The Urgent Need To Protect AIAI in cybersecurity brings both enhanced defense capabilities and heightened risks that demand urgent attention.
Cybersecurity in the AI Era: Evolve Faster Than the Threats or Get Left BehindAI is rapidly transforming cybersecurity, necessitating skilled application by defenders.While AI can enhance threat detection, improper implementation increases risks.
How AI is Used in Proactive Cybersecurity OperationsAI is crucial for proactive cybersecurity operations, helping detect, prevent threats, and predict future attacks.
The Urgent Need To Protect AIAI in cybersecurity brings both enhanced defense capabilities and heightened risks that demand urgent attention.
Cybersecurity in the AI Era: Evolve Faster Than the Threats or Get Left BehindAI is rapidly transforming cybersecurity, necessitating skilled application by defenders.While AI can enhance threat detection, improper implementation increases risks.
How AI is Used in Proactive Cybersecurity OperationsAI is crucial for proactive cybersecurity operations, helping detect, prevent threats, and predict future attacks.
Phishing remains the preferred technique among threat actorsPhishing is the primary method used by cybercriminals, with significant increases in sophisticated targeting techniques.
New Linux Malware 'Auto-Color' Grants Hackers Full Remote Access to Compromised SystemsAuto-Color malware targets universities and organizations, allowing full remote access and evading detection through various techniques.
Malware-free attacks surged in 2024 as attackers drop malicious software for legitimate toolsCyber attacks are increasingly malware-free, leveraging trusted services and valid accounts for malicious activities.
Security leaders discuss botnet attack against Microsoft 365 accountsA major botnet is using evolved tactics to launch password spraying attacks on Microsoft 365 accounts, evading traditional security detections.
Notorious crooks broke into a company network in 48 minutes. Here's how.Attackers are moving faster than ever, and so must defenders to prevent data breaches.
AI vs AI: In the age of AI-driven attacks, only AI can keep upGenerative AI is transforming cybersecurity by enabling sophisticated attacks that SOC teams must counter with their own AI tools.
Phishing remains the preferred technique among threat actorsPhishing is the primary method used by cybercriminals, with significant increases in sophisticated targeting techniques.
New Linux Malware 'Auto-Color' Grants Hackers Full Remote Access to Compromised SystemsAuto-Color malware targets universities and organizations, allowing full remote access and evading detection through various techniques.
Malware-free attacks surged in 2024 as attackers drop malicious software for legitimate toolsCyber attacks are increasingly malware-free, leveraging trusted services and valid accounts for malicious activities.
Security leaders discuss botnet attack against Microsoft 365 accountsA major botnet is using evolved tactics to launch password spraying attacks on Microsoft 365 accounts, evading traditional security detections.
Notorious crooks broke into a company network in 48 minutes. Here's how.Attackers are moving faster than ever, and so must defenders to prevent data breaches.
AI vs AI: In the age of AI-driven attacks, only AI can keep upGenerative AI is transforming cybersecurity by enabling sophisticated attacks that SOC teams must counter with their own AI tools.
Sysdig scores security - Machines 40,000 : Humans 1Machine identities greatly outnumber human identities, posing significant risks in cloud security.
Hunters Announces New AI Capabilities with Pathfinder AI for Smarter SOC Automation - DevOps.comHunters introduces Pathfinder AI for enhanced, autonomous threat detection and response in Security Operations Centers (SOCs).
Exabeam promises a revolution for SOC automationExabeam's New-Scale SOC platform updates enhance threat detection and integration through Open API support and New-Scale Analytics.
Hunters Announces New AI Capabilities with Pathfinder AI for Smarter SOC Automation - DevOps.comHunters introduces Pathfinder AI for enhanced, autonomous threat detection and response in Security Operations Centers (SOCs).
Exabeam promises a revolution for SOC automationExabeam's New-Scale SOC platform updates enhance threat detection and integration through Open API support and New-Scale Analytics.
Army experimenting with AI to supplement physical securityThe US Army's Scylla AI can identify threats from a mile away with over 96% accuracy, transforming security operations.
Product spotlight on video surveillanceAdvancements in video surveillance integrate AI technology for enhanced threat detection and security management across various sectors.
Army experimenting with AI to supplement physical securityThe US Army's Scylla AI can identify threats from a mile away with over 96% accuracy, transforming security operations.
Product spotlight on video surveillanceAdvancements in video surveillance integrate AI technology for enhanced threat detection and security management across various sectors.
Stat(s) Of The Week: AI Can Perpetuate And Prevent ScamsAI-powered deepfake technology poses an existential threat to businesses, yet its application can lead to lower cyber insurance costs.
Using artificial intelligence (AI) to track and analyze cyber risksAI is set to transform cyber security, improving threat detection and productivity but may lead to overreliance by professionals.
AI security: Safeguarding schools beyond surveillanceSchools rely on surveillance cameras (91%) but struggle to keep pace with evolving security threats. AI systems enhance proactive threat detection capabilities.
Using artificial intelligence (AI) to track and analyze cyber risksAI is set to transform cyber security, improving threat detection and productivity but may lead to overreliance by professionals.
AI security: Safeguarding schools beyond surveillanceSchools rely on surveillance cameras (91%) but struggle to keep pace with evolving security threats. AI systems enhance proactive threat detection capabilities.
Rubrik and Mandiant plan to transform incident response with new dealRubrik partners with Mandiant for faster threat detection and recovery times.
API and data security remain top threatsFinancial institutions face challenges in compliance and understanding API activity, making them vulnerable to threats and breaches.
How DHS is hustling to leverage-and contain-generative AIThe Department of Homeland Security utilizes AI to analyze threat data for various purposes, from preventing attacks to generating images for investigations.
Sonatype exposes malicious PyPI package 'pytoileur'Sonatype discovered a malicious PyPI package 'pytoileur' within a larger campaign, showcasing the importance of robust security measures in the coding community.
How DHS is hustling to leverage-and contain-generative AIThe Department of Homeland Security utilizes AI to analyze threat data for various purposes, from preventing attacks to generating images for investigations.
Sonatype exposes malicious PyPI package 'pytoileur'Sonatype discovered a malicious PyPI package 'pytoileur' within a larger campaign, showcasing the importance of robust security measures in the coding community.
Westcon-Comstor and Vector AI expand European distribution agreementWestcon-Comstor expands partnership with AI security provider Vector AI into UK, Ireland, and Nordic markets.
CrowdStrike CEO: Embrace AI or be crushed by cyber crooksThose who fail to embrace AI in security operations will be vulnerable to modern cyber threats.
Versa Networks adds AI capabilities to SASE platform | Computer WeeklyVersa Networks enhances AI/ML capabilities in SASE platform to improve threat detection and data protection.