news analysisAI agents can find and exploit known vulnerabilities, study showsIn a somewhat chilling revelation, AI agents were able to find and exploit known vulnerabilities, but only under certain conditions, which researchers say indicates they're not close to being a significant threat – yet.By Maria KorolovJul 02, 20248 minsZero-day vulnerabilityGenerative AIVulnerabilities news Microsoft warns of novel jailbreak affecting many generative AI modelsBy Shweta SharmaJun 27, 20244 minsGenerative AIVulnerabilitiesnews Meta delays launch of Meta AI in Europe over disagreement with regulatorsBy Lynn GreinerJun 17, 20243 minsRegulationData PrivacyGenerative AI newsMicrosoft delays Recall launch amid privacy concernsBy Matthew Finnegan Jun 14, 20241 minWindows SecurityGenerative AIData and Information Security newsCriminals, too, see productivity gains from AIBy Lynn Greiner Jun 12, 20246 minsGenerative AIThreat and Vulnerability Management newsComplaints in EU challenge Meta’s plans to utilize personal data for AIBy Prasanth Aby Thomas Jun 06, 20244 minsRegulationData PrivacyGenerative AI featureUnauthorized AI is eating your company data, thanks to your employeesBy Grant Gross Jun 05, 20247 minsData PrivacyGenerative AIIT Governance newsBug in EmbedAI can allow poisoned data to sneak into your LLMsBy Shweta Sharma May 31, 20243 minsGenerative AIVulnerabilities newsOpenAI accuses Russia, China, Iran, and Israel of misusing its GenAI tools for covert OpsBy Gyana Swain May 31, 20244 minsGenerative AI ArticlesnewsMicrosoft Azure’s Russinovich sheds light on key generative AI threatsGenerative AI models have a larger attack surface than many CSOs might think. Microsoft Azure’s CTO walked through some of the more significant challenges facing developers and defenders.By David Strom May 22, 2024 4 minsGenerative AIData and Information SecuritynewsPalo Alto launches AI-powered solutions to fight AI-generated cyberthreats The suite is powered by Palo Alto’s proprietary solution, Precision AI, which integrates machine learning, deep learning, and generative AI technologies.By Prasanth Aby Thomas May 09, 2024 3 minsGenerative AISecurity SoftwarenewsSecuriti adds distributed LLM firewalls to secure genAI applicationsThe new offering is aimed at protecting against prompt injection, data leakage, and training data poisoning in LLM systems. By Shweta Sharma Apr 30, 2024 4 minsGenerative AInewsTop cybersecurity product news of the weekNew product and service announcements from Forcepoint, Ionix, Amplifier Secutiry and Torq.By CSO staff Apr 26, 2024 81 minsGenerative AISecurityfeatureKeeping up with AI: OWASP LLM AI Cybersecurity and Governance ChecklistOWASP’s checklist provides a concise and quick resource to help organizations and security leaders deal with generative AI and LLMs.By Chris Hughes Mar 14, 2024 10 minsGenerative AISecurity PracticesOpen SourcenewsMicrosoft reveals general availability of Copilot for SecurityAvailable worldwide on April 1, Microsoft Copilot for Security uses generative AI to provide incident summaries, step-by-step remediation guidance, and reverse-engineering of scripts.By Samira Sarraf Mar 13, 2024 4 minsGenerative AIThreat and Vulnerability ManagementfeatureGenerative AI poised to make substantial impact on DevSecOpsGenerative AI could be the holy grail of DevSecOps, from writing secure code and documentation to creating tests. But it could be a major point of failure if not used correctly.By Maria Korolov Mar 11, 2024 12 minsDevSecOpsGenerative AIfeatureHow gen AI helps entry-level SOC analysts improve their skillsBy automating repetitive triage and documentation tasks, generative AI systems allow entry-level security analysts to spend more time on investigations, response, and developing core skills.By Maria Korolov Mar 05, 2024 14 minsGenerative AISecurity Operations CenternewsCloudflare adds new WAF features to prevent hackers from exploiting LLMsAdded to Cloudflare’s Web Application Firewall (WAF) offerings, Firewall for AI is designed to prevent the exploitation of AI models, specifically generative AI.By Shweta Sharma Mar 04, 2024 3 minsGenerative AISecurity SoftwarenewsGenerative AI making big impact on security pros, to no one's surpriseCybersecurity professionals expressed a wide range of opinions on the pros and cons of generative AI in a new survey from a prominent certification group.By Jon Gold Feb 23, 2024 3 minsGenerative AICareersnewsNation-state threat actors using LLMs to boost cyber operationsMicrosoft and Open AI detail how some nation-state actors have started to use large language models to gather intelligence.By Samira Sarraf Feb 14, 2024 6 minsAdvanced Persistent ThreatsGenerative AIfeatureWill generative AI kill KYC authentication?Generative AI can create fake documents and personal histories that fool common know-your-customer authentication practices.By Evan Schuman Feb 14, 2024 8 minsAuthenticationFinancial Services IndustryFraud Show more Show less View all Resources whitepaper Download the unified endpoint management (UEM) platform enterprise buyer’s guide For many enterprises, unified endpoint management (UEM) is the platform of choice for managing endpoints like smartphones and PCs and keeping them from becoming security, privacy, and regulatory compliance risks. Here’s how to choose the right one. The post Download the unified endpoint management (UEM) platform enterprise buyer’s guide appeared first on Whitepaper Repository –. By Foundry Editorial 12 Jul 2024MobileMobile SecurityUniversal Endpoint Management whitepaper Start your generative AI journey with Slalom and AWS By AWS and Slalom 12 Jul 2024Application ManagementArtificial IntelligenceBusiness Operations whitepaper Cyber Resilience Checklist By Dell SecureWorks 12 Jul 2024Business OperationsCyberattacksSecurity View all Video on demand videoAI and Cybersecurity: Speed Bumps, Training, and CommunicationIf you are hesitant to embrace AI tools because of cybersecurity concerns, don’t miss this illuminating presentation from Dennis Legori who will explain why the risk of not using AI is greater than the risk of using it. What guardrails should you have in place to ensure AI is used for good and not creating unnecessary risk? How should you be thinking about completing a privacy impact analysis and risk assessment as your use of AI tools evolves? How can security leaders add speed bumps and education to provide caution and risk mitigation as needed? Dennis will share his perspective around these and other important issues you need to consider as you widely adopt AI tools in your organization. Nov 06, 2023 17 minsCyberattacksGenerative AI Generative AI a hot topic at Black Hat Sep 06, 2023 27 minsGenerative AIEventsCybercrime How ChatGPT can help hackers, but also defend against them Sep 01, 2023 39 minsGenerative AIHacking See all videos Explore a topic Application Security Business Continuity Business Operations Cloud Security Careers Compliance Critical Infrastructure Cybercrime Identity and Access Management Hiring Industry Internet of Things IT Leadership Network Security View all topics All topics Close Application Security Business Continuity Business Operations Cloud Security Careers Compliance Critical Infrastructure Cybercrime Identity and Access Management Hiring Industry Internet of Things IT Leadership Network Security Physical Security Privacy Risk Management Security Security Infrastructure Software Development Vulnerabilities Generative AI Show me moreLatestArticlesPodcastsVideos news AT&T confirms arrest in data breach of more than 110 million customers By Evan Schuman Jul 12, 20246 mins Data BreachCyberattacksPrivacy news Mobile surveillance software firm mSpy suffers data breach By John Leyden Jul 12, 20244 mins Data BreachPrivacy news Known SSH-Snake bites more victims with multiple OSS exploitation By Shweta Sharma Jul 12, 20243 mins MalwareOpen Source podcast CSO Executive Session India with Charanjit Bhatia, Head of Cybersecurity, COE, Bata Brands Jul 08, 202418 mins CSO and CISO podcast CSO Executive Sessions: Data protection in Malaysia Jul 02, 202415 mins CSO and CISO podcast CSO Executive Session India with Mrinal Kanti Roy, CISO, Cairn Oil and Gas Jul 01, 202416 mins CSO and CISO video Cybersecurity Insights for Tech Leaders: Addressing Dynamic Threats and AI Risks with Resilience Jul 10, 202424 mins CSO and CISO video CSO Executive Session India with Charanjit Bhatia, Head of Cybersecurity, COE, Bata Brands Jul 08, 202418 mins CSO and CISO video CSO Executive Sessions: Data protection in Malaysia Jul 02, 202415 mins CSO and CISO