article thumbnail

10 things to watch out for with open source gen AI

CIO

According to Stanford’s AI Index Report, released in April, 149 foundation models were released in 2023, two-thirds of them open source. A model trained on, say, an archive of flat earth conspiracy theories will be bad at answering science questions, or a model fine-tuned by North Korean hackers might be bad at correctly identifying malware.

article thumbnail

Guarding the gates: a look at critical infrastructure security in 2023

CIO

As the end of 2023 approaches, it becomes imperative to assess the current landscape of cybersecurity threats, explore potential strategies to combat them, and explore the new practice measures that can be taken. A BCP typically includes four steps: business impact analysis, recovery strategies, plan development, and testing and exercises.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to manage cloud exploitation at the edge

CIO

According to the 2023 Verizon Data Breach Investigations Report (DBIR), the majority of cyber attacks are led by organized criminals looking to disrupt business and steal data to sell. Malware Distribution: Cloud exploitation can involve hosting or distributing malware through cloud-based platforms or services.

Cloud 246
article thumbnail

Cloudy with a chance of threats: Advice for mitigating the top cyber threats of 2024

Lacework

Developers are building systems and applications faster than ever, but this creates more risks and vulnerabilities for hackers to exploit. By integrating risk and threat insights, teams can prioritize the actions that matter most, like fixing critical vulnerabilities and stopping the most dangerous threat actors. Malware (e.g.,

article thumbnail

Driving Customer Loyalty with Secure and Modern Apps

CIO

According to a PwC report , one in three consumers (32%) say they will walk away from a brand they love after just one bad experience. A pod-based team structure can be set up where you have all the stakeholders responsible for delivering the app. Leveraging the right set of technologies will be a key success criterion for such apps.

article thumbnail

Cybersecurity Snapshot: A Look Back at Key 2023 Cyber Data for GenAI, Cloud Security, Vulnerability Management, OT, Cyber Regulations and more

Tenable

As we bid adieu to 2023, we highlight major trends that impacted cybersecurity professionals in the past 12 months. 1 - Excitement over GenAI for cyber defense Artificial intelligence, and generative AI (GenAI) specifically, captured the world’s imagination in 2023, as we all marveled at the technology’s potential for good and evil.

article thumbnail

Cybersecurity Snapshot: Critical Infrastructure Orgs Must Beware of China-backed Volt Typhoon, Cyber Agencies Warn

Tenable

Plus, ransomware gangs netted $1 billion-plus in 2023. critical infrastructure IT and operational technology security teams, listen up. Thus, IT and OT security teams at critical infrastructure organizations should urgently apply the advisory’s mitigations and use its guidance to hunt for malicious activity.