ISMG's Cybersecurity Pulse Report Black Hat 2024 Edition delivers a deep dive into the most critical security challenges discussed at this year's conference. This report, created through advanced AI-driven analysis, compiles expert insights on topics ranging from AI tech to critical infrastructure.
AI models are increasing efficiency, but come with new hidden vulnerabilities that can be a struggle to keep up with and safeguard against. The possible Malicious attacks can lead to business disruption and data breaches of highly sensitive data.
Identifying your AI model and its vulnerabilities is crucial. Many...
HackerOne has tapped F5's longtime product leader as its next chief executive to continue expanding its portfolio beyond operating vulnerability disclosure programs. The firm tasked Kara Sprague with building on existing growth in areas including AI red teaming and penetration testing as a service.
Cisco announced its intent to acquire Robust Intelligence to fortify the security of AI applications. With this acquisition, Cisco aims to address AI-related risks, incorporating advanced protection to guard against threats such as jailbreaking, data poisoning and unintentional model outcomes.
Artificial intelligence is transforming cybersecurity on both offensive and defensive fronts. Attackers use AI to iterate and modify exploits rapidly, making malicious code harder to detect, said Tim Gallo, head - global solutions architects, Google.
Artificial intelligence, much like when the internet became public, is simultaneously the most overhyped and underhyped technology in history, said Sam Curry, vice president and CISO at Zscaler. Its application in cyber defense is still evolving.
Financial institutions face unprecedented cybersecurity challenges, including the rising threat of AI-driven attacks. Join us for an in-depth webinar, "Securing the New Normal," where CSI’s expert will share cutting-edge strategies for managing risks in a remote workforce, countering AI threats, and securing cloud...
AI systems acting autonomously bring risks of large-scale mistakes that current human defenses can't match, says Matt Turek, deputy director at DARPA. He discusses AI agents, adversarial attacks and the need for provable AI safety in both offensive and defensive capacities.
This session provides crucial insights for incident response and threat intelligence professionals facing high-impact attacks. We discuss the current threat landscape, changes in the attack surface, AI's role in cybersecurity, and how Google Cloud addresses security gaps.
In an era where cyber threats evolve at an unprecedented pace, AI emerges as the ultimate cybersecurity “Swiss Army Knife.” With AI, your security operations become proactively fortified, turning defenses into an intelligent, adaptive, and resilient force against the next generation of cyber attacks.
By...
Cyberattacks have become increasingly disruptive and often involve encryption or deletion of data that makes systems inaccessible. This creates substantial downtime and complicates the recovery process for organizations, said Jason Cook, AVP of worldwide partner sales engineering at Rubrik.
AI is rapidly transforming industries, but its power comes with a hidden vulnerabilities: traditional security methods struggle to keep pace with the unique threats facing AI models.
Malicious attacks can harm your AI and damage your business.
The biggest challenge? Knowing what AI models you even have. Many...
In cybersecurity, the playing field can change at any given moment, so grit and adaptability are essential traits. Leaders can help their team members cultivate these qualities so they can meet the demands of their careers and contribute effectively to their organizations' security efforts.
The editorial team at Information Security Media Group interviewed 60 of the most well-known and influential leaders in the industry at RSA Conference 2024. Inside this 40-page CEO/Founder Compendium, you'll find insights on leadership, emerging trends in cybersecurity and the latest technologies.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing aitoday.io, you agree to our use of cookies.