article thumbnail

The Dark Side of AI in Cybersecurity — AI-Generated Malware

Palo Alto Networks

In a thought-provoking interview on the Threat Vector podcast , Palo Alto Networks researchers Bar Matalon and Rem Dudas shed light on their groundbreaking research into AI-generated malware and shared their predictions for the future of AI in cybersecurity. And there is a bit of a longer version for that answer.

Malware 67
article thumbnail

5 Reasons Why NIS2 Directive Preparation Should Start Now, Part Two: Implementation Takes Time

Ivanti

So, in this post, I’ll walk you through how to resolve your weakest security issues before the NIS2 Directive deadline hits by addressing these three key areas: Inform management about your cybersecurity gaps Correctly implementing new organisation and technical security measures Find time to train all of your employees 1.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cybersecurity Snapshot: Cyber Agencies Offer Secure AI Tips, while Stanford Issues In-Depth AI Trends Analysis, Including of AI Security

Tenable

funding, technical expertise), and the infrastructure used (i.e., The report, divided into nine chapters, covers topics including research and development; technical performance; responsible AI; and policy and governance. and the U.S. on premises, cloud, or hybrid),” reads the 11-page document.

article thumbnail

Digital Transformation Outpacing Financial Institution Security

Praxent

Traditional banking organizations today seek to leverage open core systems, fintech company partnerships and application programming interfaces to increase their digital visibility. Can bank and credit unions overcome vulnerabilities to meet a new demand for digital banking.

article thumbnail

Key FAQs Related to Ivanti Connect Secure, Policy Secure and ZTA Gateway Vulnerabilities

Ivanti

We strongly advise customers using Ivanti Connect Secure, Ivanti Policy Secure and ZTA gateways to run Ivanti’s previously released External Integrity Checker Tool (ICT) in combination with best-practice security monitoring. How does a customer know if they’ve been compromised? What should customers do if they have been compromised?

article thumbnail

A Candid Conversation about a Career in Cybersecurity: Q&A with Daniel Spicer

Ivanti

I implemented their incident response and forensics program and led investigations. As budget was limited, I flexed my technical skills to build the tools that we needed. At Ivanti, I enjoy advising how to make our technology better and protect our customers. Q: What do you look for in a potential hire?

article thumbnail

Architect defense-in-depth security for generative AI applications using the OWASP Top 10 for LLMs

AWS Machine Learning - AI

What operational and technical best practices can I integrate into how my organization builds generative AI LLM applications to manage risk and increase confidence in generative AI applications using LLMs? You should begin by extending your existing security, assurance, compliance, and development programs to account for generative AI.