Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Use Of AI In Cybersecurity - Consultants Roundtable || Razorthorn Security

Hello, and welcome to Razorwire. This week, I've had a great time discussing the fascinating topic of artificial intelligence (AI) and its potential impact on our industry, with my esteemed Razorthorn consultants, Tom, Jamie and Michael. We explore the different types of AI, including machine learning and chatbots, and discuss the challenges of achieving a low false positive rate and high general application. You'll gain valuable insights into the evolution of AI and why we MUST take seriously the very real potential for malicious actors to use it for nefarious purposes.

Most Organizations Believe Malicious Use of AI is Close to Evading Detection

As organizations continue to believe the malicious use of artificial intelligence (AI) will outpace its defensive use, new data focused on the future of AI in cyber attacks and defenses should leave you very worried. It all started with the proposed misuse of ChatGPT to write better emails and has (currently) evolved into purpose-built generative AI tools to build malicious emails. Or worse, to create anything an attacker would need using a simple prompt.

Navigating the Complex AI Regulatory Landscape - Transparency, Data, and Ethics

Ahead of the upcoming AI Safety Summit to be held at the UK’s famous Bletchley Park in November, I wanted to outline three areas that I would like to see the summit address, to help simplify the complex AI regulatory landscape. When we start any conversation about the risks and potential use cases for an artificial intelligence (AI) or machine learning (ML) technology, we must be able to answer three key questions.

OAuth security gaps at Grammarly (now remediated)

This short video explains how Salt Labs researchers identified several critical security flaws on the popular site - Grammarly. The flaws were found in the site's authentication functionality and could have allowed a malicious attacker to take over user accounts, access profile information, and take actions on behalf of the user. All issues were reported to Grammarly and have been resolved with no evidence of these flaws being actively exploited in the wild. In the research, they also found similar vulnerabilities in Vidio.com and Bukalapak.com.

The Role of AI in Your Governance, Risk and Compliance Program

In today’s rapidly evolving business landscape, organizations face an ever-increasing array of risks and compliance challenges. As businesses strive to adapt to the digital age, it has become imperative to enhance their Governance, Risk Management, and compliance (GRC) strategies. Fortunately, the fusion of artificial intelligence (AI) and GRC practices presents a transformative opportunity.

Falcon Exposure Management Active Asset Scanning: Demo Drill Down

Organizations often grapple with hidden network vulnerabilities akin to navigating an unseen, complex labyrinth. Falcon Exposure Management alleviates this challenge, transforming obscured vulnerabilities into visible, managed, and secured assets through its Active Asset Discovery feature. It employs customizable, non-intrusive scans, ensuring that every asset is mapped without disrupting operations. In this demo, experience the revelation of every network corner, unveiling a fortified defense ready to counter cyber attacks.

Falcon Cloud Security Kubernetes Admission Controller: Demo Drill Down

Misconfigured containers with root access are commonly deployed in cloud environments, leaving organizations vulnerable to adversaries. See how Falcon Cloud Security Kubernetes Admission Controller provides out of the box policies to prevent misconfigured containers from deploying, ensuring cloud environments are secured and compliant.