Remove Malware Remove Security Remove Systems Review Remove Technical Review
article thumbnail

The Dark Side of AI in Cybersecurity — AI-Generated Malware

Palo Alto Networks

“AI’s Impact in Cybersecurity” is a blog series based on interviews with a variety of experts at Palo Alto Networks and Unit 42, with roles in AI research, product management, consulting, engineering and more. We did that for different operating systems – for Windows, macOS and Linux. That was the first stage I'd say.”

Malware 84
article thumbnail

Top 5 Security Trends for CIOs

CIO

Explosive technology innovations. Generational shifts in technological expectations. With every such change comes opportunity–for bad actors looking to game the system. Cybersecurity cannot stand still, or the waves of innovation will overrun the shores. The post-pandemic reality. Macroeconomic turbulence.

Trends 316
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Guarding the gates: a look at critical infrastructure security in 2023

CIO

As the end of 2023 approaches, it becomes imperative to assess the current landscape of cybersecurity threats, explore potential strategies to combat them, and explore the new practice measures that can be taken. Thankfully, as new dangers arise, we also see the emergence of groundbreaking technologies that can help us combat them.

article thumbnail

AI and automation will play an increasing role in technology

CIO

By Ram Velaga, Senior Vice President and General Manager, Core Switching Group This article is a continuation of Broadcom’s blog series: 2023 Tech Trends That Transform IT. Stay tuned for future blogs that dive into the technology behind these trends from more of Broadcom’s industry-leading experts.

article thumbnail

Fixed wireless access (FWA) is a secure networking option

CIO

When making decisions about network access, businesses need to be aware of and assess the security implications associated with network technology to help keep their digital assets protected. Cyber hygiene best practices include device security , cyber security education , and secure networking strategies.

Wireless 246
article thumbnail

Don’t gamble with your identity verification practices

CIO

Earlier this year, I wrote about the importance of organizations reviewing their password management strategies. According to a Reuters report, these ransomware bandits also breached the systems of several other companies operating in manufacturing, retail, and technology. IBM Security pegged that same number higher, to 95%.

article thumbnail

Tenable OT Security: 2023 Year in Review

Tenable

As we reflect on the many accomplishments Tenable OT Security achieved in 2023, one thing is clear: we couldn’t have done it without the support and collaboration of our customers and partners. I can easily say 2023 was a good year for Tenable OT Security. We believe all cyber risk needs to be viewed, ultimately, as operational risk.