Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

AI

LLM Risks: Chaining Prompt Injection with Excessive Agency

Alongside an explosion in the popularity of large language models (LLMs) across many industries, there has also been an increase in the level of trust granted to these models. Whereas LLMs were once perceived as simple, friendly chatbots that could respond to basic questions or pull useful resources from the web based on user input, many have now been granted the ability to perform actions, anywhere from sending an email to deploying code. This is referred to as agency.

How to Augment Creative With AI: Using RAG for Generative Art and Design

In the rapidly advancing field of artificial intelligence, innovative techniques like Retrieval Augmented Generation (RAG) are revolutionizing how AI systems generate content. RAG, a powerful approach that combines knowledge retrieval with language generation, has the potential to transform various domains, including generative art and design. This article explores how RAG can augment creativity in AI, focusing on its applications in generative art and design.

Chatbot, copilot or agent? A quick guide to enterprise AI tools, including Tines Workbench

As AI continues to mature, we’re beginning to see AI-powered capabilities fall into distinct categories that serve different functions across the enterprise. From help tools like copilots that assist users, to conversational bots providing AI-driven chat support, and efficiency-focused agents that automate complex tasks, these categories reveal the unique ways AI is transforming business operations.

The Difference Between Cybersecurity AI and Machine Learning

In what feels like 10 minutes, cybersecurity AI and machine learning (ML) have gone from a concept pioneered by a handful of companies, including SenseOn, to a technology that is seemingly everywhere. In a recent SenseOn survey, over 80% of IT teams told us they think that tools that use AI would be the most impactful investment their security operations centre (SOC) could make.

Five worthy reads: How non-human identities are shaping the cybersecurity landscape

Five worthy reads is a regular column on five noteworthy items we have discovered while researching trending and timeless topics. This week’s article elucidates what non-human identities are and why they are garnering attention today. Undoubtedly, today’s digital environment is burgeoning with technological advancements across various spheres, and cybersecurity is no exception. We are in an era where automation, cloud computing, and AI play a more critical role than humans.

EP 65 - Machine Identities, AI and the Future of Security with the 'Identity Jedi'

In this episode of the Trust Issues podcast, host David Puner and David Lee, aka “The Identity Jedi,” delve into the evolving landscape of identity security. They discuss the critical challenges and advancements in securing both human and machine identities. Lee shares insights on the fear and misconceptions surrounding AI, drawing parallels to pop culture references like Marvel’s Jarvis.