Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Technology

Two new checks for the ChatGPT macOS app

With the recent announcement of OpenAI’s ChatGPT desktop application for macOS, users gain access to LLM workflows outside of their browser. ChatGPT’s broad adoption by employees across industries, and around the world, has put employers, compliance, and security teams into high gear as they seek to balance the gains made in productivity with the potential risks of how these tools are being used.

Unlocking AI Ethics: The Brivo Approach to Transparency and Safety

In today's rapidly evolving digital landscape, the integration of artificial intelligence (AI) into our daily lives and businesses is inevitable. At Brivo, we're at the forefront of marrying technology with ethics, ensuring that our smart spaces and access control solutions are not just innovative but also transparent and safe. In this video, we dive deep into the importance of transparency in AI usage, highlighting how it forms the backbone of ethical AI practices.

Smartphones: The Usual Suspects in Car Accident Cases

Smartphones have become such an integral part of our way of life that we cannot seem to do anything without them. We're always chatting, answering calls, going through social media, etc., and the most dangerous part is that we even do these things while driving. Such an action can be categorized as distracted driving, which is engaging in other activities as a driver that distract you from paying attention to the road.

Cloud Security and Compliance: A Smarter Approach to Keeping Your Head Above Water

When it comes to cloud security and compliance, it’s easy to feel like you’re drowning in a sea of regulations and requirements. But don’t worry; we’re all in the same boat! That’s why we’re thrilled to share our latest point-of-view (POV) paper, “Practical Cloud Security in the Era of Cybersecurity Regulation,” which is crafted with our deep industry expertise and experience.

How to Protect Your Business From API Data Leaks

Application Programming Interfaces (APIs) are rapidly becoming the primary attack vector for cloud native applications. In fact, according to one study, 92% of organizations have already experienced a security incident resulting from insecure APIs. This is because loosely coupled microservices predominantly intercommunicate via APIs. In this video, we will analyze a ‘ripped from the headlines’ case-study example of data leakage via insecure APIs. Then we will examine various API vulnerabilities that can be exploited by attackers to enable data leaks, including Broken User Authentication (BUA), Broken Object Level Authentication (BOLA), and Broken Function-Level Authentication (BFLA).

From Doodles to Masterpieces: How AI Art Generators Transform Sketches into Art

Artificial Intelligence (AI) has permeated nearly every aspect of our lives, from powering virtual assistants to driving autonomous vehicles. However, one of the most intriguing applications of AI is in the realm of art generation. With the emergence of free AI art generators and background removers, individuals now have the power to transform simple doodles into stunning masterpieces with just a few clicks. In this article, we delve into the world of AI-generated art, exploring its capabilities, implications, and the creative freedom it offers to artists and enthusiasts alike.