article thumbnail

The Dark Side of AI in Cybersecurity — AI-Generated Malware

Palo Alto Networks

“AI’s Impact in Cybersecurity” is a blog series based on interviews with a variety of experts at Palo Alto Networks and Unit 42, with roles in AI research, product management, consulting, engineering and more. And there is a bit of a longer version for that answer. It's a lot more complex than it seems at first."

Malware 84
article thumbnail

Code Review Services from Senior Architects

Mobilunity

This kind of code is critical for your end product, and it’s unattainable without professional source code review services. From this article, you’ll learn how to employ a code reviewer or hire QA tester. A code auditor can also help you identify security violations and errors in architecture design.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

5 Essential Tips for Writing Computer Science Research Project

The Crazy Programmer

Working on computer science research projects can be a difficult task, partly because computer science projects are unlike research projects in any other discipline. Depending on the area of study, a research project can be defined differently. Writing a paper about the research project is a common aspect to a research project.

Research 147
article thumbnail

ChatGPT and Your Organisation: How to Monitor Usage and Be More Aware of Security Risks

CIO

People are looking to the AI chatbot to provide all sorts of assistance, from writing code to translating text, grading assignments or even writing songs. In another example , Samsung staff leveraged ChatGPT to fix errors in some source code but leaked confidential data, including notes from meetings and performance-related data.

ChatGPT 214
article thumbnail

AI and automation will play an increasing role in technology

CIO

As a current example, consider ChatGPT by OpenAI, an AI research and deployment company. This application has been in the news lately due to the quality and detail of its outputs. It’s also been flagged as a risk: cybersecurity companies have identified bad actors using ChatGPT to create malware. But how good can it be?

article thumbnail

AI's Offensive & Defensive Impacts

Palo Alto Networks

{{interview_audio_title}} 00:00 00:00 Volume Slider 10s 10s 10s 10s Seek Slider “AI’s Impact in Cybersecurity” is a blog series based on interviews with a variety of experts at Palo Alto Networks and Unit 42, with roles in AI research, product management, consulting, engineering and more. Sikorski explains: "They can build trust very quickly.

article thumbnail

Leaky Apps – How Banning Them Builds App Security

Ivanti

Employees rely on software to help them do their jobs more efficiently, save time and increase their productivity. But not all software is created equal, and not all apps are implemented securely. In deciding, the organization should consider several types of risk caused by leaky apps or other software.