Over the past two years, AI enabled by a cloud interface has ushered in the age of cloud 3.0. The industry is evolving faster than anyone could predict, forcing organizations to rethink their security and risk strategies, said Jim Reavis, CEO and co-founder at Cloud Security Alliance.
To combat AI threats in 2025, security teams are set to enter the second phase of AI innovation in security by deploying semi-autonomous operations such as alert parsing, creation of high-priority item lists and risk remediation, said Jamie Collier, senior threat intelligence advisor at Mandiant.
Manufacturers are eager to incorporate AI into a wide range of medical devices, from cardiac monitors that can spot developing heart problems to medical imaging systems that can find malignancies a radiologist might miss. The FDA released a new guidance this week on how to secure these devices.
Shadow AI, malware evading defensive AI and deepfake-enabled attacks will dominate 2025, said Etay Maor, chief security strategist at Cato Networks, emphasizing the need for organizations to improve visibility and detection to counter rapidly evolving AI-driven threats.
Cybersecurity expert and Georgetown University lecturer Chuck Brooks explores the profound impact of emerging technologies on privacy and security in his book, "Inside Cyber: How AI, 5G, and Quantum Computing Will Transform Privacy and Our Security."
David Ortiz was building websites over 20 years ago when he first become exposed to cybersecurity. Back then, his biggest worry was denial-of-service attacks. Today, as a CISO of a global company, emerging AI threats related to phishing and deepfakes are what keeps him up at night.
Organizations need to adopt a more grounded approach to AI implementations. AI is not a magic box that you can buy, apply to problems and expect it to solve everything, said Craig Martell, CTO at Cohesity. He discussed the importance of data evaluation and bias management.
Hackers can potentially use AI to manipulate data that's generated and shared by some health apps, diminishing the data's accuracy and integrity, said Sina Yazdanmehr and Lucian Ciobotaru of cybersecurity firm Aplite, describing a recent research project involving Google Health Connect.
In cybersecurity, there's no such thing as "done learning." The field's dynamic nature - driven by rapid technological advances and evolving threats - demands that professionals stay adaptable and proactive. It's essential for staying relevant, effective and prepared for what's next.
The threat landscape is ever evolving. Modern threat actors constantly develop new tactics, techniques and procedures (TTP) so it's crucial to stay up to date with the latest strategies for protecting your organization.
Security experts from Unit 42™ have unveiled the most commonly observed TTPs in ransomware and...
While the number of ransomware attacks stayed about the same in the past year, cybercriminals are using more effective tactics such as weaponizing breach disclosure deadlines to extract higher ransoms, according to ENISA's 2024 Threat Landscape report.
While AI transforms business operations, it helps cybercriminals develop sophisticated impersonation techniques such as deepfakes and voice synthesis, posing new challenges for corporate security, said Surinder Lall, senior vice president of global information security risk management at Paramount.
In the latest "Proof of Concept," Troy Leach of the Cloud Security Alliance and Avani Desai of Schellman discuss the risks of AI hallucinations. As AI models advance, hallucinations pose serious threats to security, especially when quick and accurate decision-making is essential.
BlackCloak’s $17 million Series B funding round will help the company triple its engineering and product teams, enhancing cybersecurity for executives and high-net-worth individuals. The funding will help BlackCloak address emerging issues such as deepfakes and threat intelligence and modeling.
Welcome to Information Security Media Group's Black Hat and DEF CON 2024 Compendium featuring latest insights from the industry's top cybersecurity researchers and ethical hackers, as well as perspectives from CEOs, CISOs and government officials on the latest trends in cybersecurity and AI.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.