they…

Read More

U.S. Tax Reform Can Fuel AI and Cybersecurity Innovation

U.S. Tax Reform Can Fuel AI and Cybersecurity Innovation

In the rapidly evolving technology landscape and amid a proliferation of developments in artificial intelligence (AI), cybersecurity threats and data breaches are equally on the rise. Both AI and cybersecurity have quickly emerged as important areas for innovation and investment. AI enhances cybersecurity by enabling faster, more accurate threat detection and response, while cybersecurity protects AI systems and our increasingly interconnected world. As a result of this dynamic, countries and companies are doing all they…

Read More

Try the New Security Sandbox for Cisco Defense Orchestrator

Try the New Security Sandbox for Cisco Defense Orchestrator

Cisco Defense Orchestrator (CDO) is a cloud-based solution for managing security policy changes across Cisco security solutions, including Cisco firewalls, IOS devices, Multi-cloud Defense. Cisco Defense Orchestrator Sandbox allows you to interact with the CDO dashboard and API. Sandbox automatically onboards a Virtual FTD Device that you can configure and edit related policies. Using DevNet CDO Sandbox you can have access to Cisco AI Assistant UI as well as the AI Assistant API. With AI…

Read More

Putting AI Into AIOps: A Future Beyond Dashboards

Putting AI Into AIOps: A Future Beyond Dashboards

In today’s fast-paced IT environment, traditional dashboards and reactive alert systems are quickly becoming outdated. The digital landscape requires a more proactive and intelligent approach to IT operations. Enter Artificial Intelligence (AI) in IT Operations (AIOps), a transformative approach that leverages AI to turn data into actionable insights, automated responses, and enabling self-healing systems. This shift isn’t just integrating AI into existing frameworks; it has the potential to fundamentally transform IT operations. The Evolution of…

Read More

Cisco AI Enhances Retail Operations

Cisco AI Enhances Retail Operations

Retail has been one of the sectors most transformed by digital innovation, and artificial intelligence (AI) is at the forefront of this change. Cisco has been instrumental in enabling retailers’ adoption of AI technologies to gain operational insights, enhance customer experiences, and improve operational efficiency. Cisco is instrumental in providing AI analytics and automation of the infrastructure retailers leverage in their day-to-day business, as well as providing the resilient high-speed platform for AI innovation, but…

Read More

Generative AI poses several security risks

Generative AI poses several security risks

Generative artificial intelligence (GenAI) was analyzed in a recent report by Transmit. The report includes screenshots of dark web forums, marketplaces and subscription-based services.  According to the report, Blackhat Gen-AI tools make it easier to create and automate fraud campaigns, resulting in an increased volume, velocity and variety of attacks. GenAI tools automate pentesting to find enterprise vulnerabilities and circumvent security used by specific targets. Configuration (config) files, generated with the assistance of GenAI, are used for…

Read More

Cisco and BT Partner to Upskill Ukrainian Refugees in Ireland

Cisco and BT Partner to Upskill Ukrainian Refugees in Ireland

BT and Cisco have been in a strategic partnership since 1990, focusing on delivering a wide range of network, communications, and IT solutions to businesses both nationally and globally. Both companies are also passionate advocates for STEM promotion, with Cisco previously supporting the BT Young Scientist & Technology Exhibition (BTYSTE), one of the leading school STEM exhibitions in Europe which BT has organised and grown since 2001. In January 2023, Cisco leadership attended the BT…

Read More

Protecting financial institutions in the era of AI-driven threats

Protecting financial institutions in the era of AI-driven threats

As open-source AI tools become more accessible, ransomware attacks are growing increasingly sophisticated. Scammers are now using AI in targeted spear phishing attacks, where highly personalized information is used to gain access to medical or financial information.  Financial service organizations are particularly at risk when it comes to these kinds of attacks — not only do they hold and exchange large sums of money, they also store and process highly sensitive information of their customers. …

Read More

How to avoid common mistakes when adopting AI  

How to avoid common mistakes when adopting AI  

I’ll never cease to be amazed by the Olympic runners. As someone who has logged my fair share of runs, I’m totally mesmerized by these runners’ paces. I get short of breath just watching them on my TV. Olympic runners are worthy of our admiration. But these athletes didn’t wake up the day before the Olympics and decide to hop a flight to Paris. Their freedom to run at break-neck speed required years of discipline…

Read More
1 7 8 9 10 11 33