Cybersecurity crisis communication: What to do
Security Intelligence
by Jennifer Gregory
6d ago
Cybersecurity experts tell organizations that the question is not if they will become the target of a cyberattack but when. Often, the focus of response preparedness is on the technical aspects — how to stop the breach from continuing, recovering data and getting the business back online. While these tasks are critical, many organizations overlook a key part of response preparedness: crisis communication. Because a brand’s reputation often takes a significant hit, a cyberattack can significantly affect the company’s future success and revenue. However, effective crisis communication helps incr ..read more
Visit website
Brands are changing cybersecurity strategies due to AI threats
Security Intelligence
by Jennifer Gregory
1w ago
 Over the past 18 months, AI has changed how we do many things in our work and professional lives — from helping us write emails to affecting how we approach cybersecurity. A recent Voice of SecOps 2024 study found that AI was a huge reason for many shifts in cybersecurity over the past 12 months. Interestingly, AI was both the cause of new issues as well as quickly becoming a common solution for those very same challenges. The study was conducted with Deep Instinct and Sapio Research by surveying 500 senior cybersecurity professionals working for U.S. companies with at least 1,000 employ ..read more
Visit website
39% of MSPs report major setbacks when adapting to advanced security technologies
Security Intelligence
by Josh Nadeau
1w ago
SOPHOS, a leading global provider of managed security solutions, has recently released its annual MSP Perspectives report for 2024. This most recent report provides insights from 350 different managed service providers (MSPs) across the United States, United Kingdom, Germany and Australia on modern cybersecurity tools solutions. It also documents newly discovered risks and challenges in the industry. Among the many findings of this most recent report, one of the most concerning trends is the difficulties MSPs face when adapting their service offerings to combat the latest surge of next-generat ..read more
Visit website
Digital solidarity vs. digital sovereignty: Which side are you on?
Security Intelligence
by Jonathan Reed
1w ago
The landscape of international cyber policy continues to evolve rapidly, reflecting the dynamic nature of technology and global geopolitics. Central to this evolution are two competing concepts: digital solidarity and digital sovereignty. The U.S. Department of State, through its newly released International Cyberspace and Digital Policy Strategy, has articulated a clear preference for digital solidarity, positioning it as a counterpoint to the protectionist approach of digital sovereignty. What are the main differences between these two concepts, and why does it matter? Let’s find out. What i ..read more
Visit website
A decade of global cyberattacks, and where they left us
Security Intelligence
by Mike Elgan
1w ago
The cyberattack landscape has seen monumental shifts and enormous growth in the past decade or so. I spoke to Michelle Alvarez, X-Force Strategic Threat Analysis Manager at IBM, who told me that the most visible change in cybersecurity can be summed up in one word: scale. A decade ago, “’mega-breaches’ were relatively rare, but now feel like an everyday occurrence.” A summary of the past decade in global cyberattacks The cybersecurity landscape has been impacted by major world events, especially in recent years. These include the COVID-19 pandemic, as well as recent military conflicts between ..read more
Visit website
Does your business have an AI blind spot? Navigating the risks of shadow AI
Security Intelligence
by Charles Owen-Jackson
2w ago
With AI now an integral part of business operations, shadow AI has become the next frontier in information security. Here’s what that means for managing risk. For many organizations, 2023 was the breakout year for generative AI. Now, large language models (LLMs) like ChatGPT have become household names. In the business world, they’re already deeply ingrained in numerous workflows, whether you know about it or not. According to a report by Deloitte, over 60% of employees now use generative AI tools in their day-to-day routines. The most vocal supporters of generative AI often see it as a panace ..read more
Visit website
It all adds up: Pretexting in executive compromise
Security Intelligence
by Doug Bonderud
2w ago
Executives hold the keys to the corporate kingdom. If attackers can gain the trust of executives using layered social engineering techniques, they may be able to access sensitive corporate information such as intellectual property, financial data or administrative control logins and passwords. While phishing remains the primary pathway to executive compromise, increasing C-suite awareness of this risk requires a more in-depth approach from attackers: Pretexting. What is pretexting? Pretexting is the use of a fabricated story or narrative — a “pretext” — to develop a relationship with executive ..read more
Visit website
ChatGPT 4 can exploit 87% of one-day vulnerabilities
Security Intelligence
by Jennifer Gregory
2w ago
Since the widespread and growing use of ChatGPT and other large language models (LLMs) in recent years, cybersecurity has been a top concern. Among the many questions, cybersecurity professionals wondered how effective these tools were in launching an attack. Cybersecurity researchers Richard Fang, Rohan Bindu, Akul Gupta and Daniel Kang recently performed a study to determine the answer. The conclusion: They are very effective. ChatGPT 4 quickly exploited one-day vulnerabilities During the study, the team used 15 one-day vulnerabilities that occurred in real life. One-day vulnerabilities refe ..read more
Visit website
Vulnerability management empowered by AI
Security Intelligence
by Madhuri Vijaykumar
3w ago
Vulnerability management involves an ongoing cycle of identifying, prioritizing and mitigating vulnerabilities within software applications, networks and computer systems. This proactive strategy is essential for safeguarding an organization’s digital assets and maintaining its security and integrity. To make the process simpler and easier, we need to involve artificial intelligence (AI). Let’s examine how AI is effective for vulnerability management and how it can be implemented. Artificial intelligence in vulnerability management Using AI will take vulnerability management to the next level ..read more
Visit website
The dangers of anthropomorphizing AI: An infosec perspective
Security Intelligence
by Charles Owen-Jackson
3w ago
The generative AI revolution is showing no signs of slowing down. Chatbots and AI assistants have become an integral part of the business world, whether for training employees, answering customer queries or something else entirely. We’ve even given them names and genders and, in some cases, distinctive personalities. There are two very significant trends happening in the world of generative AI. On the one hand, the desperate drive to humanize them continues, sometimes recklessly and with little regard for the consequences. At the same time, according to Deloitte’s latest State of Generative AI ..read more
Visit website

Follow Security Intelligence on FeedSpot

Continue with Google
Continue with Apple
OR