Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

How to Safely Integrate LLMs Into Enterprise Applications and Achieve ISO 42001 Compliance

Enterprise applications, whether on-premise or in the cloud, access LLMs via APIs hosted in public clouds. These applications might be used for content generation, summarization, data analysis, or a plethora of other tasks. Riscosity’s data flow posture management platform protects sensitive data that would otherwise be accessible to LLM integrations.

Emerging AI Use Cases in Healthcare: A Comprehensive Overview

The integration of AI, especially Gen AI, into healthcare has been transforming the industry, enabling providers to enhance patient care, streamline operations, and reduce costs. Below is an overview of the most promising AI use cases in healthcare that are reshaping the industry.

How to Detect Threats to AI Systems with MITRE ATLAS Framework

Cyber threats against AI systems are on the rise, and today’s AI developers need a robust approach to securing AI applications that address the unique vulnerabilities and attack patterns associated with AI systems and ML models deployed in production environments. In this blog, we’re taking a closer look at two specific tools that AI developers can use to help detect cyber threats against AI systems.

AI-Enhanced Cyber Attacks Top the List of Potential Threats Facing Data Security

AI is quickly becoming the basis for more cyber attacks, leading organizations to realize the risk it presents. A new report now shows that AI-enhanced cyber attacks are now the top concern of security leaders. I recently wrote about how prolific ransomware attacks are and what the outcomes were for those experiencing attacks. In the same report - GetApp’s 2024 Data Security report – I also found some interesting data around where AI sits in the list of concerns for cybersecurity leaders.

AI-Powered SOCs, Explained

Security Operations Centers (SOCs) are the command center of an organization’s frontline cybersecurity defenses — responsible for monitoring threats, prioritizing alerts, and orchestrating remediation. However, today’s SOCs are facing an existential crisis: an overwhelming volume of increasingly complex and sophisticated threats combined with a shortage of skilled analysts.

Using AI Detectors to Identify and Mitigate Harmful Online Content

In today's digital age, online content is generated and shared at an unprecedented rate, leading to a landscape filled with diverse and rich information. However, this constant influx of data has also brought about a surge in harmful content, including hate speech, fake news, cyberbullying, and violent material. These forms of content not only jeopardize user safety but also threaten societal well-being. Addressing this issue requires innovative solutions, and artificial intelligence (AI) detectors have emerged as powerful tools in identifying and mitigating harmful online content.

How to Execute a Secure M365 Copilot Deployment

Microsoft Copilot is a powerful AI assistant that can leverage Microsoft 365 (M365) data from across an organization to generate accurate and relevant insights. But some of that data should be under special lock: you do not want sensitive enterprise information to be used as part of a large language model (LLM). And the reality is that common misconfigurations—such as mislabeled files and overly broad user permissions—can lead to sensitive data exposure to unauthorized users.

What is India's Digital Personal Data Protection (DPDP) Act? Everything You Need to Know!

Data protection has become a critical concern worldwide as digital transactions and data exchanges grow. Countries are establishing strict data protection laws to safeguard personal information, and India is no exception. The Digital Personal Data Protection (DPDP) Act is India’s response to growing privacy concerns and the need for robust regulations around personal data usage.