AI, machine learning and large language models are not new, but they are coming to fruition with the mass adoption of generative AI. For cybersecurity professionals, these are "exciting times we live in," said Dan Grosu, CTO and CISO at Information Security Media Group.
The National Institute of Standards and Technology is failing to provide adequate information about how it plans to award funding opportunities to research institutions and private organizations through a newly established Artificial Intelligence Safety Institute, according to a group of lawmakers.
Healthcare CISOs must recognize the real and imminent threat of AI-fueled cyberattacks and take proactive steps, including the deployment of AI-based security tools, to protect patient data and critical healthcare services, said Troy Hawes, managing director at consulting firm Moss Adams.
Marc Lueck, EMEA CISO at Zscaler, describes generative AI as the bridge between traditional AI and machine learning. He said it offers the ability to engage in humanlike conversations while tapping into vast data repositories and is both a powerful defense mechanism and a potential vulnerability.
The U.S. National Institute of Standards and Technology is soliciting public guidance on implementation of an October White House executive order seeking safeguards for artificial intelligence. The order directed the agency to establish guidelines for developers of AI to conduct red-teaming tests.
The U.K.'s highest court on Wednesday affirmed that an artificial intelligence system cannot be granted ownership of patents. AI "is not a person, let alone a natural person and it did not devise any relevant invention," wrote Justice David Kitchin.
Automating decision-making in the security operations center strengthens an organization's ability to detect, respond to and mitigate security threats effectively. But the focus has shifted from micro-automation to a unified platform, according to Michael Lyborg, CISO of Swimlane.
OpenAI on Monday released a framework it says will help assess and protect against the "catastrophic risks" posed by the "increasingly powerful" AI models it develops. "We believe the scientific study of catastrophic risks from AI has fallen far short of where we need to be," the company said.
The recently released ISC2 workforce study highlights a staggering deficit of 4 million professionals needed in the cybersecurity industry. Despite the challenges, CISO Jon France sees room for optimism. "It's a great profession to come into - never a dull moment," he said.
U.S. regulators for the first time detailed the risks artificial intelligence poses to the financial system and classified the technology as an "emerging vulnerability." The Financial Stability Oversight Council in its annual report flagged AI's ability to introduce "certain risks."
Erhan Temurkan, technology and security director at Fleet Mortgages, shares his insights on the integration of generative AI into the multifaceted world of cybersecurity and the dynamic threat landscape. Organizations must find a balance between security and usability, he said.
The U.K. national institute for artificial intelligence urged the government to establish red lines against the use of generative AI in scenarios in which the technology could take an irreversible action without direct human oversight. The U.K. government has sought to cultivate responsible AI.
Attorney Jonathan Armstrong examines four cybersecurity legal trends that will shape 2024: heightened personal liability for security leaders, the impact of ransomware, legal and ethical concerns about AI, and the influence of shadow IT, especially regarding messaging apps.
The Biden administration is heavily counting on "responsibly" leveraging AI as part of a five-year strategy that aims to harness data to enhance the health and wellness of Americans. That includes ambitions to drastically improve cancer care and reduce cancer deaths, among other top goals.
Criminal use of social engineering at scale continues to surge, as AI-driven automation and easy access to stolen personal information enables attackers to create ever-more sophisticated and tough-to-detect assaults, says Sharon Conheady of First Defense Information Security.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.