Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

AI

Developing in the Age of AI, with Cloudflare's Ricky Robinett

Experience a deeper understanding of AI's transformative potential! Watch our exclusive video, 'Developing in the Age of AI,' featuring profound insights shared by Cloudflare’s Vice President of Developer Relations, Ricky Robinett. Explore the dynamic convergence of cybersecurity and AI efficacy. Share your details to unlock privileged access to this video, empowering you with the profound insights that shape the technological landscape.

Exploring generative AI guardrails: The Tines approach

Innovation rarely starts with acknowledging the restrictions. It’s only after you’ve fleshed out the practical concepts that you begin to understand how they can align with the predefined boundaries, ensuring that your final product is both useful and compliant. This dynamic process encourages a more organic pathway to discovery, leading to solutions that are not only innovative but also viable within the given constraints.

How to Navigate Data Security in the GenAI Era

Since its mainstream emergence in 2022, generative AI has triggered a seismic shift in data management and security. It is estimated that one in four employees now uses genAI apps daily, often unbeknownst to their employer and IT team. This raises concerns, as genAI is designed with a voracious appetite for consuming both mundane and sensitive data. Effectively securing your data as genAI becomes prevalent is a strategic imperative.

AI Audit Logs: The Secret Weapon to Enhance Enterprise Security

In the rapidly evolving landscape of artificial intelligence (AI), ensuring robust security and compliance is becoming more difficult for enterprises. AI audit logs emerge as a critical tool in this mission, offering a detailed record of all activities within AI systems. By leveraging these logs, businesses can enhance their security posture, ensure regulatory compliance, and optimize AI usage. Let's delve into how AI audit logs can serve as a secret weapon in bolstering enterprise security.

New Malware Campaign Impersonates AI Tools To Trick Users

Researchers at ESET warn that malvertising campaigns are impersonating AI tools to trick users into installing malware. The Rilide infostealer, for example, is being distributed via a malicious browser extension posing as Sora or Gemini. “In the case of the malicious browser extension, it is delivered to victims who have been duped into clicking on malicious ads, typically on Facebook, that promise the services of a generative AI model,” the researchers write.

Arizona Department of Homeland Security enhances cybersecurity with Elastic's AI-driven security analytics

The Arizona Department of Homeland Security (AZDOHS) operates in an environment that requires a robust cybersecurity strategy to protect against ever-evolving threats. With a mission to safeguard state and local infrastructures, the team at AZDOHS faced the daunting task of monitoring an expansive array of data points and potential vulnerabilities.

Clockwork Blue: Automating Security Defenses with SOAR and AI

It’s impractical to operate security operations alone, using manual human processes. Finding opportunities to automate SecOps is an underlying foundation of Zero Trust and an essential architecture component for enterprise-scale SOCs. Let’s discuss what SOAR is, its common uses, and the future of SOAR with AI.

Integrating Zero Trust Security Models with LLM Operations

Zero Trust Security Models are a cybersecurity paradigm that assumes no entity, whether inside or outside the network, can be trusted by default. This model functions on the principle of "never trust, always verify," meaning every access request must be authenticated and authorized regardless of origin.