Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

AI

How AI Could Have Positive and Negative Effects on Cybersecurity

Artificial Intelligence is a game-changer technology that has created a buzz in today’s market, which we believe you can agree on. How has AI become a game changer in such a short span of time? Well, the hype is real, and it is because of the revolutionary tools and technologies that come into the market. That’s the one side of the coin! What about the other side? Yes, with these modern AI technologies, there is a fear which we overlooked and that’s security.

Protecto SecRAG - Secure RAG (Reterival Augmented Generation) as a Service

Introducing Protecto SecRAG, the revolutionary platform that empowers you to launch your own AI assistants/chatbots. No coding is required. Simply connect your existing data sources to Protecto. Our intuitive conversation UI allows you to ask questions about your data in plain English, just like you'd talk to a colleague. SecRAG powers a Telco's contracts bot, a large service providers' talent acquisition co-pilot, a healthcare insurance provider's benefits bot and many more.

What is Compliance Automation

In recent years almost every company has been utilizing technological solutions like artificial intelligence which has given rise to the importance of Compliance automation. It is a practice to protect the sensitive information of the companies. Hence, Compliance automation software keeps track of the company’s internal systems. Businesses process automation to achieve the main goals of the organizations effectively with the least amount of monitoring.

LlamaParse and LlamaCloud - This Week in AI

The realm of artificial intelligence (AI) unfolds like a captivating story, constantly introducing groundbreaking tools and methods that redefine possibilities. Retrieval-augmented generation (RAG), a technology that empowers applications to glean relevant information from vast datasets and utilize it for various tasks, is a prime example of this advancement.

Data Scientists Targeted by Malicious Hugging Face ML Models with Silent Backdoor

In the realm of AI collaboration, Hugging Face reigns supreme. But could it be the target of model-based attacks? Recent JFrog findings suggest a concerning possibility, prompting a closer look at the platform’s security and signaling a new era of caution in AI research. The discussion on AI Machine Language (ML) models security is still not widespread enough, and this blog post aims to broaden the conversation around the topic.

ChatGPT and the dark web: a dangerous alliance

Artificial intelligence (AI) is now present in almost every aspect of our lives. However, its influence is particularly relevant in the field of cybersecurity, where it impacts both defense and attack. While it has become a great tool to protect an organization's digital assets, it has also been weaponized by cybercriminals to spread and execute increasingly sophisticated and difficult to detect cyberattacks.

The CISA Points Way Forward for More Effective Vulnerability Management with Directive 23-01

While tech sector media coverage on cybersecurity has primarily focused in recent years on trends such as ransomware attacks, vulnerabilities in the DevOps chain, and the growing role of AI in combating threats, a quiet but significant development has been advancing under the radar on several fronts: we refer to the more assertive stance taken by the U.S. Cybersecurity and Infrastructure Security Agency (CISA) to elevate security best practices in government and the private sector.