Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

AI

BlueVoyant Awarded Microsoft Worldwide Security Partner of the Year, Recognizing Leading-Edge Cyber Defense

We are over the moon to share that BlueVoyant has been awarded the Microsoft Worldwide Security Partner of the Year, demonstrating our leading-edge cyber defense capabilities and our strong partnership with Microsoft. We have also been recognized as the Microsoft United States Security Partner of the Year for the third time, and the Microsoft Canada Security Partner of the Year for the first time.

The Double-Edged Sword of AI: Empowering Cybercriminals and the Need for Heightened Cybersecurity Awareness

The BBC recently reported that Booking.com is warning that AI is driving an explosion in travel scams. Up to 900% in their estimation - making it abundantly clear that while AI can be a force for good, it can also be a formidable weapon in the arsenal of cybercriminals. One of the most concerning trends we've observed is the increasing use of AI by cybercriminals to carry out sophisticated phishing attacks.

The Importance of AI Penetration Testing

Penetration Testing, often known as "pen testing," plays a pivotal role in assessing the security posture of any digital environment. It's a simulated cyber attack where security teams utilise a series of attack techniques to identify and exploit vulnerabilities within systems, applications, and an organisation’s infrastructure. This form of testing is crucial because it evaluates the effectiveness of the organisation's defensive mechanisms against unauthorized access and malicious actors.

Breaking down BEC: Why Business Email Compromise is More Popular Than Ever

Cybersecurity moves fast, and the latest threats to reach organizations worldwide are being built on the back of artificial intelligence (AI) models that spit out accurate code, realistic messages, and lifelike audio and video designed to fool people. But as headline-grabbing as AI-based attacks appear to be, they aren’t driving the most breaches globally. That would be BEC attacks, in which attackers leverage stolen access to a business email account to create a scam that results in financial gain.

RAG in Production: Deployment Strategies and Practical Considerations

The RAG architecture, a novel approach in language models, combines the power of retrieval from external knowledge sources with traditional language generation capabilities. This innovative method overcomes a fundamental limitation of conventional language models, which are typically trained on a fixed corpus of text and struggle to incorporate up-to-date or specialized knowledge not present in their training data.

What Drives an SME's Approach to Implementing AI?

AI’s rise in both the business and consumer worlds has been astonishingly exponential. Businesses are using AI to generate content, analyze data, automate processes, and more. But small and medium-sized enterprises (SMEs) look and act very differently from their enterprise counterparts. This prompts the question: How are SMEs approaching AI? Recent data from a 2024 JumpCloud study of SME IT may help answer it.

EssayWriter Review: Comprehensive Guide to Using the Free Essay Writing Assistant

In the age of technology, the educational sector has seen profound shifts in how students and professionals prepare academic content. Among the various tools that have emerged, AI-powered writing assistants are redefining the landscape of academic writing. This review delves into one such innovative tool - EssayWriter, analyzing its features, functionality, and overall utility in enhancing academic and research work through the lens of an AI essay writer platform.

EP 55 - AI Insights: Shaping the Future of IAM

In this episode of Trust Issues, Daniel Schwartzer, CyberArk’s Chief Product Technologist and leader of the company’s Artificial Intelligence (AI) Center of Excellence, joins host David Puner for a conversation that explores AI’s transformative impact on identity and access management (IAM). Schwartzer discusses how CyberArk’s AI Center of Excellence is equipping the R&D team to innovate continuously and stay ahead of AI-enabled threats.

How Artificial General Intelligence Will Redefine Cybersecurity

Artificial Intelligence (AI) is now integrated into almost every available technology. It powers numerous real-world applications, from facial recognition to language translators and virtual assistants. AI offers significant benefits for businesses and economies by boosting productivity and creativity. However, it still faces practical challenges. Machine learning often requires substantial human effort to label training data for supervised learning.

Snyk Code now secures AI builds with support for LLM sources

As we enter the age of AI, we’ve seen the first wave of AI adoption in software development in the form of coding assistants. Now, we’re seeing the next phase of adoption take place, with organizations leveraging increasingly widely available LLMs to build AI-enabled software. Naturally, as the adoption of LLM platforms like OpenAI and Gemini grows, so does the security risk associated with using them.