Remove Data Remove Malware Remove Security Remove Systems Review
article thumbnail

The Dark Side of AI in Cybersecurity — AI-Generated Malware

Palo Alto Networks

“AI’s Impact in Cybersecurity” is a blog series based on interviews with a variety of experts at Palo Alto Networks and Unit 42, with roles in AI research, product management, consulting, engineering and more. We did that for different operating systems – for Windows, macOS and Linux. That was the first stage I'd say.”

Malware 84
article thumbnail

Guarding the gates: a look at critical infrastructure security in 2023

CIO

As the end of 2023 approaches, it becomes imperative to assess the current landscape of cybersecurity threats, explore potential strategies to combat them, and explore the new practice measures that can be taken. As technology advances, so too does the sophistication of threats to these essential systems.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Top 5 Security Trends for CIOs

CIO

With every such change comes opportunity–for bad actors looking to game the system. Cybersecurity cannot stand still, or the waves of innovation will overrun the shores. Multifactor authentication fatigue and biometrics shortcomings Multifactor authentication (MFA) is a popular technique for strengthening the security around logins.

Trends 317
article thumbnail

Protecting Your Supply Chain with Data-Aware Security

CIO

In a previous article , we talked about the need for organizations to secure data wherever it resides. The complexity of today’s supply chains brings that need into sharp focus, while highlighting some of the challenges of successfully protecting data. Securing the cloud. The bottom line?

Data 264
article thumbnail

5 Unique Challenges for AI in Cybersecurity

Palo Alto Networks

Applied AI in cybersecurity has many unique challenges, and we will take a look into a few of them that we are considering the most important. One — Lack of Labeled Data Unlike many other fields, data and labels are scarce in the cybersecurity space and usually require highly skilled labor to generate.

article thumbnail

Fixed wireless access (FWA) is a secure networking option

CIO

When making decisions about network access, businesses need to be aware of and assess the security implications associated with network technology to help keep their digital assets protected. Cyber hygiene best practices include device security , cyber security education , and secure networking strategies.

Wireless 246
article thumbnail

Cybersecurity Snapshot: A Look Back at Key 2023 Cyber Data for GenAI, Cloud Security, Vulnerability Management, OT, Cyber Regulations and more

Tenable

As we bid adieu to 2023, we highlight major trends that impacted cybersecurity professionals in the past 12 months. Learn how the cyber world changed in areas including artificial intelligence, CNAPP, IAM security, government oversight and OT security. Cybersecurity teams were no exception.