Automating decision-making in the security operations center strengthens an organization's ability to detect, respond to and mitigate security threats effectively. But the focus has shifted from micro-automation to a unified platform, according to Michael Lyborg, CISO of Swimlane.
The recently released ISC2 workforce study highlights a staggering deficit of 4 million professionals needed in the cybersecurity industry. Despite the challenges, CISO Jon France sees room for optimism. "It's a great profession to come into - never a dull moment," he said.
Marta Rybczyńska, technical program manager at Eclipse Foundation, discussed best practices for reporting vulnerabilities, adopting AI and bridging the gap between developers and security researchers to adhere to cybersecurity best practices for open-source software.
U.S. regulators for the first time detailed the risks artificial intelligence poses to the financial system and classified the technology as an "emerging vulnerability." The Financial Stability Oversight Council in its annual report flagged AI's ability to introduce "certain risks."
Erhan Temurkan, technology and security director at Fleet Mortgages, shares his insights on the integration of generative AI into the multifaceted world of cybersecurity and the dynamic threat landscape. Organizations must find a balance between security and usability, he said.
Criminal use of social engineering at scale continues to surge, as AI-driven automation and easy access to stolen personal information enables attackers to create ever-more sophisticated and tough-to-detect assaults, says Sharon Conheady of First Defense Information Security.
Kai Roer, CEO and founder of Praxis Security Labs, delved into the transformative potential of generative AI in reshaping the mindset and behaviors of security teams and organizations. Amid the buzz around large language models, he highlighted the need for a proactive and adaptive approach.
A U.S. federal court at the behest of Microsoft seized multiple domains used by a Vietnamese cybercrime group that created 750 million fraudulent Microsoft accounts while raking in millions of dollars in illicit revenue. Storm-1152 also sold services to bypass CAPTCHA.
A sweeping executive order tasks AI developers with sharing the results of red-team safety tests with the federal government. But experts tell ISMG the guidance lacks clear directions and critical enforcement measures for federal agencies to review those tests and prevent major safety risks.
The evolving threat landscape is posing new challenges, which means cybersecurity organizations need to invest in security information and event management, behavioral-based threat detection and, ultimately, AI, said Durga Prasad Dube, executive vice president and global CISO at Reliance Industries.
Hackers are exploiting OAuth applications to compromise user accounts, manipulate and confer elevated privileges, and set up cryptomining operations, which has cost some organizations up to $1.5 million in losses, according to Microsoft's Threat Intelligence team.
Russia and China are expert at picking the "most difficult nexuses" in society - such as free speech protections in the United States - and using them against us, said Jeff Moss, creator of the Black Hat conference, as he outlined near-term geopolitical challenges facing cybersecurity defenders.
EU officials announced a compromise over a regulation on artificial intelligence in the works since 2021, making the trading bloc first in the world to comprehensively regulate the nascent technology. Europe understands "the importance of its role as global standard setter,” said Thierry Breton.
By the numbers, who has implemented GenAI in their organization? Who has a dedicated budget? And who understands the AI regulations for their industry? An expert panel discusses the findings of ISMG's First Annual Generative AI Study: Business Rewards vs. Security Risks.
XDR can help security organizations achieve better outcomes by ensuring simplification, consolidation, integration and automation in their cybersecurity environment. XDR integrates siloed security layers and helps to bridge the visibility gap, said CrowdStrike's Nitin Varma.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.