In the future, deepfake technology will have a significant impact on newer forms of authentication such as voice and facial recognition and pose new challenges to defenders, said Ofer Friedman, chief business development officer at AU10TIX, an Israel-headquartered identity verification company.
In this special edition at Black Hat Europe 2023 in London, three ISMG editors cover the highlights of the conference, including a resounding call for better collaboration between government agencies and the private sector, regulatory trends, and the cautionary tale of ex-Uber CISO Joe Sullivan.
In the latest weekly update, editors at ISMG discuss the rampant rise in healthcare sector attacks and breaches in 2023, the most common vulnerabilities and targets, and remember the life of the Steve Katz, the world's first CISO who inspired generations of security leaders.
In the latest "Proof of Concept," Chris Hughes, co-founder and CISO of Aquia, join editors at ISMG to discuss the nuances around software liability, how organizations are integrating standards development practices, and guidelines for determining when a supplier qualifies for safe harbor.
Enterprises have struggled to strike a balance between speed and security and stability, said Sean D. Mack, author, speaker and former CIO and CISO at Wiley. DevSecOps is the superpower that resolves this long-standing conflict and allows organizations to deliver software faster and more securely.
The recently released National Security Policy emphasizes building cybersecurity resilience in the Philippines. To do this, businesses must focus on protecting identity, push for cybersecurity education and protect critical infrastructure from external cyberattacks, said CISO Charmaine Valmonte.
Most experts say that while generative AI has only been in the spotlight for a year, the technology of AI and machine learning first arose decades ago in the financial services industry. Rajat Sen, founder of Discerning Consulting Services, explained why gen AI is a major leap over machine learning.
XDR can help security organizations achieve better outcomes by ensuring simplification, consolidation, integration and automation in their cybersecurity environment. XDR integrates siloed security layers and helps to bridge the visibility gap, said CrowdStrike's Nitin Varma.
A recent spike in ransomware attacks has prompted federal regulators and the American Hospital Association to issue urgent warnings to hospitals and other healthcare firms to prevent potential exploitation of the Citrix Bleed software flaw affecting some NetScaler ADC and NetScaler Gateway devices.
Steve Katz, the world's first CISO, died Saturday night while under hospice care in Long Island, New York. He left a strong legacy - not just as a pioneer and trailblazer in cybersecurity leadership but also as a beloved colleague and mentor who generously shared his time and wisdom.
According to a recent pulse poll from ISACA on generative AI, only 6% of respondents' organizations are providing training to all staff on AI, and more than half - 54% - say that no AI training is provided at all, even to teams directly affected by AI.
In the latest weekly update, four editors at Information Security Media Group discuss Sam Altman and OpenAI's brief leadership nightmare, the state of generative AI one year after the general release of ChatGPT, and how police nabbed a suspected ransomware group ringleader in Ukraine.
In this era of extended digital transformation projects and emerging AI technologies, understanding the implications of technological advancement - and the risks that come with innovation - is increasingly critical for enterprise security, according to Sambasivan G, CFO at Tata Play.
Nov. 30 marks the one-year public birthday of ChatGPT. Gartner's Avivah Litan shared insights on the current state and future of generative AI, as well as the potential market after-effects of the pre-Thanksgiving drama involving OpenAI, its board and fired/reinstated CEO Sam Altman.
Indonesian data protection experts recommend understanding the types of personal data collected and their purpose, urging companies to leverage established frameworks such as NIST and ISO 27701. These frameworks should align with the regulations of each country.