article thumbnail

The Dark Side of AI in Cybersecurity — AI-Generated Malware

Palo Alto Networks

In a thought-provoking interview on the Threat Vector podcast , Palo Alto Networks researchers Bar Matalon and Rem Dudas shed light on their groundbreaking research into AI-generated malware and shared their predictions for the future of AI in cybersecurity. We did that for different operating systems – for Windows, macOS and Linux.

Malware 83
article thumbnail

Don’t gamble with your identity verification practices

CIO

Earlier this year, I wrote about the importance of organizations reviewing their password management strategies. According to reports, MGM and Caesars were both customers of identity management company Okta. The formula is well-known: black hat hackers encrypt a company’s data and demand a ransom payment for the decryption key.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to manage cloud exploitation at the edge

CIO

Companies that have embraced the cloud need to understand the Shared Responsibility Model: a security and compliance framework that explains what shared infrastructure and systems the cloud provider is responsible for maintaining and how a customer is responsible for operating systems, data, and applications utilizing the cloud.

Cloud 246
article thumbnail

AI and automation will play an increasing role in technology

CIO

As Michael Dell predicts , “Building systems that are built for AI first is really inevitable.” As a current example, consider ChatGPT by OpenAI, an AI research and deployment company. This application has been in the news lately due to the quality and detail of its outputs. But how good can it be?

article thumbnail

8 big IT failures of 2023

CIO

IT provides the plumbing for just about every company in existence today. We’ve gathered eight instances of big tech failures that struck companies and other organizations in 2023. And because the incumbent companies have been around for so long, many are running IT systems with some elements that are years or decades old.

Airlines 345
article thumbnail

Leaky Apps – How Banning Them Builds App Security

Ivanti

Insider threats The risk from insider threats is a major concern in app security, due to the difficulty of detecting malicious insiders who already have legitimate access to systems and data. On top of malicious software, apps can provide unauthorized access to your system, allowing attackers to gain access and exploit your data.

article thumbnail

Tenable OT Security: 2023 Year in Review

Tenable

Tenable OT Security: 2023 product updates Tenable OT Security gives companies the ability to see and secure any digital asset on any computing platform. Siemens Energy announced it would integrate Tenable OT Security into its Omnivise T3000 control system as a network intrusion detection system (NIDS).