Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

AI

Greening the Digital Frontier: Sustainable Practices for Modern Businesses

The push towards digital transformation has significantly improved efficiency, productivity, and accessibility for businesses globally. However, the environmental footprint of digital operations has increasingly become a focus for concern. As companies continue to leverage digital technologies, the need for integrating sustainable practices into their operations has never been more critical. This article delves into the environmental impact of digitalisation and outlines practical strategies for businesses aiming to achieve sustainability in the digital age.

Closing the loop on AI point solutions to deliver context and visibility

Today most organisations are thinking about or deploying AI and, in effect, trying it out. This is supported by Gartner, which states that approximately 80% of enterprises will have used generative artificial intelligence (GenAI) application programming interfaces (APIs) or models by 2026. As AI drives value for organisations, it is fuelling further demand and adoption.

Demystifying GenAI security, and how Cato helps you secure your organizations access to ChatGPT

Over the past year, countless articles, predictions, prophecies and premonitions have been written about the risks of AI, with GenAI (Generative AI) and ChatGPT being in the center. Ranging from its ethics to far reaching societal and workforce implications (“No Mom, The Terminator isn’t becoming a reality… for now”). Cato security research and engineering was so fascinated about the prognostications and worries that we decided to examine the risks to business posed by ChatGPT.

AI governance and preserving privacy

AT&T Cybersecurity featured a dynamic cyber mashup panel with Akamai, Palo Alto Networks, SentinelOne, and the Cloud Security Alliance. We discussed some provocative topics around Artificial Intelligence (AI) and Machine Learning (ML) including responsible AI and securing AI. There were some good examples of best practices shared in an emerging AI world like implementing Zero Trust architecture and anonymization of sensitive data. Many thanks to our panelists for sharing their insights.

How AI Could Have Positive and Negative Effects on Cybersecurity

Artificial Intelligence is a game-changer technology that has created a buzz in today’s market, which we believe you can agree on. How has AI become a game changer in such a short span of time? Well, the hype is real, and it is because of the revolutionary tools and technologies that come into the market. That’s the one side of the coin! What about the other side? Yes, with these modern AI technologies, there is a fear which we overlooked and that’s security.

Protecto SecRAG - Secure RAG (Reterival Augmented Generation) as a Service

Introducing Protecto SecRAG, the revolutionary platform that empowers you to launch your own AI assistants/chatbots. No coding is required. Simply connect your existing data sources to Protecto. Our intuitive conversation UI allows you to ask questions about your data in plain English, just like you'd talk to a colleague. SecRAG powers a Telco's contracts bot, a large service providers' talent acquisition co-pilot, a healthcare insurance provider's benefits bot and many more.

What is Compliance Automation

In recent years almost every company has been utilizing technological solutions like artificial intelligence which has given rise to the importance of Compliance automation. It is a practice to protect the sensitive information of the companies. Hence, Compliance automation software keeps track of the company’s internal systems. Businesses process automation to achieve the main goals of the organizations effectively with the least amount of monitoring.

LlamaParse and LlamaCloud - This Week in AI

The realm of artificial intelligence (AI) unfolds like a captivating story, constantly introducing groundbreaking tools and methods that redefine possibilities. Retrieval-augmented generation (RAG), a technology that empowers applications to glean relevant information from vast datasets and utilize it for various tasks, is a prime example of this advancement.

Data Scientists Targeted by Malicious Hugging Face ML Models with Silent Backdoor

In the realm of AI collaboration, Hugging Face reigns supreme. But could it be the target of model-based attacks? Recent JFrog findings suggest a concerning possibility, prompting a closer look at the platform’s security and signaling a new era of caution in AI research. The discussion on AI Machine Language (ML) models security is still not widespread enough, and this blog post aims to broaden the conversation around the topic.