NIST’s role in the global tech race against AI
Security Intelligence
by Josh Nadeau
38m ago
Last year, the United States Secretary of Commerce announced that the National Institute of Standards and Technology (NIST) has been put in charge of launching a new public working group on artificial intelligence (AI) that will build on the success of the NIST AI Risk Management Framework to address this rapidly advancing technology. However, recent budget cuts at NIST, along with a lack of strategy implementation, have called into question the agency’s ability to lead this critical effort. Ultimately, the success of this new government-mandated project will depend on NIST’s ability to overco ..read more
Visit website
Researchers develop malicious AI ‘worm’ targeting generative AI systems
Security Intelligence
by Mike Elgan
38m ago
Researchers have created a new, never-seen-before kind of malware they call the “Morris II” worm, which uses popular AI services to spread itself, infect new systems and steal data. The name references the original Morris computer worm that wreaked havoc on the internet in 1988. The worm demonstrates the potential dangers of AI security threats and creates a new urgency around securing AI models. New worm utilizes adversarial self-replicating prompt The researchers from Cornell Tech, the Israel Institute of Technology and Intuit, used what’s called an “adversarial self-replicating prompt ..read more
Visit website
Passwords, passkeys and familiarity bias
Security Intelligence
by Cian Walker
2d ago
As passkey (passwordless authentication) adoption proceeds, misconceptions abound. There appears to be a widespread impression that passkeys may be more convenient and less secure than passwords. The reality is that they are both more secure and more convenient — possibly a first in cybersecurity. Most of us could be forgiven for not realizing passwordless authentication is more secure than passwords. Thinking back to the first couple of use cases I was exposed to — a phone operating system (OS) and a banking app — there was an implied emphasis on convenience rather than security. Until very r ..read more
Visit website
Unpacking the NIST cybersecurity framework 2.0
Security Intelligence
by Doug Bonderud
6d ago
The NIST cybersecurity framework (CSF) helps organizations improve risk management using common language that focuses on business drivers to enhance cybersecurity. NIST CSF 1.0 was released in February 2014, and version 1.1 in April 2018. In February 2024, NIST released its newest CSF iteration: 2.0. The journey to CSF 2.0 began with a request for information (RFI) in February 2022. Over the next two years, NIST engaged the cybersecurity community through analysis, workshops, comments and draft revision to refine existing standards and create a new model that reflects evolving security challen ..read more
Visit website
What should Security Operations teams take away from the IBM X-Force 2024 Threat Intelligence Index?
Security Intelligence
by John Velisaris
6d ago
The IBM X-Force 2024 Threat Intelligence Index has been released. The headlines are in and among them are the fact that a global identity crisis is emerging. X-Force noted a 71% increase year-to-year in attacks using valid credentials. In this blog post, I’ll explore three cybersecurity recommendations from the Threat Intelligence Index, and define a checklist your Security Operations Center (SOC) should consider as you help your organization manage identity risk. The report identified six action items: Remove identity silos Reduce the risk of credential harvesting Know your dark web exposure ..read more
Visit website
Obtaining security clearance: Hurdles and requirements
Security Intelligence
by Mark Stone
1w ago
As security moves closer to the top of the operational priority list for private and public organizations, needing to obtain a security clearance for jobs is more commonplace. Security clearance is a prerequisite for a wide range of roles, especially those related to national security and defense. Obtaining that clearance, however, is far from simple. The process often involves scrutinizing one’s background, financial history and even personal character. Let’s briefly explore some of the hurdles, expectations and requirements of obtaining a clearance. Jobs that typically require security clear ..read more
Visit website
Ransomware payouts hit all-time high, but that’s not the whole story
Security Intelligence
by Jonathan Reed
1w ago
Ransomware payments hit an all-time high of $1.1 billion in 2023, following a steep drop in total payouts in 2022. Some factors that may have contributed to the decline in 2022 were the Ukraine conflict, fewer victims paying ransoms and cyber group takedowns by legal authorities. In 2023, however, ransomware payouts came roaring back to set a new all-time record. During 2023, nefarious actors targeted high-profile institutions and critical infrastructure, including hospitals, schools and government agencies. Still, it’s not all roses for ransomware gangs. Many top-tier groups are struggling to ..read more
Visit website
What should an AI ethics governance framework look like?
Security Intelligence
by Jonathan Reed
2w ago
While the race to achieve generative AI intensifies, the ethical debate surrounding the technology also continues to heat up. And the stakes keep getting higher. As per Gartner, “Organizations are responsible for ensuring that AI projects they develop, deploy or use do not have negative ethical consequences.” Meanwhile, 79% of executives say AI ethics is important to their enterprise-wide AI approach, but less than 25% have operationalized ethics governance principles. AI is also high on the list of United States government concerns. In late February, Speaker Mike Johnson and Democratic Leader ..read more
Visit website
Cloud security uncertainty: Do you know where your data is?
Security Intelligence
by Jonathan Reed
3w ago
How well are security leaders sleeping at night? According to a recent Gigamon report, it appears that many cyber professionals are restless and worried. In the report, 50% of IT and security leaders surveyed lack confidence in knowing where their most sensitive data is stored and how it’s secured. Meanwhile, another 56% of respondents say undiscovered blind spots being exploited is the leading concern making them restless. The report reveals the ongoing need for improved cloud and hybrid cloud security. Solutions to reveal blind spot vulnerabilities are urgently necessary as well. Strong clou ..read more
Visit website
The evolution of a CISO: How the role has changed
Security Intelligence
by Jennifer Gregory
3w ago
In many organizations, the Chief Information Security Officer (CISO) focuses mainly — and sometimes exclusively — on cybersecurity. However, with today’s sophisticated threats and evolving threat landscape, businesses are shifting many roles’ responsibilities, and expanding the CISO’s role is at the forefront of those changes. According to Gartner, regulatory pressure and attack surface expansion will result in 45% of CISOs’ remits expanding beyond cybersecurity by 2027. With the scope of a CISO’s responsibilities changing so quickly, how will the role adapt to meet the cyber challenges of the ..read more
Visit website

Follow Security Intelligence on FeedSpot

Continue with Google
Continue with Apple
OR