Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

AI Will Not Replace Jobs | AI Jobs

AI Will Not Replace Jobs: Join us as we explore the profound impact of AI on our professional lives. Discover a thought-provoking quote that highlights the real essence of AI: it's not your favorite AI that will take your job, but rather someone else utilizing AI. This realization presents an exciting opportunity for those who choose to embrace it. It's time to become technologists, to harness the potential of AI, and to create useful and innovative solutions. Don't get caught up in the hype or misguided LinkedIn posts; instead, start building cool stuff with AI. The true revolution lies in the collaboration between humans and AI, and this is where the future is heading. Experience the thrill of this transformative era while witnessing the increasing recognition of AI's importance by businesses and governments. Don't miss out on this incredible time to be part of the AI revolution. Tune in now and be inspired!

Case study: Calico helps Upwork migrate legacy system to Kubernetes on AWS and enforce zero-trust security

Upwork is a freelancing platform that connects a global base of clients to freelancers via job postings. Since going public on the New York Stock Exchange in 2019, the company has become one of the leading freelance platforms worldwide and was named on Time’s list of the 100 Most Influential Companies of 2022.

The Lessons Learned in Cybersecurity 25 Years Ago Are Still Applicable to AI Today

Artificial Intelligence (AI) is a technology that is both exciting and worrisome. It reminds us of events from the past where computer systems were attacked, causing concern for their vulnerability. In 1997, a Department of Defense exercise called Eligible Receiver showed that defense systems could be hacked, which led to the creation of the Joint Task Force for Computer Network Operations.

The State of the CISO 2023: Navigating Security Challenges Resulting from Today's Digital-first Economy

Salt is thrilled to share the findings from the just-released “State of the CISO 2023” report! We wanted to hear directly from CISOs/CSOs around the world about how digital transformation is impacting their role and understand the biggest challenges – both personal and professional – they’re contending with as a result.

EP 30 - Securing Data Amid the AI Gold Rush

Diana Kelley, Chief Information Security Officer (CISO) at Protect AI joins host David Puner for a dive into the world of artificial intelligence (AI) and machine learning (ML), exploring the importance of privacy and security controls amid the AI Gold Rush. As the world seeks to capitalize on generative AI’s potential, risks are escalating.

Spotlight on Zero Trust: We're fastest and here's the proof

In January and in March we posted blogs outlining how Cloudflare performed against others in Zero Trust. The conclusion in both cases was that Cloudflare was faster than Zscaler and Netskope in a variety of Zero Trust scenarios. For Speed Week, we’re bringing back these tests and upping the ante: we’re testing more providers against more public Internet endpoints in more regions than we have in the past.

Is AI-Generated Disinformation on Steroids About To Become a Real Threat for Organizations?

A researcher was alerted to a fake website containing fake quotes that appeared to be written by himself. The age of generative artificial intelligence (AI) toying with our public personas has truly arrived. As cybersecurity professionals we must ask, what are the implications of fake-news-at-scale-and-quality for individuals and organizations?

How Cybercriminals Are Using AI for Cyberattacks

Cybercriminals are using AI to carry out various cyberattacks including password cracking, phishing emails, impersonation and deepfakes. It’s important you understand how cybercriminals are using AI to their advantage so you can better protect yourself and family, as well as your accounts and data. Continue reading to learn about AI-enabled cyberattacks and what you can do to keep yourself safe.

How to Boost Confidence in Your Open Source Security with Mend Smart Merge Control

Modern applications are hugely dependent on open-source software. 80 percent of most organizations’ apps and code base is now open source, in some cases more. While this is great for swift development and innovation, it increases the possibility of vulnerabilities arising that bad actors can exploit, and it expands the potential attack surface.