Black Hat Roundup 2024: What to Expect From This Week’s Security Events

Black Hat Roundup 2024: What to Expect From This Week’s Security Events

Black Hat and DEF CON are two of the major security conferences in the U.S., drawing large crowds of cyber and AI decision-makers to Las Vegas. Black Hat USA 2024 runs from August 3-8, with most of the briefings occurring on August 7 and 8; DEF CON 32 runs from August 8-11. We’re rounding up the enterprise business tech news from Black Hat and DEF CON that is most relevant for IT and tech decision-makers….

Read More

Apple Joins Voluntary U.S. Government Commitment to AI Safety

Apple Joins Voluntary U.S. Government Commitment to AI Safety

Apple is the latest addition to the list of public U.S. companies that made voluntary commitments to AI regulations, the White House announced on July 26. The commitments, first announced in September 2023, include vows to publicly disclose AI capabilities, to watermark AI content and more. These commitments set a public standard for the country’s largest AI makers in an effort to reduce deception and other novel, unsafe practices that could stem from realistic-looking AI…

Read More

AWS Summit: Bedrock AI Service Gains Contextual Grounding

AWS Summit: Bedrock AI Service Gains Contextual Grounding

Amazon was one of the tech giants that agreed to a set of White House recommendations regarding the use of generative AI last year. The privacy considerations addressed in those recommendations continue to roll out, with the latest included in the announcements at the AWS Summit in New York on July 9. In particular, contextual grounding for Guardrails for Amazon Bedrock provides customizable content filters for organizations deploying their own generative AI. AWS Responsible AI…

Read More

As Companies Flood Into Security AI, Do Large Players Have A Data Advantage?

As Companies Flood Into Security AI, Do Large Players Have A Data Advantage?

Executives from major cybersecurity vendors such as Palo Alto Networks and Proofpoint see the arrival of GenAI as a different story from prior technology shifts — with the need for having massive customer data being paramount. The history of technology shifts in recent decades has tended to center around scrappy upstarts, which burst onto the scene with a big new idea and disrupt more-established players. Generative AI may play out differently, however. While the initiation…

Read More

Some Generative AI Company Employees Pen Letter Wanting ‘Right to Warn’ About Risks

Some Generative AI Company Employees Pen Letter Wanting ‘Right to Warn’ About Risks

Some current and former employees of OpenAI, Google DeepMind and Anthropic published a letter on June 4 asking for whistleblower protections, more open dialogue about risks and “a culture of open criticism” in the major generative AI companies. The Right to Warn letter illuminates some of the inner workings of the few high-profile companies that sit in the generative AI spotlight. OpenAI holds a distinct status as a nonprofit trying to “navigate massive risks” of…

Read More

Microsoft Build 2024: Copilot AI Gains ‘Personal Assistant’ Capabilities

Microsoft Build 2024: Copilot AI Gains ‘Personal Assistant’ Capabilities

Following the announcements of Copilot+ enabled AI PCs at the Microsoft Build developer event on May 20, Microsoft released new developer tools, enhancements to Microsoft Azure AI and new enterprise options for Copilot. GitHub Copilot received a lengthy list of new capabilities enabled by first- and third-party services. Meanwhile, reactions to the AI memory feature Recall include some backlash against its observation of all of the user’s activity. Recall, announced at Microsoft Build on May…

Read More

A Human-Centric Security Approach, Supported by AI

A Human-Centric Security Approach, Supported by AI

Artificial Intelligence & Machine Learning , Events , Next-Generation Technologies & Secure Development Protect People and Infrastructure Simultaneously: Proofpoint CEO Sumit Dhawan Mathew J. Schwartz (euroinfosec) • May 16, 2024     Sumit Dhawan, CEO, Proofpoint To address the cliche of people being the weakest link, cybersecurity company Proofpoint said it’s putting humans at the center of its security. See Also: From CNAPP to CDR: The Cybersecurity Road Ahead Data and…

Read More

Here’s What 20 Top Cybersecurity CEOs And CTOs Were Saying At RSAC 2024

Here’s What 20 Top Cybersecurity CEOs And CTOs Were Saying At RSAC 2024

CRN spoke with the CEOs and CTOs of a number of cybersecurity companies, including Proofpoint, Palo Alto Networks, Rubrik and CrowdStrike, during RSA Conference 2024. Here’s what they had to say. While the many implications of GenAI for security continued to be discussed and debated at last week’s RSA Conference, an array of other issues were front and center—including for many CEOs and CTOs at leading cybersecurity vendors. During interviews the week before RSAC 2024…

Read More

RSA: Google Enhances its Enterprise SecOps Offerings With Gemini AI

RSA: Google Enhances its Enterprise SecOps Offerings With Gemini AI

The RSA Conference, held in San Francisco from May 6-9, brings together cybersecurity professionals from across the world. This year’s conference is buzzing with conversation about generative AI: how to use generative AI to protect against attacks and how to secure generative AI itself. We’re rounding up the enterprise business tech news from RSA that is most relevant for IT and tech decision-makers. This article will be updated throughout RSA with more tech news highlights….

Read More

Adobe Adds Firefly and AI Watermarking to Bug Bounty Program

Adobe Adds Firefly and AI Watermarking to Bug Bounty Program

Security researchers in Adobe’s bug bounty program can now pick up rewards for finding vulnerabilities in Adobe Firefly and Content Credentials. The bug hunt will be open to members of Adobe’s private bug bounty program starting May 1. Members of Adobe’s public bug bounty program will be eligible to work with Adobe Firefly and Content Credentials in the second half of 2024, and applications for the private program are open. Both bug bounties are hosted…

Read More
1 2 3 4 5