article thumbnail

The cyber pandemic: AI deepfakes and the future of security and identity verification

CIO

Security and risk management pros have a lot keeping them up at night. The era of AI deepfakes is fully upon us, and unfortunately, today’s identity verification and security methods won’t survive. And the only way to do this is to leverage advanced security technologies such as mobile cryptography.

article thumbnail

Top 5 Security Trends for CIOs

CIO

Cybersecurity cannot stand still, or the waves of innovation will overrun the shores. Keeping up–and hopefully, staying ahead–presents new challenges. Multifactor authentication fatigue and biometrics shortcomings Multifactor authentication (MFA) is a popular technique for strengthening the security around logins.

Trends 317
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

TechCrunch+ roundup: Generative AI for proptech, cloud vendor shopping, cybersecurity fairy tales

TechCrunch

Using examples from presentations he’s analyzed in the past, Haje explains his framework to help first-timers articulate the value their startup creates and why it’s poised to grow: Who has this problem? Cybersecurity teams, beware: The defender’s dilemma is a lie Image Credits: A.

article thumbnail

Cybersecurity Snapshot: New Guide Details How To Use AI Securely, as CERT Honcho Tells CISOs To Sharpen AI Security Skills Pronto

Tenable

1 - Using AI securely: Global cyber agencies publish new guide Is your organization – like many others – aggressively adopting artificial intelligence to boost operational efficiency? If so, you might want to check out a new guide published this week about how businesses can use AI securely.

article thumbnail

Cybersecurity Snapshot: CISA Says Midnight Blizzard Swiped U.S. Gov’t Emails During Microsoft Hack, Tells Fed Agencies To Take Immediate Action

Tenable

Plus, a new survey shows cybersecurity pros are guardedly optimistic about AI. And the NSA is sharing best practices for data security. Cybersecurity and Infrastructure Security Agency (CISA) in its Emergency Directive 24-02 , sent to federal civilian agencies last week and made public this week. And much more!

article thumbnail

Harnessing the Power of AI in Cybersecurity — Predictions and Solutions

Palo Alto Networks

{{interview_audio_title}} 00:00 00:00 Volume Slider 10s 10s 10s 10s Seek Slider “AI’s Impact in Cybersecurity” is a blog series based on interviews with a variety of experts at Palo Alto Networks and Unit 42 with roles in AI research, product management, consulting, engineering and more. Unfortunately, AI is a double-edged sword.

article thumbnail

CVE-2024-0204: Fortra GoAnywhere MFT Authentication Bypass Vulnerability

Tenable

CVE Description CVSSv3 CVE-2024-0204 Fortra GoAnywhere MFT Authentication Bypass Vulnerability 9.8 Its discovery is credited to security researchers Mohammed Eldeeb and Islam R Alater. Successful exploitation would allow an attacker to bypass authentication to create new users, including a user with administrator privileges.