Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

November 2024

Enhancing Data Security and Privacy with Protecto's AI-Powered Tokenization

The inherently non-deterministic nature of AI inputs, processing, and outputs multiplies risks, making traditional data protection methods insufficient. In the enterprise world, unstructured data—brimming with sensitive information such as Personally Identifiable Information (PII) and Protected Health Information (PHI)—poses a significant challenge, especially as this data flows into AI agents.

AI Risk and Governance: Foundations of a Documented, Defensible Program

Given the many laws, frameworks and industry best practices surrounding artificial intelligence (AI), it’s not surprising that lawyers, compliance professionals and others charged with AI governance and compliance are seeking a starting point for AI guidelines. A solid foundation is vital to building a program that satisfies the growing matrix of requirements while allowing companies to simplify and execute their programs amid growing complexity and change. The U.S.

Humans vs AI: Building a Security Culture That Actually Works with Noora Ahmed-Moshe

As AI reshapes cybersecurity threats, understanding how scams are evolving has never been more critical. Welcome to Razorwire. I'm Jim, and today I'm talking with Noora Ahmed-Moshe, VP of Strategy and Operations at Hoxhunt. We'll explore how AI is transforming cybersecurity threats and what that means for protecting ourselves and our organisations.

How to Build a Generative AI Model in 2025

2025 is a turning point for Artificial Intelligence, particularly in generative AI. Thanks to rapid advancements, building sophisticated generative AI models has become more accessible than ever before. In this article, we'll explore how to build a generative AI model as well as best practices for its design and deployment.

How Zenity Unifies Security, Platform, and Citizen Developer Teams to Enable AI Agents

AI Agents are revolutionizing enterprise efficiency, automating decisions, and enhancing capabilities. But while these agents drive operational improvements, they also introduce unique security challenges. Traditional silos often hinder effective risk management.

Is Implementing AI Complex? What Enterprise Leaders Should Know

For most enterprises, the question isn’t whether to use AI—it’s where and how. For customers, AI enables more personalized experiences and faster response times. Employees can achieve higher productivity with more intuitive ways of working. Businesses can open new revenue streams and build competitive differentiation while strengthening security. The potential benefits are many—but realizing them isn’t a trivial matter.

Cybersecurity in Gaming: protecting players and virtual assets from growing threats

Cybersecurity is becoming a critical necessity in today's world, where technology is used in virtually every aspect of life. Every year, the number of cyberattacks grows, and the methods of attackers are becoming more sophisticated. Protecting personal data, financial information and corporate secrets requires reliable technologies and increased attention from users. The gaming industry is also an important area that needs protection.

Artificial Intelligence in Cybersecurity: Threat or Advantage?

In today's hyperconnected world, cybersecurity stands as the first line of defense against the growing tide of cyber threats. With billions of devices connected globally, protecting sensitive information has never been more critical-or complex. Enter artificial intelligence (AI), a technological marvel capable of revolutionizing cybersecurity. But as with all powerful tools, AI is a double-edged sword. It holds incredible potential to bolster defenses yet can also amplify the capabilities of cybercriminals.

Format-Preserving Encryption vs Tokenization: Learn the Key Differences

Data security demands robust protection methods in our digital age. Format-preserving encryption and tokenization stand out as robust solutions for safeguarding sensitive information. Understanding the difference between data tokenization and encryption helps organizations protect data while maintaining usability. Modern businesses must choose between encryption vs tokenization for their needs. The choice between these methods impacts system performance and security levels.

Static Data Masking vs. Dynamic Data Masking: What's the Difference?

Data masking is essential for protecting sensitive information in today’s data-driven world. It ensures that critical data, such as personal and financial information, remains secure from unauthorized access by replacing real data with fictitious or obfuscated values. By replacing real data with fictitious or obfuscated values, data masking safeguards privacy while enabling necessary operations like testing and analytics.

Tanium Ask - AI-Powered Question Bar - Tanium Tech Talks #111

Tanium Ask is an artificial intelligence (AI)-powered, natural language question bar that enables users to easily and rapidly query for real-time information about their environment. Leveraging industry-leading large language models, Tanium Ask can translate unstructured text input into high-fidelity queries with precise sensor and targeting parameters.

Threat Group Use AI Adult-Based "Deepnude" Image Generator Honeypots to Infect Victims

The threat group FIN7 is using the lure of generating nude images of favorite celebrities to get victims to download their NetSupport RAT. In any social engineering scam, there’s always the need to create some sense of urgency to act in order to make the potential victim take an action that enables the attack. In the case of a new attack by threat group FIN7, the urgency appears to be the desire to see deepfake nude images.

CrowdStrike Partners with MITRE Center for Threat-Informed Defense to Launch Secure AI Project

As organizations deploy more AI-enabled systems across their networks, adversaries are taking note and using sophisticated new tactics, techniques and procedures (TTPs) against them. The need for continued innovation to fight these threats is paramount.

The Future (and Present) of the Internet, AI, and Tech with Nicholas Thompson

This week, host João Tomé is joined by Nicholas Thompson, CEO of The Atlantic and former editor-in-chief of Wired, during his participation at Web Summit, the international event held in Lisbon with over 70,000 attendees. In this conversation, Thompson discusses the Internet, AI, social media, and the challenge of protecting content creators from AI crawlers—a problem Cloudflare’s AI Audit is designed to address. We also explore the 2024 media landscape, its future, and its role in supporting democracy.

EP 66 - Post-Election Insights: AI, Misinformation and Security

In this episode of Trust Issues, host David Puner interviews James Imanian, Senior Director of the U.S. Federal Technology Office at CyberArk. They discuss the critical topic of election security, focusing on the recent 2024 U.S. presidential election. Drawing from his extensive background in cybersecurity including a career in the Navy and a stint at the U.S.

Planning with AI: Minimizing Uncertainty, Maximizing Trust

Gal Peretz is Head of AI & Data at Torq. Gal accelerates Torq’s AI and data initiatives, applying his deep learning and natural language processing expertise to advance AI-powered security automation. He also co-hosts the LangTalks podcast, which discusses the latest AI and LLM technologies. To stay ahead of today’s threats, you must do more than keep pace — you need to equip your team with tools that enable smarter, faster responses.

Falcon Data Protection AI-Powered Anomaly Detections: Demo Drill Down

Sensitive data handling often risks accidental exposure. CrowdStrike Falcon Data Protection, part of the powerful CrowdStrike Falcon platform, uses AI-driven anomaly detection to prevent unauthorized data transfers. In this demo, see how quickly Falcon identifies and blocks an attempted transfer of customer PII to a personal Google Drive, generating real-time alerts to help security teams act fast.

AI Tokenization: Understanding Its Importance and Applications

In artificial intelligence (AI), especially within natural language processing (NLP), tokenization is a fundamental process that breaks down text into smaller, manageable units known as tokens. Depending on the specific task and model, these tokens can be individual words, subwords, characters, or even symbols.

7 Tips from a Security CTO for Balancing AI Innovation with Governance

As a modern CTO, it should probably come as no big surprise that I’m an optimist on the innovative prospects of artificial intelligence (AI). But I’ve been in this career for a long time, and that optimism is tempered with experience. I’ve seen enough emerging technology patterns to know that it always takes a lot more time and resources than people think to evolve innovative technologies beyond their final barriers.

Redefining Modern Security with the Introduction of the Arctic Wolf Aurora Platform, Powered by Alpha AI

In today’s rapidly evolving threat landscape, where cyberattacks grow more sophisticated by the day, staying ahead requires more than vigilance—it demands a platform built to operate at scale. Enter the Arctic Wolf Aurora Platform, the new name for our industry-leading security operations platform. With the ability to process over seven trillion events weekly, The Aurora Platform stands as one of the largest and most advanced cybersecurity platforms in our industry.

The Rise of AI Agents in the Enterprise

AI Agents have become indispensable in modern enterprises, driving efficiency, innovation, and competitive advantage. These agents, which can perform tasks ranging from simple automation to complex decision-making, are transforming how businesses operate. The adoption of AI agents is widespread, with companies leveraging them to enhance customer service, streamline operations, and gain insights from vast amounts of data.

Navigating AI Governance: Insights into ISO 42001 & NIST AI RMF

As businesses increasingly turn to artificial intelligence (AI) to enhance innovation and operational efficiency, the need for ethical and safe implementation becomes more crucial than ever. While AI offers immense potential, it also introduces risks related to privacy, bias, and security, prompting organizations to seek robust frameworks to manage these concerns.

How Healthcare Companies Can Share Data Safely for Offshore Testing and Development

Data sharing for offshore testing, development, and other operational needs is often essential in the healthcare industry. Yet, laws governing Protected Health Information (PHI) make this challenging, as sending sensitive data outside the U.S. can introduce significant regulatory risks. To stay compliant, healthcare companies need solutions that can anonymize data without compromising its usability or accuracy.

T(AI)WANted: How the global surge in AI likely caused an increase in Taiwan-targeted cybercrime

Initial access brokers (IABs) facilitate access for ransomware groups, data brokers, and advanced persistent threat groups (APTs) into corporate networks. They operate in an established, lucrative market, often on cybercriminal forums which are characterised by rigid rules and conventions. Our report explaining the illicit activities of IABs can be viewed here.

Take Control with Torq's AI Data Transformation

Data interoperability is the backbone of building reliable and efficient hyperautomated workflows. However, manipulating and formatting massive amounts of data from various sources — especially in complex JSON files — can feel overwhelming and consume significant time and resources, particularly for those still gaining technical expertise. Teams often lack or have maxed out dedicated resources to wrangle this data.

Why Regular APIs Aren't Safe for AI Agents: A Case for Enhanced Privacy and Controls

APIs are the backbone of modern applications, enabling seamless data exchange between systems. However, the rise of AI agents fundamentally shifts how APIs are utilized. Regular APIs, originally built for deterministic, non-AI use cases, are not inherently designed to handle the complexities and unpredictability of AI-driven applications. Using your regular APIs directly for AI agents or allowing AI agents to integrate without safeguards exposes your systems and data to significant risks.

Top Data Tokenization Tools of 2024: A Comprehensive Guide for Data Security

Data tokenization is a critical technique for securing sensitive information by substituting it with non-sensitive tokens. This process plays a crucial role in data protection, especially in industries handling large volumes of personal or financial information. Here, we explore the top data tokenization tools of 2024 to help organizations find the right solutions for protecting their data.

Cisco Research GenAI Security Summit

Cisco Research hosted a virtual summit on GenAI security, bringing together researchers to explore GenAI security challenges. The summit includes presentations from university professors and students collaborating with the Cisco Research team, including Tianlong Chen (University of North Carolina-Chapel Hill), Ruoxi Jia (Virginia Tech), Xialoin Xu (Northeastern University), and Xun Xian (University of Minnesota).

Unlocking MSP Success: The Power of AI and Trusted Partnerships

The cybersecurity landscape has evolved dramatically, placing IT managers under pressure to adapt. A 168% rise in evasive malware detected by WatchGuard in Q2 2024 underscores this shift, with threat actors following behavioral patterns and adopting attack techniques that become popular and dominate in waves.

Best practices for monitoring LLM prompt injection attacks to protect sensitive data

As developers increasingly adopt chain-based and agentic LLM application architectures, the threat of critical sensitive data exposures grows. LLMs are often highly privileged within their applications and related infrastructure, with access to critical data and resources, making them an alluring target for exploitation at the client side by attackers. In particular, LLM applications can be compromised to expose sensitive data via prompt injection attacks.

AI Governance and Global Cyber Resilience

In this episode of CISO Conversations: EU Data Regulations, Richard Cassidy, EMEA Field CISO at Rubrik, is joined by Anu Bradford, Professor of Law at Columbia Law School, and Bronwyn Boyle, Chief Information Security Officer at PPRO. They discuss the importance of resilience and regulatory compliance as critical factors for organizations to manage their cyber threats and bolster cyber defense.

How AI-Powered Digital Signage is Enhancing Customer Experience

In the early years of the 21st century AI digital signage software has become and is increasingly a transformative force in the way that businesses choose to interact with their customer. Businesses strive to create more personalized, dynamic experiences that cater to more individual needs and preferences in real time. Through analyzing gathered customer data and updating/adjusting content in response, retail spaces, hospitality venues and public transport hubs alike can be taken to the next level.

The Rise of Security in Today's Technology Era

In today's connected world, security is one of the most crucial fears for both people and institutions. With the increase in internet use, digital transformation as well as new technologies such as cloud computing and the Internet of Things (IOT), cyber threat attack surface has increased substantially. Cybercriminals, hackers, and other malicious actors are increasingly faced with the need to secure these assets from them as more data and processes go online, thus making it a more complex endeavor.

LLM Risks: Chaining Prompt Injection with Excessive Agency

Alongside an explosion in the popularity of large language models (LLMs) across many industries, there has also been an increase in the level of trust granted to these models. Whereas LLMs were once perceived as simple, friendly chatbots that could respond to basic questions or pull useful resources from the web based on user input, many have now been granted the ability to perform actions, anywhere from sending an email to deploying code. This is referred to as agency.

The Age of AI-Powered Scams | The 443 Podcast

This week on the podcast, Marc Laliberte and Corey Nachreiner dive into a research white paper that explores how attackers could use AI to execute a full-scale money or credential theft scam from start to finish. Before that, they discuss Sophos's five-year battle with Chinese hackers targeting network devices, followed by a conversation about Microsoft’s ongoing fight against password spray attacks through compromised network devices.

How to Augment Creative With AI: Using RAG for Generative Art and Design

In the rapidly advancing field of artificial intelligence, innovative techniques like Retrieval Augmented Generation (RAG) are revolutionizing how AI systems generate content. RAG, a powerful approach that combines knowledge retrieval with language generation, has the potential to transform various domains, including generative art and design. This article explores how RAG can augment creativity in AI, focusing on its applications in generative art and design.

Chatbot, copilot or agent? A quick guide to enterprise AI tools, including Tines Workbench

As AI continues to mature, we’re beginning to see AI-powered capabilities fall into distinct categories that serve different functions across the enterprise. From help tools like copilots that assist users, to conversational bots providing AI-driven chat support, and efficiency-focused agents that automate complex tasks, these categories reveal the unique ways AI is transforming business operations.

The Difference Between Cybersecurity AI and Machine Learning

In what feels like 10 minutes, cybersecurity AI and machine learning (ML) have gone from a concept pioneered by a handful of companies, including SenseOn, to a technology that is seemingly everywhere. In a recent SenseOn survey, over 80% of IT teams told us they think that tools that use AI would be the most impactful investment their security operations centre (SOC) could make.

Five worthy reads: How non-human identities are shaping the cybersecurity landscape

Five worthy reads is a regular column on five noteworthy items we have discovered while researching trending and timeless topics. This week’s article elucidates what non-human identities are and why they are garnering attention today. Undoubtedly, today’s digital environment is burgeoning with technological advancements across various spheres, and cybersecurity is no exception. We are in an era where automation, cloud computing, and AI play a more critical role than humans.

EP 65 - Machine Identities, AI and the Future of Security with the 'Identity Jedi'

In this episode of the Trust Issues podcast, host David Puner and David Lee, aka “The Identity Jedi,” delve into the evolving landscape of identity security. They discuss the critical challenges and advancements in securing both human and machine identities. Lee shares insights on the fear and misconceptions surrounding AI, drawing parallels to pop culture references like Marvel’s Jarvis.

The Truth About How Generative AI Can Be Used In Cybersecurity

Thanks to ChatGPT, you’ve probably heard a lot about generative AI technology over the last few years. Generative AI is artificial intelligence technology that works by taking input data like a request, processing it through different algorithms, and producing an output based on learned patterns. ChatGPT is a generative AI chatbot. 91% of security teams use generative AI, but 65% don’t fully understand the implications.

CrowdStrike Launches AI Red Team Services to Secure AI Innovation

As organizations race to adopt generative AI (GenAI) to drive efficiency and innovation, they face a new and urgent security challenge. While AI-driven tools and large language models (LLMs) open vast opportunities, they also introduce unique vulnerabilities that adversaries are quick to exploit. From data exposure to supply-chain risks, the potential for threats to AI systems is growing just as fast as the technology itself.

Investigating iOS 18's AI Capabilities

With the release of iOS 18, Apple has continued to expand its integration of AI technologies, positioning the iPhone as a powerful personal assistant capable of smart recommendations, advanced text and image analysis, and even predictive suggestions. Leveraging on-device machine learning, iOS 18’s AI features tap into user data to provide a personalized experience.

Phishing Campaign Impersonates OpenAI To Collect Financial Data

Cybercriminals are impersonating OpenAI in a widespread phishing campaign designed to trick users into handing over financial information. The emails inform users that a payment for their ChatGPT subscription was declined, inviting them to click a link in order to update their payment method. The phishing emails appear fairly convincing, but trained users could spot some red flags. The most obvious giveaway is that the emails were sent from “info@mtacom,” which is clearly unrelated to OpenAI.

How AI Can Help Law Firms Ensure Cybersecurity

Artificial intelligence is now being used in many sectors and can have very positive effects. Routine jobs that people no longer want to deal with are given to artificial intelligence and completed efficiently. One of these sectors can be the cyber security sector. Many companies need to ensure their cyber security, including law firms, and artificial intelligence can help companies in this regard.

The Crucial Network Security Guardrails for Ensuring GenAI Success

Millions of organizations are actively deploying and leveraging generative AI (GenAI) applications in a bid to streamline productivity, reduce costs and improve efficiencies. A high percentage of enterprises are in the midst of trialing GenAI pilot programs, and by 2026, it is anticipated that more than 80% of enterprises will have deployed generative AI-enabled applications, according to Gartner.

Network Digital Twins Deliver Reliable AI Outcomes

In the realm of artificial intelligence (AI), especially when applied to networking and security, the accuracy and reliability of data are paramount. AI systems are only as good as the data they consume, and for network engineers, feeding these systems with up-to-date and precise information can make the difference between optimal performance and costly errors.

The Role of Cloud Computing in Enhancing Cybersecurity

Cloud computing revolutionizes how organizations approach data security and threat prevention. The transformation of traditional security measures into cloud-based solutions marks a significant shift in protecting sensitive information and maintaining business continuity.

Securing Snowflake PII: Best Practices for Data Protection

As organizations increasingly rely on cloud data platforms, securing PII (Personally Identifiable Information) has become more critical than ever. Snowflake, a robust cloud-based data warehouse, stores and processes vast amounts of sensitive information. With the rise in data breaches and stringent regulations like GDPR and CCPA, safeguarding PII data in Snowflake is essential to ensure data privacy and compliance.

The Age of AI-Powered Scams - The 443 Podcast - Episode 312

This week on the podcast, we cover a research white paper that details how attackers could use AI to complete an entire money-theft or credential theft-scam from start to finish. Before that, we discus Sophos' 5 year battle with Chinese hackers targeting network devices followed by Microsoft's current battle with password spray attacks through compromised network devices. The 443 Security Simplified is a weekly podcast that gets inside the minds of leading white-hat hackers and security researchers, covering the latest cybersecurity headlines and trends.

AI vs. AI: Why fighting GenAI fraud requires a multi-layered approach

If The Terminator, The Matrix, and every other cyberpunk series taught us anything, it’s that you can’t fight the machines with machines alone. Daniel Lee is a product manager at Persona who loves collaborating with fellow Personerds! He likes biking around the bay area and exploring 'hole-in-the-wall' restaurants. Daniel Lee is a product manager at Persona who loves collaborating with fellow Personerds! He likes biking around the bay area and exploring 'hole-in-the-wall' restaurants.

Microsoft Copilot for Security Brings an AI Assist - Even to Your MDR Provider

Artificial intelligence has a significant role to play in cybersecurity, and Microsoft CoPilot for Security is a great example of its promise, with its ability to help even novice security professionals process threat data more quickly and accurately. However, it can also benefit seasoned security pros, including managed detection and response (MDR) service providers.

Introducing Document AI, Persona's AI-powered suite of features for document processing

Accelerate decision-making with AI-powered document processing. Lynn Chou is a product marketer focused on Persona's startups and healthcare customers. She loves afternoon tea, pilates, and taking her cat on walks. Lynn Chou is a product marketer focused on Persona's startups and healthcare customers. She loves afternoon tea, pilates, and taking her cat on walks.