Apple said in a Friday statement it will delay the rollout of artificial intelligence-powered features on smartphones in Europe, citing European law meant to rein in the power of large tech companies. The smartphone giant said continental customers won't have access to Apple Intelligence this year.
Google's team of zero-day hunters say artificial intelligence can lead to improved automated threat identification and analysis. Researchers say that a framework allows LLMs to mimic the iterative, hypothesis-driven approach of human security experts.
The U.S. Treasury Department is proposing a new rule that would restrict Americans from investing in technology companies developing quantum information technology, semiconductors and certain AI systems in countries the White House previously identified as posing potential national security risks.
Critical infrastructure sectors face many potentially disruptive threats such as supply chain vulnerabilities and the growing dependency on space-based systems. But the top cyberthreats facing the U.S. are the People's Republic of China and emerging risks associated with AI and quantum computing.
Aman Sood began his career in cybersecurity as a help desk analyst, handling tasks such as resetting user passwords and providing technical support. He shares his journey from analyst to cybersecurity vice president, discusses the challenges and offers advice to aspiring security professionals.
Small and medium-sized businesses face mounting cybersecurity threats from AI-generated malware. Troy Leach, chief strategy officer at the Cloud Security Alliance, advises SMBs to implement continuous monitoring and automation to effectively mitigate risks.
Forrester senior analyst Tope Olufon discusses how CISOs face the challenge of shadow IT with generative AI. CISOs need to approach AI as they would any other technology, he says. "Create a threat model, not just based on best practices, but for your organization, and then build security for that."
The International Monetary Fund suggested that governments consider a fiscal approach to remedy the damages artificial intelligence has brought to the environment and the economy. The agency proposed imposing a green tax on AI-related carbon emissions and taxing excess profits.
The Cybersecurity and Infrastructure Security Agency is hosting a series of tabletop exercises through its flagship public-private collaborative while developing a new playbook for both sectors to better respond to emerging cybersecurity risks associated with artificial intelligence.
Researchers have found a new way of poisoning machine learning models that could allow hackers to steal data and manipulate the artificial intelligence unit's output. Using the Sleepy Pickle attack method, hackers can inject malicious code into the serialization process, said Trail of Bits.
Artificial intelligence technologies offer tremendous promise in healthcare, but it's crucial for organizations to carefully assess the complex data privacy concerns involved with different types of AI products and deployments, said Karen Habercoss, chief privacy officer at UChicago Medicine.
In the latest weekly update, ISMG editors discussed the upcoming North America Midwest Cybersecurity Summit, challenges and solutions regarding AI training data, and the implications of the new European Union Artificial Intelligence Act for CISOs.
The XDR market has matured significantly, Forrester found. Leading vendors such as Microsoft, Palo Alto Networks and CrowdStrike are supporting diverse telemetry sources and developing strategies to replace traditional SIEM tools. These advancements give better detection quality and cost management.
Implementing governance, risk and compliance in a global organization comes with challenges. The complexity increases with sophisticated cyberthreats and an evolving geopolitical landscape. Organizations must stay one step ahead, said Purvi Kay, head of cybersecurity GRC at BAE Systems.
Cybercriminal campaigns aided by generative AI and political misinformation campaigns by nation states are just two of the latest risks organizations are facing. That's why cyber risk management has become a focal point for CISOs, said Jon Clay, vice president of threat intelligence, Trend Micro.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.