Zero trust: The next evolution in cybersecurity

Zero trust: The next evolution in cybersecurity

As the number of connected devices continues to grow, so does the vulnerability of networks to cyber-attacks. The rise of the Internet of Things (IoT) and the Industrial Internet of Things (IIoT) has exponentially expanded the attack surface for cybercriminals. Traditional perimeter-based security models are no longer sufficient in this environment, leading to the adoption of a more comprehensive security framework: zero trust. What is zero trust? At its core, zero trust operates on a…

Read More

Liars in the wires: Getting the most from GenAI without getting duped

Liars in the wires: Getting the most from GenAI without getting duped

Before, artificial intelligence (AI) and machine learning (ML) required programming languages. Now, simple text interfaces enable everyone to interact with powerful models that are seemingly limitless. A University of California, San Diego study found that GPT4 has passed the TuringTest, with 54% of participants mistaking GPT4s responses as coming from a human. Many of the latest AI enabled tools can make you feel like you’ve mastered new subjects far and wide, unlocking vast riches and…

Read More

Fortifying the software supply chain: A crucial security practice

Fortifying the software supply chain: A crucial security practice

The software supply chain (SSC) serves as the backbone of software development, encompassing every stage from code creation to deployment infrastructure. However, the very interconnectedness that makes the SSC efficient also renders it vulnerable to escalating cyber threats. The urgency of software supply chain security Software supply chain security (SSCS) is paramount in safeguarding the integrity and security of software throughout its lifecycle. The gravity of reinforcing SSCS is underscored by the “State of Software…

Read More

Humans in AI: The necessity for human-in-the-loop (HILT)

Humans in AI: The necessity for human-in-the-loop (HILT)

A deliberate approach is essential for AI to be net positive, and that human-in-the-loop (HILT), and its natural successor reinforcement learning from human feedback (RLHF), are essential components of this. What is HILT?   To understand HILT, we must first understand machine learning. Machine learning is when the computer is able to learn from data. LLM (large language model) chatbots are made possible by machine learning. A concrete and easy to understand example of machine…

Read More

UK Trails Behind Europe in Technical Skills Proficiency, Coursera Report Finds

UK Trails Behind Europe in Technical Skills Proficiency, Coursera Report Finds

The U.K. is the 25th most technically proficient country in Europe, a new report by online course provider Coursera has found. It sits well behind other digital leaders in the region like Germany, France and Spain. Globally, the U.K. came 45th out of 109 countries, which is an improvement from last year’s 64th place; however, considering the government’s significant investments into digital skills, the country’s rank suggests that current efforts may need to be reassessed….

Read More

AI security for CISOs: A dynamic and practical framework

AI security for CISOs: A dynamic and practical framework

Few technologies have infiltrated the business world as rapidly — and with so much enthusiasm from leaders — as artificial intelligence (AI) and machine learning (ML). By some reports, two-thirds of enterprises are already using generative AI, citing benefits like productivity gains and improved customer relationship management.  But with the excitement for AI and ML comes security and privacy concerns. Leaders consistently point to security as a top concern when adopting generative AI. Even CISOs,…

Read More

Tech Needed to Survive This Decade's 'Seismic' APAC B2B Trends

Tech Needed to Survive This Decade's 'Seismic' APAC B2B Trends

The business-to-business market will see a number of big changes in the years to 2030, according to a new report from customer experience firm Merkle. APAC regional B2B enterprises will need to consider their levels of investment in a number of technologies and integrating new tools now to prepare for and adapt to the coming changes. The B2B Futures: The View From 2030 report argues four key “seismic” trends are coming to B2B: A rise…

Read More

ISC2 Research: Most Cybersecurity Professionals Expect AI to Impact Their Jobs

ISC2 Research: Most Cybersecurity Professionals Expect AI to Impact Their Jobs

Most cybersecurity professionals (88%) believe AI will significantly impact their jobs, according to a new survey by the International Information System Security Certification Consortium; with only 35% of the respondents having already witnessed AI’s effects on their jobs (Figure A). The impact is not necessarily a positive or negative impact, but rather an indicator that cybersecurity pros expect their jobs to change. In addition, concerns have arisen about deepfakes, misinformation and social engineering attacks. The…

Read More

The intersection of cybersecurity and artificial intelligence

The intersection of cybersecurity and artificial intelligence

Cybersecurity and artificial intelligence (AI) are increasingly interconnected, with AI playing a significant role in enhancing cybersecurity measures. This integration is not new, but it has evolved over time as technology advances and cyber threats become more sophisticated. During the early days of cybersecurity, traditional methods such as firewalls and antivirus software were predominant. AI concepts were present, but practical applications were limited due to computing power and AI algorithm complexity. In the late 1990s…

Read More

Why context matters in the future of enterprise security

Why context matters in the future of enterprise security

In 2022, human error was responsible for 82% of all breaches, reinforcing a lingering problem across the cybersecurity landscape. CISOs can invest in the latest technologies and solutions to secure the perimeter, endpoints, and applications only to have human negligence open the proverbial door for bad actors. Enterprises often see employees as their greatest vulnerability and as being victims of outside threats, but sometimes the latter is not true. According to Gartner, over 90% of…

Read More
1 2 3 4