article thumbnail

ChatGPT and Your Organisation: How to Monitor Usage and Be More Aware of Security Risks

CIO

OpenAI’s ChatGPT has made waves across not only the tech industry but in consumer news the last few weeks. In one example , a doctor uploaded their patient’s name and medical condition in order to generate a prior authorisation letter to the patient’s insurance company. Phishing 2.0: ChatGPT won’t show up there either.

ChatGPT 210
article thumbnail

Cybersecurity Snapshot: A ChatGPT Special Edition About What Matters Most to Cyber Pros

Tenable

1 - Don’t use ChatGPT for any critical cybersecurity work yet Despite exciting tests of ChatGPT for tasks such as finding coding errors and software vulnerabilities, the chatbot’s performance can be very hit-or-miss and its use as a cybersecurity assistant should be – at minimum – manually and carefully reviewed.

ChatGPT 129
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Available Now: Ransomware Active Attack Response Best Common Practices Document

CableLabs

Research shows that more than a third of all businesses were victims of ransomware in 2021 , and now over a quarter of all malware has been reprovisioned for ransom. The fifth and sixth sections explore the people (both internal and external to the organization) and the technologies at play in the recovery activities.

article thumbnail

Endpoint Security Basics: What It Does, How It Works, Controls, Technologies and More

Kaseya

In this blog, we’ll discuss topics such as the significance of endpoint security, endpoint security controls and technologies, what sets endpoint security apart from network security and more. Because these devices connect to the internet, they are vulnerable to malware and hacking. Let’s get started.

article thumbnail

IoT Adoption in Healthcare Brings Security Opportunities

CIO

Yet, enabling these amazing patient outcomes through IoT technology brings with it an associated set of security risks to hospitals and patients that are in the news far too often. Medical facilities rely on their technology to do the same. The impact of medical IoT device vulnerabilities is serious and potentially life-threatening.

IoT 186
article thumbnail

Cybersecurity Snapshot: GenAI Drives Broader Use of Artificial Intelligence Tech for Cyber

Tenable

1 - Survey: GenAI to boost overall AI use for cybersecurity Business and technology leaders’ fascination with the potential benefits of generative AI tools is accelerating the adoption of artificial intelligence in general for cybersecurity. Dive into six things that are top of mind for the week ending October 27.

article thumbnail

Cybersecurity Snapshot: Log4j Anniversary, CI/CD Risks, Infostealers, Email Attacks, OT Security

Tenable

Get the latest on the anniversary of the Log4j crisis; OWASP’s top CI/CD risks; a surge of infostealer malware; the fund transfer fraud — business email compromise connection; and more! . 3 - Attackers boost use of infostealer malware. Infostealers Malware Advertisements and Pricing from July to October 2022.